Analysis

  • max time kernel
    94s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 08:45

General

  • Target

    2024-08-20_24a31339692b0b11f85426a893604a12_mafia.exe

  • Size

    413KB

  • MD5

    24a31339692b0b11f85426a893604a12

  • SHA1

    ab82f8c0a6086940dc2157cf1db571089ab6108a

  • SHA256

    f3172da18f45ca7a30d7814a529a065154d3e55bab4f2d1eefd0ccd8175b55a7

  • SHA512

    a6ce5e83ae96e6121603414c2f729796a56306513aacb6a2ba8be89d63417526f04d592c33246e1a4a63a1d819119f22557e4c1b5adc8c794ec91bf85f9cda14

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFpjqY6zv2MoNmhXFgZdygiVumGPLS+vlcyu9qHg:gZLolhNVyE4jjRMiaXKCVurLyqHg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-20_24a31339692b0b11f85426a893604a12_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-20_24a31339692b0b11f85426a893604a12_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\C18B.tmp
      "C:\Users\Admin\AppData\Local\Temp\C18B.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-20_24a31339692b0b11f85426a893604a12_mafia.exe AE847F3AB0B9A49CB00E584D3ED79076DA1AB1F67458635087BF2F3ABE7D5EE802B8781368286D56FFE82E026A3C5AED27C483B6CB220D47D268E5FCC18AFC7A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C18B.tmp

    Filesize

    413KB

    MD5

    80f730d37286d80c48b3a97c07bf2293

    SHA1

    dbba0c83385d62ff63c62a9135425c46e1811a7f

    SHA256

    60fb394e713f111f5c8a66f704f1fd4fe38e424503cfc4bd4e2d9c565c72a737

    SHA512

    0d106f713d575309846e91288c2598594b8e37ec98eb5c40a1995597bc584d3c7ed99d7dd088096af14dd18d3c7b9c8e72bebe32517801ba31b6ee9a5121d124