Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe
-
Size
413KB
-
MD5
316d8f8a69efc244b2e7da04cecc0b86
-
SHA1
5c0e6e9c63eeb539b6eb438f64cd6534b0290638
-
SHA256
9676e16e11c9ba31cc60ee3c6da64a043985b71394e2fb255949fcdea6964090
-
SHA512
bed304e9dc5e3c9ff90d270643832cc4915428416c2c1d1e862d9412c38b604da9da1769c1b67c972f0471f8427ce0bb1fc0e863f0429f5a92494a9ab1dcbfb4
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFm2FUJ5sJAFZlKc3qGJp3xBCL0gVvPqHg:gZLolhNVyEfuUJyOFHrJXBCw0PqHg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4736 9D88.tmp -
Executes dropped EXE 1 IoCs
pid Process 4736 9D88.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D88.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4736 9D88.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4736 4512 2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe 84 PID 4512 wrote to memory of 4736 4512 2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe 84 PID 4512 wrote to memory of 4736 4512 2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\9D88.tmp"C:\Users\Admin\AppData\Local\Temp\9D88.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe 2CBAAC080A772BE1B176128B4CA83A1F459DB8BBF95F4A3F22665B56C3800BACA2BFC40DF13F86BBDBC2F93E7E68C88BC75172992144408B819F12AE2D161B1C2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD593e4b9ceb9bf2358d3bc58797a396b03
SHA1ef917f4ef1543797ad49a10b7a915769eeeef774
SHA256f2ada2621b99026128e20aa68ad61290034de28960afe95f150360ff1490e73d
SHA512fc3aaac008953fee9020c3e11ab53681753dc7c29971b1fc3f7907f5bc1a7421e03c9903131bb7011c4e19aa5505c73ff33ac328ca0fdb6981900091c8735a2c