Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 14:42

General

  • Target

    2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe

  • Size

    413KB

  • MD5

    316d8f8a69efc244b2e7da04cecc0b86

  • SHA1

    5c0e6e9c63eeb539b6eb438f64cd6534b0290638

  • SHA256

    9676e16e11c9ba31cc60ee3c6da64a043985b71394e2fb255949fcdea6964090

  • SHA512

    bed304e9dc5e3c9ff90d270643832cc4915428416c2c1d1e862d9412c38b604da9da1769c1b67c972f0471f8427ce0bb1fc0e863f0429f5a92494a9ab1dcbfb4

  • SSDEEP

    6144:gVdvczEb7GUOpYWhNVynE/mFm2FUJ5sJAFZlKc3qGJp3xBCL0gVvPqHg:gZLolhNVyEfuUJyOFHrJXBCw0PqHg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\AppData\Local\Temp\9D88.tmp
      "C:\Users\Admin\AppData\Local\Temp\9D88.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-08-21_316d8f8a69efc244b2e7da04cecc0b86_mafia.exe 2CBAAC080A772BE1B176128B4CA83A1F459DB8BBF95F4A3F22665B56C3800BACA2BFC40DF13F86BBDBC2F93E7E68C88BC75172992144408B819F12AE2D161B1C
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9D88.tmp

    Filesize

    413KB

    MD5

    93e4b9ceb9bf2358d3bc58797a396b03

    SHA1

    ef917f4ef1543797ad49a10b7a915769eeeef774

    SHA256

    f2ada2621b99026128e20aa68ad61290034de28960afe95f150360ff1490e73d

    SHA512

    fc3aaac008953fee9020c3e11ab53681753dc7c29971b1fc3f7907f5bc1a7421e03c9903131bb7011c4e19aa5505c73ff33ac328ca0fdb6981900091c8735a2c