Analysis

  • max time kernel
    137s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 12:34

General

  • Target

    2024-08-25_4692b3ce58da8a38374754fbc7618343_mafia.exe

  • Size

    2.2MB

  • MD5

    4692b3ce58da8a38374754fbc7618343

  • SHA1

    cb8d7cf057515812caf79b6b4d60de5166d18069

  • SHA256

    a746774814da41bf69f0a6c4e380ad110b3ca05e7a8f8230ba68e906ed2adc3b

  • SHA512

    2a037f89fba525fd9eb9133a1af96859385250abedd4c5a44767bf313cf59774d1363ec9f582fdac0d18a8169af6611c57e9d571a283981cadc8cce784032a97

  • SSDEEP

    49152:hTEFVxVbtrlYI9xq0oL4nnWKEtStHbPC6SAExuYJ8NGBKCUTjxLdTp48CF:mVbtrKI9xFo0nPEWC3VxuYWGMFL

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-25_4692b3ce58da8a38374754fbc7618343_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-25_4692b3ce58da8a38374754fbc7618343_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\2024-08-25_4692b3ce58da8a38374754fbc7618343_mafia.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-08-25_4692b3ce58da8a38374754fbc7618343_mafia.exe" /postdata
      2⤵
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\201308072107385202469a1be23.jpg

    Filesize

    729B

    MD5

    c7a76e0654ab9562e4c3ca3d7589a7ca

    SHA1

    8f94f9ac2e92335a6abff669d41ed50a7986865e

    SHA256

    09018489990b9d265f4bef40a5abaf2cb451a48a30e5fec0a5c5c336d65434cf

    SHA512

    0e8c641b195cffe9d80f2cc3e9ef81e5ed7bdb7a5681b99d7066ba1ce96172de00a6581604e75be31275f6f9eac0cb1ffd113085b3bff3b96746ed688d1bc798