Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe
-
Size
6.0MB
-
MD5
5cf13d7c5d45c101956e5c18a72b0f30
-
SHA1
6523f525eaef88b27238033a64f30d1a6e090e9f
-
SHA256
8ef6fb342ffe00a8be99115d68fca3c83a8d6c7b8b1c0826f5b405dbec673013
-
SHA512
257b022ac8dde4e05a127e81af2a2e3469b2a3ebbd2fa7f4ade48c9cbc275623b815b862c8e373a75a4a5e6427a96a019d4650e0baba1c693c0fcc72444cd901
-
SSDEEP
98304:w1SCUlJurbOI+gHDDV4twpmVKePTRcRoDGWHCWf7Hd0FLEIbhF:gkJurjDDWtq+ryRsGWHzH2FgoD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2704 optsetup.exe 1332 optsetup.tmp -
Loads dropped DLL 4 IoCs
pid Process 1332 optsetup.tmp 1332 optsetup.tmp 1332 optsetup.tmp 1332 optsetup.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language optsetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language optsetup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 optsetup.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString optsetup.tmp -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 36 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5052 2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe 5052 2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2704 5052 2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe 88 PID 5052 wrote to memory of 2704 5052 2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe 88 PID 5052 wrote to memory of 2704 5052 2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe 88 PID 2704 wrote to memory of 1332 2704 optsetup.exe 90 PID 2704 wrote to memory of 1332 2704 optsetup.exe 90 PID 2704 wrote to memory of 1332 2704 optsetup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\optsetup.exeC:\Users\Admin\AppData\Local\Temp\\optsetup.exe /MMJS2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\is-04OBO.tmp\optsetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-04OBO.tmp\optsetup.tmp" /SL5="$A005C,5637987,115200,C:\Users\Admin\AppData\Local\Temp\optsetup.exe" /MMJS3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c1695a7137063ff381449ccb4d334149
SHA1bfa105eb86ad85b4ad84a181b99d105764e73d3f
SHA256eede214913ae990b50226df807a7991eaf7c411834d32aefd98cd1cab8dbe70d
SHA512c70027d9d1ce23a356cd2e25b45737a5df6f2126aed294591adce3ae7bc3ae3fd5c9115ee5ff6b70e8f6e6c084ede9bbe5ba01a250b526ef4f90cf0d56e75303
-
Filesize
1.2MB
MD5079f83c6472eb4b3cf3dafe6985eac9d
SHA12490436a78daaedcbbdd1ae18aaf4ab9d84e967a
SHA256e16a72b781fa36755a5078516fb5f81b360f2ba70cb3bc5d958cca927c4ad450
SHA5124a941bdc68d943e4c8f3773bbfa40850678e89b5162a2b17c22459eb53cfe61a31dfa4f6d68bc860b59b8d3aa8cb75b92ede273ca7387c9eeeaea9b46e133c81
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
Filesize
5.9MB
MD57400b3f5411e6207a462e9f9e6210d8f
SHA149e8cf6e00fc697cb734216b69d1b6014ccc4bec
SHA25618263690f78227abe41d3fd3dd16c653af7fe2b4f8e35545b9e6f2eacc4692d8
SHA512554e94001381b9faf90fa57051cd90a3813fc940dde5c4b589238ccb0ff245cfb4f148aca4b086922782669b137731a2463ff532db13066a65f06b4cd65eb39e