Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 00:03

General

  • Target

    2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe

  • Size

    6.0MB

  • MD5

    5cf13d7c5d45c101956e5c18a72b0f30

  • SHA1

    6523f525eaef88b27238033a64f30d1a6e090e9f

  • SHA256

    8ef6fb342ffe00a8be99115d68fca3c83a8d6c7b8b1c0826f5b405dbec673013

  • SHA512

    257b022ac8dde4e05a127e81af2a2e3469b2a3ebbd2fa7f4ade48c9cbc275623b815b862c8e373a75a4a5e6427a96a019d4650e0baba1c693c0fcc72444cd901

  • SSDEEP

    98304:w1SCUlJurbOI+gHDDV4twpmVKePTRcRoDGWHCWf7Hd0FLEIbhF:gkJurjDDWtq+ryRsGWHzH2FgoD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-25_5cf13d7c5d45c101956e5c18a72b0f30_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\optsetup.exe
      C:\Users\Admin\AppData\Local\Temp\\optsetup.exe /MMJS
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Users\Admin\AppData\Local\Temp\is-04OBO.tmp\optsetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-04OBO.tmp\optsetup.tmp" /SL5="$A005C,5637987,115200,C:\Users\Admin\AppData\Local\Temp\optsetup.exe" /MMJS
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-04OBO.tmp\optsetup.tmp

    Filesize

    1.1MB

    MD5

    c1695a7137063ff381449ccb4d334149

    SHA1

    bfa105eb86ad85b4ad84a181b99d105764e73d3f

    SHA256

    eede214913ae990b50226df807a7991eaf7c411834d32aefd98cd1cab8dbe70d

    SHA512

    c70027d9d1ce23a356cd2e25b45737a5df6f2126aed294591adce3ae7bc3ae3fd5c9115ee5ff6b70e8f6e6c084ede9bbe5ba01a250b526ef4f90cf0d56e75303

  • C:\Users\Admin\AppData\Local\Temp\is-RITFQ.tmp\OptProHelper.dll

    Filesize

    1.2MB

    MD5

    079f83c6472eb4b3cf3dafe6985eac9d

    SHA1

    2490436a78daaedcbbdd1ae18aaf4ab9d84e967a

    SHA256

    e16a72b781fa36755a5078516fb5f81b360f2ba70cb3bc5d958cca927c4ad450

    SHA512

    4a941bdc68d943e4c8f3773bbfa40850678e89b5162a2b17c22459eb53cfe61a31dfa4f6d68bc860b59b8d3aa8cb75b92ede273ca7387c9eeeaea9b46e133c81

  • C:\Users\Admin\AppData\Local\Temp\is-RITFQ.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • C:\Users\Admin\AppData\Local\Temp\optsetup.exe

    Filesize

    5.9MB

    MD5

    7400b3f5411e6207a462e9f9e6210d8f

    SHA1

    49e8cf6e00fc697cb734216b69d1b6014ccc4bec

    SHA256

    18263690f78227abe41d3fd3dd16c653af7fe2b4f8e35545b9e6f2eacc4692d8

    SHA512

    554e94001381b9faf90fa57051cd90a3813fc940dde5c4b589238ccb0ff245cfb4f148aca4b086922782669b137731a2463ff532db13066a65f06b4cd65eb39e

  • memory/1332-21-0x0000000003310000-0x000000000334C000-memory.dmp

    Filesize

    240KB

  • memory/1332-11-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/1332-28-0x0000000003F80000-0x00000000040C6000-memory.dmp

    Filesize

    1.3MB

  • memory/1332-33-0x0000000003310000-0x000000000334C000-memory.dmp

    Filesize

    240KB

  • memory/1332-34-0x0000000003F80000-0x00000000040C6000-memory.dmp

    Filesize

    1.3MB

  • memory/1332-32-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/1332-39-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/1332-43-0x0000000000400000-0x000000000052A000-memory.dmp

    Filesize

    1.2MB

  • memory/2704-6-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2704-4-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2704-31-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB