Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe
-
Size
526KB
-
MD5
eed31bb6137e569328864b1af104be87
-
SHA1
8884285e361add24153f2f41e8b19cad6edc5941
-
SHA256
0ee796a816edf6b4b9e6e002af5dc39d51c65aade60a5da18622ae6e92476ada
-
SHA512
950e5d513502fb0a46de227645bd5e1b8fa212f8efbef1b4782cff588c6215f60e7e0d062c9770463fadb520302cacb29072bfc8d3b7c4cf950f407ac4def3c9
-
SSDEEP
6144:zooTAQjKG3wDGAeIc9kphIoDZnLhWtGF41DpPNjgnYG4U/SaD0H0AH7kP6+:z6PCrIc9kph53yGa1DlGt680HTH7kz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4020 BB80.tmp -
Executes dropped EXE 1 IoCs
pid Process 4020 BB80.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BB80.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4020 BB80.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4020 2616 2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe 83 PID 2616 wrote to memory of 4020 2616 2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe 83 PID 2616 wrote to memory of 4020 2616 2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\BB80.tmp"C:\Users\Admin\AppData\Local\Temp\BB80.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-09-03_eed31bb6137e569328864b1af104be87_mafia.exe BBC11431123A07C78C03E37D98D0E4CF0222C43484F1FA696B209ABE0AC76606AF54ABBA65528768616DE0CEFCAD5C821A1B0E04439B82C0EC04C76A575C044E2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD5be43a7e9ba08bba3c0e63d507fac3819
SHA13dde133f9a0c37070b0c19f3281cfc3cf943cd3f
SHA2562d233514204c873ee47fcdff6e3894b3b634740fe588633b6858058884a40102
SHA512aa62a475b00544bd44620c60de8c747b1dc0dc80958ae5b766f0a80a7aaa810ca7637585af69310e1b42b79b89e5d2de0f14bcd0a11dcc8fe53b758d2d61e17c