Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe
-
Size
428KB
-
MD5
fa8961fb191bea9f5981c6c3ebdadfa8
-
SHA1
f280a6cf6e9ab7aefd0f08db24f932935b9252a2
-
SHA256
d680bb5a4a4bc1fa4a92fd6c882efd62e295976c2d1d8a1733205880f64efb76
-
SHA512
e51a2e0ac2a8b3470df0655b388408119b8415560dbc0d53446445dbf9dc30e077bbfd26af1f92c729e6b79337a4dd81d61841cb014f666079cd29e7068af18b
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFiZe2133bCupisuXRdPF3atk6WGYWqHR:gZLolhNVyEl9h3OXPt3SGWqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4828 6D12.tmp -
Executes dropped EXE 1 IoCs
pid Process 4828 6D12.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6D12.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4828 6D12.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 4828 1896 2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe 84 PID 1896 wrote to memory of 4828 1896 2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe 84 PID 1896 wrote to memory of 4828 1896 2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\6D12.tmp"C:\Users\Admin\AppData\Local\Temp\6D12.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-09-11_fa8961fb191bea9f5981c6c3ebdadfa8_mafia.exe A3C94806C413EEED1F7BA52FC6AA54E2F180E78B5EF418C83FEDB186F19864ABBF5C6521638C5A4814B29E7E21E2C59E8685602E52FC2E77697D27CEFF33E1F72⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5864538a2ca6761c73abd81245fbc67d6
SHA124e769d42b6678e9d8acebca888babd783bd9f63
SHA25629b41b1782dd2cc6569dc388d17d6d736cd69825a220bae74a23b5b074139ad3
SHA512a292cc7c2a6174a3ce774dd27d5399afb4426d0e0815aa121484dc785d0ee5802a9422ee0f83b5976635bd6bc9bca2df216212672b9924f3939fdf5e8b2181da