Analysis

  • max time kernel
    141s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:49

General

  • Target

    2024-09-19_b7bda4c6ffcfe187aed909184fb2c850_mafia.exe

  • Size

    490KB

  • MD5

    b7bda4c6ffcfe187aed909184fb2c850

  • SHA1

    2a51f758cfdb9efd5331ec85d24f5027c299b31a

  • SHA256

    e19ced4d0ad9486c7194bae5b1a293f2ffd4b239d97c41bd305e7dd049af6120

  • SHA512

    51dd53f102b8c3cbd9d121393229f1d57be8b07cebc37230b32e00778c5f153e30751d1f28b2242180e173a24c83741b4a37b179197826398dd6983ac6a0fdbd

  • SSDEEP

    12288:n+TRL7A0wg5rYzCm4juSIBS2RVFW4P6gr646b19mmVN:n+17A0wRs92V1By6mVN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_b7bda4c6ffcfe187aed909184fb2c850_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_b7bda4c6ffcfe187aed909184fb2c850_mafia.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Users\Admin\AppData\Local\Temp\n8793\s8793.exe
      "C:\Users\Admin\AppData\Local\Temp\n8793\s8793.exe" ins.exe /e11967292 /u5280fe20-efa8-4c56-acec-17bc0a000013
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 4468
      2⤵
      • Program crash
      PID:3456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 656 -ip 656
    1⤵
      PID:4624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\n8793\s8793.exe

      Filesize

      269KB

      MD5

      ad76cab590ec4c1d3008589d2d2eb052

      SHA1

      3fd9b837fd4a078411c0958a41b1adb321e1016a

      SHA256

      a2111f7d4b36800e840b63573fcb044ea18fb4bc3fef2b8f2724d0d4b5e6c51a

      SHA512

      b8f6695a4c4c18046fb3da55f5c6d1fd60b4e90d8952bceb27296da1a522a97a829494bab103375595a599c602d337926270f2422401678af8d5393490e53432

    • memory/3360-11-0x00007FFF46C05000-0x00007FFF46C06000-memory.dmp

      Filesize

      4KB

    • memory/3360-12-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-13-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-14-0x00000000018D0000-0x00000000018DA000-memory.dmp

      Filesize

      40KB

    • memory/3360-17-0x000000001C620000-0x000000001CAEE000-memory.dmp

      Filesize

      4.8MB

    • memory/3360-18-0x000000001CB90000-0x000000001CC2C000-memory.dmp

      Filesize

      624KB

    • memory/3360-19-0x00000000018B0000-0x00000000018B8000-memory.dmp

      Filesize

      32KB

    • memory/3360-20-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-21-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-22-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-23-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-24-0x000000001DD90000-0x000000001DDF2000-memory.dmp

      Filesize

      392KB

    • memory/3360-25-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-26-0x0000000020C40000-0x000000002114E000-memory.dmp

      Filesize

      5.1MB

    • memory/3360-27-0x00007FFF46C05000-0x00007FFF46C06000-memory.dmp

      Filesize

      4KB

    • memory/3360-28-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-29-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-30-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB

    • memory/3360-32-0x00007FFF46950000-0x00007FFF472F1000-memory.dmp

      Filesize

      9.6MB