Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 13:53
Behavioral task
behavioral1
Sample
2024-09-19_a1fba653486ce82f8413ad14676d3a8e_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_a1fba653486ce82f8413ad14676d3a8e_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_a1fba653486ce82f8413ad14676d3a8e_mafia.exe
-
Size
182KB
-
MD5
a1fba653486ce82f8413ad14676d3a8e
-
SHA1
260bcf4a29cdac7a15dd0a32b49822bde4c83011
-
SHA256
ab1980665f6dc02ef0633c7d1726f65b8e17b61df46112029f19dc98f84014af
-
SHA512
ea318549af1caf88c8789881360a8718256b9752642be31ac89cbffb6cc6406bf9a99779894208e117954b562b4a0754433e760b37bfb98c5a3540037d71c3b9
-
SSDEEP
3072:Cu32xlnAm9orZc9cHSBKz5B1clewlcUrXt54EnBm0QeWvu:9mTwSBKzL14hvIEA0Qeau
Malware Config
Signatures
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4000 800 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_a1fba653486ce82f8413ad14676d3a8e_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_a1fba653486ce82f8413ad14676d3a8e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_a1fba653486ce82f8413ad14676d3a8e_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 13322⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 800 -ip 8001⤵PID:3260