Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 07:47

General

  • Target

    2024-09-28_797fb7ed1b6af3027494b88c1f51fcfb_mafia.exe

  • Size

    414KB

  • MD5

    797fb7ed1b6af3027494b88c1f51fcfb

  • SHA1

    ebb77db042bb034daa7d326bc419dd74c34994f7

  • SHA256

    399e1e8f2f2ed9d7cc57611b74194b850c08b66e1c13d84afc890e215143dc5c

  • SHA512

    4a1af01e9a839b1fdda7233ded2289aec9c8104fe05444130b634a6ef706177689e6c10d8184ad9eb1a6b46bd0484b94d73d8d264d02876bcc16f41d0c926a43

  • SSDEEP

    6144:Wucyz4obQmKkWb6ekie+ogU6BYZpsSet1e8B5TbP4Yl3WMQJm/D7/weILEF9Sfpl:Wq4w/ekieZgU6MrEfTENw/DtILEufpl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-28_797fb7ed1b6af3027494b88c1f51fcfb_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-28_797fb7ed1b6af3027494b88c1f51fcfb_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\6AEF.tmp
      "C:\Users\Admin\AppData\Local\Temp\6AEF.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-09-28_797fb7ed1b6af3027494b88c1f51fcfb_mafia.exe 15BAE8507C1A0EBB88776842B3B17A5F0C1FA39CAB9D8289607F973508955A89B204D646A9303968E358CA2A8303F7B4EE61970BCB8CB4D1CF4BA51DD05138B6
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6AEF.tmp

    Filesize

    414KB

    MD5

    7ebb7b99ba3d6c717d070725632a34c2

    SHA1

    0cccbb12198cc61d300be8b1bb12e2cc451b3bf9

    SHA256

    e7f24c11a8ce5920e6353c0c49f6fe93e734e27f7d511efb42d0a6fa8f9c4262

    SHA512

    6f8c045b185f19fad1d1561ffbc3d5e854320b47945e285f5d471b5480bd0de15fa1530e7b342f88e4fbc5d47d59187ec2ae4c4a4a603c1c711452956f1b7093