Analysis
-
max time kernel
95s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe
-
Size
433KB
-
MD5
8c5afd97af59dd0be15d48c4b591ad72
-
SHA1
723970f99977606232f76e746c817292a8150107
-
SHA256
fc893e432a67c2fffb7a50d85d25e521563372ec691022283098b1d68e03bc2d
-
SHA512
24a7d2534884e0b194b6f9d35097bba6772e2afa1e23482dc3e6c7285bb28290b21cc17d782a326b8afba195be098bda22759019c292ff49d47a5cdf51100de5
-
SSDEEP
12288:Ci4g+yU+0pAiv+JD30HzXLk5s/n08Ky/lHxXStsu6dvn:Ci4gXn0pD+BiXuiN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 C1F8.tmp -
Executes dropped EXE 1 IoCs
pid Process 1756 C1F8.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C1F8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1756 5084 2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe 82 PID 5084 wrote to memory of 1756 5084 2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe 82 PID 5084 wrote to memory of 1756 5084 2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\C1F8.tmp"C:\Users\Admin\AppData\Local\Temp\C1F8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-09-30_8c5afd97af59dd0be15d48c4b591ad72_mafia.exe D4972ED5124DDFBCB3CFF874439D94E7DFB8BE5196213417F255A816761C75E953E63FFF1CC405B511D96480749BE50D787DF1D1019F5E04F6801EC48B26EF5A2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD54d94967e4a81f6d3cc6d98f64a3b66bc
SHA1354e80e0a0839b4995b5b4f7242142c9694af93e
SHA256c52c3f6d5607d2696d04de1dfc51543ed1228406b274cda551500bc9b4c36f70
SHA512a0d1cb6957d24d3ed422a9745562b1e42cacb2a892c455ca92544044449a4ca68700ca728a8ff837442fd13ec4770a090cb5fa0f18db5f1ac2cbed524db06272