Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 09:27

General

  • Target

    2024-10-01_261e8ac5e72652d17bacc5f202869e15_mafia.exe

  • Size

    428KB

  • MD5

    261e8ac5e72652d17bacc5f202869e15

  • SHA1

    a3355325f594ab59ac6c7139c775e50a2c8a7e05

  • SHA256

    a305f9d281829dec5f6a110cd0d985387c3e2fedf50c7c1ad553f4e5aa56118f

  • SHA512

    fc71a9aabd24aabf53b5b650358a98a9bd40eb6ebeac1b3bc9504ab078fac6237aae687335c7e17b5e624e7a3265947e2428b6497fd45faeccbefeb89f0b2ee1

  • SSDEEP

    12288:+O4rfItL8HPpzj8zAsxTdeFnl3TfWNhy7:+O4rQtGPecsx5eFl3r4y

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-01_261e8ac5e72652d17bacc5f202869e15_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-01_261e8ac5e72652d17bacc5f202869e15_mafia.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\E292.tmp
      "C:\Users\Admin\AppData\Local\Temp\E292.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-10-01_261e8ac5e72652d17bacc5f202869e15_mafia.exe 117596DEDD4CD2E6C807654CBCF2C72D075BA5EB8EC5C332CE74C7A5BE5D142D45075855C60A9521B6CA1AD94778D02BD86F6BEE072E2ACA5070F38599BDC2E5
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E292.tmp

    Filesize

    428KB

    MD5

    abc4454a27d94586eabfd513d2f68dce

    SHA1

    bf462d3b456ef6406568386ac89dbf62d8d829ed

    SHA256

    5fc435037ebd423db710e0e1e7e0265f06a9e882dc9395d4de19f4f2c74c2329

    SHA512

    7fc0646fd1aff36cf8de63e4af439e1edf6eddfa4cc0f8f10430e9b71e37a6aa45122a08a5aa03b45aea348f8b92ca5853c0ba82bd6ae5b393c4e86328996e85