Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe
-
Size
411KB
-
MD5
4dd1bcf7803994e0809cc314eccfd850
-
SHA1
fcb68ee7c4f17430eabc1d042369a6423e41ed41
-
SHA256
fe9dc0976660ba103a60bd08bb415bf144ea71c948e0f9b1c301e38c9657045c
-
SHA512
9c0d7819d53e6ce716b612fb6116aa5f28fa0345d5368222a18d9abffe9e9a7f633e4c6e5d5d94cb6325a0eec531a30b592c2eed43fd8b5d45f0b8af75e503d7
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFvFtoIv2GQk+365e5vKEeg5b1d9J1iM6R0wC7OqHI:gZLolhNVyESzd+375CVOb17JZx7OqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2104 B9AE.tmp -
Executes dropped EXE 1 IoCs
pid Process 2104 B9AE.tmp -
Loads dropped DLL 1 IoCs
pid Process 1704 2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B9AE.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2104 B9AE.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2104 1704 2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe 30 PID 1704 wrote to memory of 2104 1704 2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe 30 PID 1704 wrote to memory of 2104 1704 2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe 30 PID 1704 wrote to memory of 2104 1704 2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\B9AE.tmp"C:\Users\Admin\AppData\Local\Temp\B9AE.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-10-05_4dd1bcf7803994e0809cc314eccfd850_mafia.exe AF94D8883C9AD2BE42C58A1442BD2082DF80EC0E26EE2DB18A15D848C36729A5F64812D71879F45598F6BB6E6C84A8BA896959E491DE71670D1EC2714F2B59D52⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5db5ea308bb427ba4a041bb5e274495eb
SHA13270323c704e88126382c3ab1154a6fd3abf7069
SHA256f60e20badd2335f7939949b9eae4a7041b27374f46dbbd2e8525978db6ea36b5
SHA51214dec09ab8539a437611d19996a5485e24ccf2811a9c4f7cbc244a40e3c07b46f8c818d308204d000d2ec6e79ac466b833d45d85f6add1a524bcfbfc934ebbcf