Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe
-
Size
433KB
-
MD5
f1d11458bf9c136255a73b193190b599
-
SHA1
dae5025de9e81e35e9a328c3090aac975261290b
-
SHA256
fd7218b81b0cca78ba001b7762d9dbd0643c9d4682aa390a3b93c61a9f663ac7
-
SHA512
f076b8de67db6b19966a577b9042f07cfbac8d8fb00d3bebdf18708e6de44cad647a1e5f752092544d37b175dc1212ff9bc53f17b15284e7b43881d40827ac98
-
SSDEEP
12288:Ci4g+yU+0pAiv+BSwcCtiBVGZ3kA5qEa0pn:Ci4gXn0pD+SCU6L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2544 CEC4.tmp -
Executes dropped EXE 1 IoCs
pid Process 2544 CEC4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2364 2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEC4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2544 2364 2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe 31 PID 2364 wrote to memory of 2544 2364 2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe 31 PID 2364 wrote to memory of 2544 2364 2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe 31 PID 2364 wrote to memory of 2544 2364 2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\CEC4.tmp"C:\Users\Admin\AppData\Local\Temp\CEC4.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe EDE86C3274DB065B8A193526B8707899A1014079CB3928BF7D37A5670B8E90DB50302D025BE52869CC9F00B048FD9A03618EA8591DC1E0DEA72D7FB4E1C3C80A2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5c01c3f2adc03cec1884339d5c4cb833f
SHA1d08c5d8cc78b8a27fa3d8f560b5ebf87d7e965e9
SHA256761b0ce50112fc8a13967e8948bc8c46bc7f79ccb03d7dd73a9351b1f30eba68
SHA512d46049cfa299fcc7f47f766d3cc6a8e1752961d56b7f803ac444a78bef5bc1a052411df7b0acc96e3dbdca9b13c92e01db157a7cebf5180811cc053d00b5b70d