Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 09:41

General

  • Target

    2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe

  • Size

    433KB

  • MD5

    f1d11458bf9c136255a73b193190b599

  • SHA1

    dae5025de9e81e35e9a328c3090aac975261290b

  • SHA256

    fd7218b81b0cca78ba001b7762d9dbd0643c9d4682aa390a3b93c61a9f663ac7

  • SHA512

    f076b8de67db6b19966a577b9042f07cfbac8d8fb00d3bebdf18708e6de44cad647a1e5f752092544d37b175dc1212ff9bc53f17b15284e7b43881d40827ac98

  • SSDEEP

    12288:Ci4g+yU+0pAiv+BSwcCtiBVGZ3kA5qEa0pn:Ci4gXn0pD+SCU6L

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\CEC4.tmp
      "C:\Users\Admin\AppData\Local\Temp\CEC4.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-10-09_f1d11458bf9c136255a73b193190b599_mafia.exe EDE86C3274DB065B8A193526B8707899A1014079CB3928BF7D37A5670B8E90DB50302D025BE52869CC9F00B048FD9A03618EA8591DC1E0DEA72D7FB4E1C3C80A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\CEC4.tmp

    Filesize

    433KB

    MD5

    c01c3f2adc03cec1884339d5c4cb833f

    SHA1

    d08c5d8cc78b8a27fa3d8f560b5ebf87d7e965e9

    SHA256

    761b0ce50112fc8a13967e8948bc8c46bc7f79ccb03d7dd73a9351b1f30eba68

    SHA512

    d46049cfa299fcc7f47f766d3cc6a8e1752961d56b7f803ac444a78bef5bc1a052411df7b0acc96e3dbdca9b13c92e01db157a7cebf5180811cc053d00b5b70d