Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe
-
Size
433KB
-
MD5
8ddb1b24a9a18fe0f5eafac0bf642fdc
-
SHA1
bb9af90e12e565d42acf59f14ba08ed48f88cd2e
-
SHA256
40cb5f53d84e7c388e3b14d2491f826750a12d909bc9455941e9f81c04d08ebf
-
SHA512
a0e68f006c9681a662c926005b499cbda1e748645b7a8fe5b768f5126b958222d3f03f10aa63a2d9a40822ff5c7a9ab6d238b15bcbca390dabf5f80603a69929
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvLeL17Yic2NNcesEkwXbFthKtkfuxuE14qgS:Ci4g+yU+0pAiv+c78esCpth/MsDzHGn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2612 B304.tmp -
Executes dropped EXE 1 IoCs
pid Process 2612 B304.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B304.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 2612 4960 2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe 83 PID 4960 wrote to memory of 2612 4960 2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe 83 PID 4960 wrote to memory of 2612 4960 2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe F6826A43CD6EB9938FEE5391B9473C71B85D35C046B09D68B86A8B70AC6ABE33D2F11A1191354781AE8C1DEAA562C5C92A746C8131568AFC92FE2597EF676EE52⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD57d8865f82515a17ba977b08934b7d7ab
SHA1ade39498c71afa91965bd931aeb9cdcd427deda9
SHA25661bd9b836de3321f4815675745ae5550caae6cb3d7906abd28c05a828a040535
SHA5123f184dc520ee0390731bfbd513b2aeb4fd19f9bf662e36c35de120b483b4843b4f5338d1d9f89e5f7f7b24f181781ec4752deb43d7e1b1a18bd947d17151ab51