Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 14:18

General

  • Target

    2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe

  • Size

    433KB

  • MD5

    8ddb1b24a9a18fe0f5eafac0bf642fdc

  • SHA1

    bb9af90e12e565d42acf59f14ba08ed48f88cd2e

  • SHA256

    40cb5f53d84e7c388e3b14d2491f826750a12d909bc9455941e9f81c04d08ebf

  • SHA512

    a0e68f006c9681a662c926005b499cbda1e748645b7a8fe5b768f5126b958222d3f03f10aa63a2d9a40822ff5c7a9ab6d238b15bcbca390dabf5f80603a69929

  • SSDEEP

    6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvLeL17Yic2NNcesEkwXbFthKtkfuxuE14qgS:Ci4g+yU+0pAiv+c78esCpth/MsDzHGn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\B304.tmp
      "C:\Users\Admin\AppData\Local\Temp\B304.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-10-09_8ddb1b24a9a18fe0f5eafac0bf642fdc_mafia.exe F6826A43CD6EB9938FEE5391B9473C71B85D35C046B09D68B86A8B70AC6ABE33D2F11A1191354781AE8C1DEAA562C5C92A746C8131568AFC92FE2597EF676EE5
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B304.tmp

    Filesize

    433KB

    MD5

    7d8865f82515a17ba977b08934b7d7ab

    SHA1

    ade39498c71afa91965bd931aeb9cdcd427deda9

    SHA256

    61bd9b836de3321f4815675745ae5550caae6cb3d7906abd28c05a828a040535

    SHA512

    3f184dc520ee0390731bfbd513b2aeb4fd19f9bf662e36c35de120b483b4843b4f5338d1d9f89e5f7f7b24f181781ec4752deb43d7e1b1a18bd947d17151ab51