Analysis

  • max time kernel
    153s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 15:12

General

  • Target

    6B3DB1E9DBA9D6FC75F90D047067395D.exe

  • Size

    99KB

  • MD5

    6b3db1e9dba9d6fc75f90d047067395d

  • SHA1

    f2eb7dac455ffd5d646375be74b75469faeb68ba

  • SHA256

    8592d59a9a2252328e6843f9e8c2a565318a25340cafe0d5a54f4f5440407995

  • SHA512

    a79faf8872a6f846ec5aebb5106e23a306b6b7eff90c52f3766b5b097eaba1e09d9a5c9efc62c86e10010cb99f0bb75529bb4dd0349a1ba286138cb886a00a65

  • SSDEEP

    768:07ea8ZJDLJtAy0uJ16B0zBl3IS/rJUR5bKfO2yMMz/C1Yckin:SaJDb6B6B9pGR5bKfO2yZz/Cein

Malware Config

Signatures

  • Detect MafiaWare666 ransomware 1 IoCs
  • MafiaWare666 Ransomware

    MafiaWare666 is ransomware written in C# with multiple variants.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Modifies extensions of user files 14 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6B3DB1E9DBA9D6FC75F90D047067395D.exe
    "C:\Users\Admin\AppData\Local\Temp\6B3DB1E9DBA9D6FC75F90D047067395D.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2960-132-0x0000000000630000-0x000000000064E000-memory.dmp

    Filesize

    120KB

  • memory/2960-133-0x00000000055F0000-0x0000000005B94000-memory.dmp

    Filesize

    5.6MB

  • memory/2960-134-0x0000000005040000-0x00000000050D2000-memory.dmp

    Filesize

    584KB

  • memory/2960-135-0x0000000005000000-0x000000000500A000-memory.dmp

    Filesize

    40KB