Analysis

  • max time kernel
    44s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 16:04

General

  • Target

    FB345CA471C5BA5E86F62F15FA3F7B17.exe

  • Size

    100KB

  • MD5

    fb345ca471c5ba5e86f62f15fa3f7b17

  • SHA1

    e2f15273e745384a9c5544d3125a2275dca57164

  • SHA256

    7026f3039dffe9b6274b3bc5bd29ba5399d979c77bf80e20cd1c28965b4a7c78

  • SHA512

    8125e5f2e06212c1841ad5359ed6e7e5c5329784b067e71adc78c668d7101493cf470156d41c2264d6c2baae635b179618041e589e6acb8ebd14a4d105e356ed

  • SSDEEP

    768:5Dea8sjqvNAPLNngBTsvKBljHS/vJsUbKfO2yMMz/C1Yckin:VTjMWLvCBFyyUbKfO2yZz/Cein

Malware Config

Signatures

  • Detect MafiaWare666 ransomware 1 IoCs
  • MafiaWare666 Ransomware

    MafiaWare666 is ransomware written in C# with multiple variants.

  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FB345CA471C5BA5E86F62F15FA3F7B17.exe
    "C:\Users\Admin\AppData\Local\Temp\FB345CA471C5BA5E86F62F15FA3F7B17.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 1188
      2⤵
      • Program crash
      PID:296

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1492-54-0x00000000011C0000-0x00000000011DE000-memory.dmp

    Filesize

    120KB

  • memory/1492-55-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB