Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 19:51

General

  • Target

    36a10d7ce157607875309bc9995258555b0f05862637bb2134abea22be1d0ab6.exe

  • Size

    12.7MB

  • MD5

    8348ef459bf80c77dbb19b46b8c0b8ad

  • SHA1

    5d90fee216c24f5ed398d037fffc27147f8a89d8

  • SHA256

    36a10d7ce157607875309bc9995258555b0f05862637bb2134abea22be1d0ab6

  • SHA512

    e8b3f506a72a14adf52f3fe29a87f4db5078dda2aa857deefc6f189b3d1584eaa85c4eb2c4a23432c6c1528cba152ecb3e4b275aa7eeebf4ac9a413d1d8a32dc

  • SSDEEP

    196608:LDBz0CUs3H74jT8vlJ2o+DE6QIwF9z0dUdqc+Y5NHT:LDzU84aJQQIGoGYc+Y5NHT

Malware Config

Signatures

  • Detect MafiaWare666 ransomware 1 IoCs
  • MafiaWare666 Ransomware

    MafiaWare666 is ransomware written in C# with multiple variants.

  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36a10d7ce157607875309bc9995258555b0f05862637bb2134abea22be1d0ab6.exe
    "C:\Users\Admin\AppData\Local\Temp\36a10d7ce157607875309bc9995258555b0f05862637bb2134abea22be1d0ab6.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4812-132-0x00000000009E0000-0x0000000001690000-memory.dmp

    Filesize

    12.7MB

  • memory/4812-133-0x0000000006700000-0x0000000006CA4000-memory.dmp

    Filesize

    5.6MB

  • memory/4812-134-0x0000000006060000-0x00000000060F2000-memory.dmp

    Filesize

    584KB

  • memory/4812-135-0x0000000006030000-0x000000000603A000-memory.dmp

    Filesize

    40KB