Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2023, 15:28

General

  • Target

    2b97cbe9755b123e26c0904b9b668a84_mafia_JC.exe

  • Size

    189KB

  • MD5

    2b97cbe9755b123e26c0904b9b668a84

  • SHA1

    fbe5e0b1e19931e0a7b9e0c87d6bbf0c63d7c471

  • SHA256

    498eca7b6895533bfe4d6eb3132d5c8f3188ec13756bf20a79b5eada2c916291

  • SHA512

    6f87b741acfc76d23fa68467968fa189bcd14f70918c99c4eb8ca0410f7554bcf0e2b2a80a78ae760987ce37587808a1e8f732dc9e0913fdad4b3ed3eb591455

  • SSDEEP

    3072:lVkukYegjaTKChZJ2c7UTyE0HUTdlsBib/BOVLiNhx9/cySHgGtbgX:Aukqenv1ZE0Hswib5OghxehV1g

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b97cbe9755b123e26c0904b9b668a84_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2b97cbe9755b123e26c0904b9b668a84_mafia_JC.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3392
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\HWID.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:4612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:3684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\HWID.txt

      Filesize

      271B

      MD5

      d8113e67552e5dbc234a129b3848f33b

      SHA1

      998a3a9803a1ec64e58e5d31ab8dda3e8baff88d

      SHA256

      f533e2ff2926a17a47e67b288946c559ce0b3b1587f34be7f577a44529cd3b35

      SHA512

      b9b62e88d42deb7b0f44a006a37f513a01871825f74e73ab872305a8be4fefc0e7842cedf7bbba4d1b5f7da4af7780066b96d4fce341843f54f9acbda0cae2b8