Analysis

  • max time kernel
    123s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 16:23

General

  • Target

    5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe

  • Size

    496KB

  • MD5

    5f4042ae9b391edfa37aaf676d3f9e34

  • SHA1

    099d76aa06e0e5ea77a74411b94477c5bdbbbe60

  • SHA256

    ca42c200356092d02b3368b96792f0614bc28c7ef100f1f44244d11bb1e9f090

  • SHA512

    df686b832a9e00a2d8fcf6a991cca26ff138c403060ff59779464d6ff3ce45b7032e3481889b72eb79e96c357da84a06d9b1af3f9e00c0ed709a5ea0b0cabf39

  • SSDEEP

    12288:iYYZr6ypt7xGspjYu+Uhx63UXBQddduJDOxeO:iYcr6y/xxsg9BND0eO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\n9196\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\n9196\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe" ins.exe /e 10090416 /u 4d48823a-b8b4-4f4d-b72e-794a5bc06ebe /v "C:\Users\Admin\AppData\Local\Temp\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 4448
      2⤵
      • Program crash
      PID:5004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2660 -ip 2660
    1⤵
      PID:4872

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\n9196\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe

            Filesize

            286KB

            MD5

            c268c937148a046322219b77c5a031b0

            SHA1

            e83ed15c7ef694a2281955a16ffeec0672c56107

            SHA256

            c913057e15ac6b27b204be58b52132d62901746075faa298bb0d08c84958d51e

            SHA512

            44cc28c7a707a37e49afdd23af42a620a8eb78f7b54913b41d8cd5eadd5ea37a6eb16e83d99dd75bbc736e70970a7c94b33d55950ed3dda45302477ea3868a19

          • C:\Users\Admin\AppData\Local\Temp\n9196\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe

            Filesize

            286KB

            MD5

            c268c937148a046322219b77c5a031b0

            SHA1

            e83ed15c7ef694a2281955a16ffeec0672c56107

            SHA256

            c913057e15ac6b27b204be58b52132d62901746075faa298bb0d08c84958d51e

            SHA512

            44cc28c7a707a37e49afdd23af42a620a8eb78f7b54913b41d8cd5eadd5ea37a6eb16e83d99dd75bbc736e70970a7c94b33d55950ed3dda45302477ea3868a19

          • C:\Users\Admin\AppData\Local\Temp\n9196\5f4042ae9b391edfa37aaf676d3f9e34_mafia_JC.exe

            Filesize

            286KB

            MD5

            c268c937148a046322219b77c5a031b0

            SHA1

            e83ed15c7ef694a2281955a16ffeec0672c56107

            SHA256

            c913057e15ac6b27b204be58b52132d62901746075faa298bb0d08c84958d51e

            SHA512

            44cc28c7a707a37e49afdd23af42a620a8eb78f7b54913b41d8cd5eadd5ea37a6eb16e83d99dd75bbc736e70970a7c94b33d55950ed3dda45302477ea3868a19

          • memory/4508-147-0x00007FFE12840000-0x00007FFE131E1000-memory.dmp

            Filesize

            9.6MB

          • memory/4508-148-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-149-0x00007FFE12840000-0x00007FFE131E1000-memory.dmp

            Filesize

            9.6MB

          • memory/4508-163-0x00000000002A0000-0x00000000002EC000-memory.dmp

            Filesize

            304KB

          • memory/4508-164-0x0000000000B80000-0x0000000000B8A000-memory.dmp

            Filesize

            40KB

          • memory/4508-167-0x000000001C330000-0x000000001C7FE000-memory.dmp

            Filesize

            4.8MB

          • memory/4508-168-0x000000001BD90000-0x000000001BE2C000-memory.dmp

            Filesize

            624KB

          • memory/4508-169-0x0000000000B60000-0x0000000000B68000-memory.dmp

            Filesize

            32KB

          • memory/4508-170-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-171-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-172-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-173-0x00007FFE12840000-0x00007FFE131E1000-memory.dmp

            Filesize

            9.6MB

          • memory/4508-174-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-175-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-176-0x000000001FB40000-0x000000001FBA2000-memory.dmp

            Filesize

            392KB

          • memory/4508-177-0x00007FFE12840000-0x00007FFE131E1000-memory.dmp

            Filesize

            9.6MB

          • memory/4508-178-0x00000000200E0000-0x000000002021C000-memory.dmp

            Filesize

            1.2MB

          • memory/4508-179-0x0000000020730000-0x0000000020C3E000-memory.dmp

            Filesize

            5.1MB

          • memory/4508-180-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-181-0x0000000020C40000-0x0000000020D40000-memory.dmp

            Filesize

            1024KB

          • memory/4508-182-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-183-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-184-0x0000000000B40000-0x0000000000B50000-memory.dmp

            Filesize

            64KB

          • memory/4508-186-0x00007FFE12840000-0x00007FFE131E1000-memory.dmp

            Filesize

            9.6MB