Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2023, 18:30

General

  • Target

    70dec1b9bc8804cbfcfa84edc9939f22_mafia_JC.exe

  • Size

    295KB

  • MD5

    70dec1b9bc8804cbfcfa84edc9939f22

  • SHA1

    098a5931ee9d0fe4ea8ed4e53c0997529ade77ed

  • SHA256

    6bcc900513ac32847bcf28f986b44825695f760ba77f9f82bd9cbad558642b0a

  • SHA512

    cbcac425787f3e944d1612ff092f2b683d28ee66f96a3f14744b13143b2658a9f6076a744ca3ef35bb6573901ce2a4e7fd809285a5085d98a1871bbdfe448caa

  • SSDEEP

    6144:LDUKgm4Wiw6pbnyhJZ1uQtv3NxjMjtG6ZLlYZE:LgK7ow6pbnyzlv3NuLZLlYZE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70dec1b9bc8804cbfcfa84edc9939f22_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\70dec1b9bc8804cbfcfa84edc9939f22_mafia_JC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\n8677\s8677.exe
      "C:\Users\Admin\AppData\Local\Temp\n8677\s8677.exe" ins.exe /e10391128 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 4468
      2⤵
      • Program crash
      PID:4340
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3892 -ip 3892
    1⤵
      PID:620

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\n8677\s8677.exe

            Filesize

            269KB

            MD5

            18332589d7068650441ab03e352a3441

            SHA1

            df6c95c22d184cff4003e5048282eb007389b86c

            SHA256

            4b2956d97453ae7889ba67a84c88c3e64f19786c7f871a1e79217e168cbe133f

            SHA512

            6923bf1cbe68508ed146b26ab4ee8f74b6949d5dde2706e7a888ed334f9dde9f659daa5de48b3dbaff34ab46e6a5dbbd4be118f97d31fc25e1d1df2ef2d88f34

          • C:\Users\Admin\AppData\Local\Temp\n8677\s8677.exe

            Filesize

            269KB

            MD5

            18332589d7068650441ab03e352a3441

            SHA1

            df6c95c22d184cff4003e5048282eb007389b86c

            SHA256

            4b2956d97453ae7889ba67a84c88c3e64f19786c7f871a1e79217e168cbe133f

            SHA512

            6923bf1cbe68508ed146b26ab4ee8f74b6949d5dde2706e7a888ed334f9dde9f659daa5de48b3dbaff34ab46e6a5dbbd4be118f97d31fc25e1d1df2ef2d88f34

          • C:\Users\Admin\AppData\Local\Temp\n8677\s8677.exe

            Filesize

            269KB

            MD5

            18332589d7068650441ab03e352a3441

            SHA1

            df6c95c22d184cff4003e5048282eb007389b86c

            SHA256

            4b2956d97453ae7889ba67a84c88c3e64f19786c7f871a1e79217e168cbe133f

            SHA512

            6923bf1cbe68508ed146b26ab4ee8f74b6949d5dde2706e7a888ed334f9dde9f659daa5de48b3dbaff34ab46e6a5dbbd4be118f97d31fc25e1d1df2ef2d88f34

          • memory/4720-144-0x0000000000A90000-0x0000000000ADA000-memory.dmp

            Filesize

            296KB

          • memory/4720-145-0x00007FFAE8480000-0x00007FFAE8E21000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-146-0x00007FFAE8480000-0x00007FFAE8E21000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-147-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-148-0x00000000015D0000-0x00000000015DA000-memory.dmp

            Filesize

            40KB

          • memory/4720-151-0x000000001C090000-0x000000001C55E000-memory.dmp

            Filesize

            4.8MB

          • memory/4720-152-0x000000001C600000-0x000000001C69C000-memory.dmp

            Filesize

            624KB

          • memory/4720-153-0x00000000015C0000-0x00000000015C8000-memory.dmp

            Filesize

            32KB

          • memory/4720-154-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-155-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-156-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-157-0x00007FFAE8480000-0x00007FFAE8E21000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-158-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-159-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-160-0x00007FFAE8480000-0x00007FFAE8E21000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-161-0x000000001FEA0000-0x000000001FF02000-memory.dmp

            Filesize

            392KB

          • memory/4720-162-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-163-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-164-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-165-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-166-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-167-0x0000000001420000-0x0000000001430000-memory.dmp

            Filesize

            64KB

          • memory/4720-168-0x0000000020510000-0x000000002064C000-memory.dmp

            Filesize

            1.2MB

          • memory/4720-169-0x0000000020B60000-0x000000002106E000-memory.dmp

            Filesize

            5.1MB

          • memory/4720-170-0x0000000021070000-0x0000000021170000-memory.dmp

            Filesize

            1024KB

          • memory/4720-172-0x00007FFAE8480000-0x00007FFAE8E21000-memory.dmp

            Filesize

            9.6MB