Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2023, 19:32

General

  • Target

    a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe

  • Size

    1.9MB

  • MD5

    a4c4fa2c4783193431ef23b7cf24ba87

  • SHA1

    35970787d49a38684331889adf855b9d6c0c47dd

  • SHA256

    1e7919852e580945155479b817d7f6ad80377f277eba328b7c90013f7cae9b3b

  • SHA512

    6190d32ffd4f28d8361da59a18291994c9584743fb86aa483f0107e0dfca06e2af4615d37fdbaeb8ad0c9b556a9e0ca73ea2790f690459b1cf116906abf723ac

  • SSDEEP

    49152:izX5pRDKnI8dHaPm1iiNU+rMDCgWBqzYU3ytCEzDvEMYiVYiwh+3:izU/sMY2YL

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe
      C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:340
      • C:\Windows\System32\Notepad.exe
        Notepad.exe C:\Users\Admin\Desktop\Rkill.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe

    Filesize

    1.1MB

    MD5

    8d498649c852e56285479359232d3812

    SHA1

    6daf9a7f9a69829c95ab4d84404b559a3254dabd

    SHA256

    fdeb54c00f1f9e9c0c16c2610e82616f7c99ba67555e1ddad3f6faf427bc67a3

    SHA512

    e19803dae3989ca0a090d4e1d09c46537696e084fed2c58e6df4b0f8c1ddf503997310b9445ab2d03c1d4dbfd573e7dbeed99a2f99ec04445b70ab87442af128

  • C:\Users\Admin\Desktop\Rkill.txt

    Filesize

    4KB

    MD5

    56799ba2929d63ab222111992360a8db

    SHA1

    b04406b93b3e205e4df6146753050eab71e8c884

    SHA256

    8db86a1f9f7316c76c6a3eedd52b01b25c53464de82c2c102042f09e3ad5756d

    SHA512

    f25a43b90172de4cb5c65e3e1bd8df81bed23699a636eda1cf4ce60be04676cf53c35128fa8bda333af85d2609e4b69432a30bf35d521cea574acae996797e5c

  • C:\Users\Admin\Desktop\Rkill.txt

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\Desktop\Rkill.txt

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • \Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe

    Filesize

    1.1MB

    MD5

    8d498649c852e56285479359232d3812

    SHA1

    6daf9a7f9a69829c95ab4d84404b559a3254dabd

    SHA256

    fdeb54c00f1f9e9c0c16c2610e82616f7c99ba67555e1ddad3f6faf427bc67a3

    SHA512

    e19803dae3989ca0a090d4e1d09c46537696e084fed2c58e6df4b0f8c1ddf503997310b9445ab2d03c1d4dbfd573e7dbeed99a2f99ec04445b70ab87442af128

  • \Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe

    Filesize

    1.1MB

    MD5

    8d498649c852e56285479359232d3812

    SHA1

    6daf9a7f9a69829c95ab4d84404b559a3254dabd

    SHA256

    fdeb54c00f1f9e9c0c16c2610e82616f7c99ba67555e1ddad3f6faf427bc67a3

    SHA512

    e19803dae3989ca0a090d4e1d09c46537696e084fed2c58e6df4b0f8c1ddf503997310b9445ab2d03c1d4dbfd573e7dbeed99a2f99ec04445b70ab87442af128

  • \Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe

    Filesize

    1.1MB

    MD5

    8d498649c852e56285479359232d3812

    SHA1

    6daf9a7f9a69829c95ab4d84404b559a3254dabd

    SHA256

    fdeb54c00f1f9e9c0c16c2610e82616f7c99ba67555e1ddad3f6faf427bc67a3

    SHA512

    e19803dae3989ca0a090d4e1d09c46537696e084fed2c58e6df4b0f8c1ddf503997310b9445ab2d03c1d4dbfd573e7dbeed99a2f99ec04445b70ab87442af128