Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe
-
Size
190KB
-
MD5
5cc4ed37ec099787bdaeb5aac9d85e62
-
SHA1
d3407422a45f46e3ed83f954f223b1988d322cec
-
SHA256
6266c5f61ecc740719be98714c4085c46c84790aacf4e8fbfe09491be749bae8
-
SHA512
2a3e4c3c340a0aa98e406c56b84c51adbbf9b5b10f04c7c9a0ad1299d90bd8a8f96aa6374103bb8eb487c1adde036c40ceae20cc638393184ed6d9d82722e221
-
SSDEEP
3072:cD/LRRwelzjlJlBbZpz9lZoVCVBxuH1KKMuoZvVTDz4CxcUTnEv55bAe8:i/Lgep51PzCAuLyvJDMCNnA55A
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1152 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1096 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe 1096 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3676 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1152 1096 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe 84 PID 1096 wrote to memory of 1152 1096 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe 84 PID 1096 wrote to memory of 1152 1096 2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_5cc4ed37ec099787bdaeb5aac9d85e62_mafia_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\HWID.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1152
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD51bef11116d2ddde4abb6f36573a4dfef
SHA1b8841c617eae8fb1e33f6ad3ec2f54090c5b7717
SHA25662f7a570b60bf74538d703eab9105f622152700dc76793d3cd59eff2a8a11182
SHA512bf2fcd3d1337091e3f5a5b1b01094dc95cec372ef233818493296a9a16f0a9426d4a5477e1a1278eb8f71e54b6481f5b5eae97816c4532c001e1def83444c029
-
Filesize
16KB
MD5b8ce7dafa76e2e7074a0a535b0407085
SHA1746c0fa78cb9ad0ef4152467343b71bd7d4c61d8
SHA2564cb0158e3571583b3bf416ecb31b3e3f1791e862f073414baf7def35efb9c05b
SHA512e4ffc04c31270227143f48704389dd0cac3a36b8244d05fbb50ad348d06223a75f07d2d92e19171a9e00265aac87e6b14a3f624f7ae1b7a2a62a6e12d4809dff