Analysis

  • max time kernel
    155s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:51

General

  • Target

    2023-08-26_d9d2770471e2425a04d4964b3c777c06_mafia_JC.exe

  • Size

    465KB

  • MD5

    d9d2770471e2425a04d4964b3c777c06

  • SHA1

    f536e2ac736d6e6234325d47344c7a54c997446f

  • SHA256

    1ce393df09cb3bc9154d1060a5461406afaa19040ecff5e737b37379a0db6bd0

  • SHA512

    89b367c8eed02ef2333fcf9a5e65b222de2633ed137d8f3139ede91baf49218b989396ca1108b0c9348150fbeba005c4346148fdfe981743c6392981dd095f6a

  • SSDEEP

    12288:Bb4bZudi79LZdHpd1qyHevU7h+gdhwpxXRmjA:Bb4bcdkLbJd1pZh+gXwpxXRm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_d9d2770471e2425a04d4964b3c777c06_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_d9d2770471e2425a04d4964b3c777c06_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\ABC9.tmp
      "C:\Users\Admin\AppData\Local\Temp\ABC9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2023-08-26_d9d2770471e2425a04d4964b3c777c06_mafia_JC.exe 8A8BED5AB20B6CF941581E9BDDE24E2E6BCCBF5AB79F7F0421172AD052AE9F84667443D93F08116718F6390C870648FCF8D8FD7EA3AB7014A7FB598D8028D4C5
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-08-26_d9d2770471e2425a04d4964b3c777c06_mafia_JC.doc"
        3⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_d9d2770471e2425a04d4964b3c777c06_mafia_JC.doc

    Filesize

    35KB

    MD5

    a6b03fc9e5439b7504ba08010a960962

    SHA1

    e93a74f35ac1ed020158642eb1f2087fd31fc7c6

    SHA256

    b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1

    SHA512

    decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0

  • C:\Users\Admin\AppData\Local\Temp\ABC9.tmp

    Filesize

    465KB

    MD5

    788d3646dd1a51e07358036282bd8d60

    SHA1

    0508ba52b9dda39a95155c4cf6009755610ec987

    SHA256

    c7c3b42692423266defc0ecee0edcacdecb7e6b2514d7029bf91325e865033d3

    SHA512

    42e3e0b503b0676802a2b8d41882ea9f685c7f74af49f7e7f3f407059e97aa38d83229ee3d48125abef156f05cd60634ca78d3b06399b7b0ea4433f7b0aee055

  • \Users\Admin\AppData\Local\Temp\ABC9.tmp

    Filesize

    465KB

    MD5

    788d3646dd1a51e07358036282bd8d60

    SHA1

    0508ba52b9dda39a95155c4cf6009755610ec987

    SHA256

    c7c3b42692423266defc0ecee0edcacdecb7e6b2514d7029bf91325e865033d3

    SHA512

    42e3e0b503b0676802a2b8d41882ea9f685c7f74af49f7e7f3f407059e97aa38d83229ee3d48125abef156f05cd60634ca78d3b06399b7b0ea4433f7b0aee055

  • memory/2732-7-0x000000002FE21000-0x000000002FE22000-memory.dmp

    Filesize

    4KB

  • memory/2732-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2732-9-0x00000000713ED000-0x00000000713F8000-memory.dmp

    Filesize

    44KB

  • memory/2732-11-0x00000000713ED000-0x00000000713F8000-memory.dmp

    Filesize

    44KB