Analysis
-
max time kernel
250s -
max time network
279s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 03:31
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe
-
Size
462KB
-
MD5
47d7ae58d722d8bb2e4da718a3cdfdcc
-
SHA1
1e92db4f7820c208ae26932f745add30d05fe369
-
SHA256
18cd658b3ad0003b523187cd5e6ae26ccd0b26768b84436274a1fd25bfe1386b
-
SHA512
d3fe1a45ee21b5c6f059ebac2284658ba8a01990fab089836dcac77969efbc3d39751f758f2cb843cde3c911e52ebfd4e97a0bf7ed69ba8af12edc5b58c5dede
-
SSDEEP
6144:zRPu8zwNAZYCZrIik3tHE0ahprsuwVBxm+/glm7zkykV6eb46GgBqysH5f:zJrIik3Pa7rqBD/glYkykYN6Bo9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 650A.tmp -
Loads dropped DLL 1 IoCs
pid Process 1444 2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2548 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2608 650A.tmp -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE 2548 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2608 1444 2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe 27 PID 1444 wrote to memory of 2608 1444 2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe 27 PID 1444 wrote to memory of 2608 1444 2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe 27 PID 1444 wrote to memory of 2608 1444 2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe 27 PID 2608 wrote to memory of 2548 2608 650A.tmp 28 PID 2608 wrote to memory of 2548 2608 650A.tmp 28 PID 2608 wrote to memory of 2548 2608 650A.tmp 28 PID 2608 wrote to memory of 2548 2608 650A.tmp 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\650A.tmp"C:\Users\Admin\AppData\Local\Temp\650A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.exe 1AAE9701B9935991551F363EADF023F0B3DFFD87738C02DC39B3357B21FE881D50B7C3D346379DB67436146ADF5E8B673FDD94F7C38ED139F7397DD3C694BE292⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023-08-25_47d7ae58d722d8bb2e4da718a3cdfdcc_mafia_JC.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD58f74dbe78c38f22236bea2ed8e9f3fd2
SHA1ceb64fbcd068f20c4563ef673dfb81480b514868
SHA256fe6fa0aebe72fd411178775cb1b3b35e4ccc7157ee29df7b7c964061bf7ec716
SHA512469c64762da13934bfe5456f322e94ec37e872d373d2bf16c6526f8317289fe67bd1699ff90afc3c63c08414e653f58a1f551f1bd8da77db34334767b303ba9d
-
Filesize
462KB
MD58f74dbe78c38f22236bea2ed8e9f3fd2
SHA1ceb64fbcd068f20c4563ef673dfb81480b514868
SHA256fe6fa0aebe72fd411178775cb1b3b35e4ccc7157ee29df7b7c964061bf7ec716
SHA512469c64762da13934bfe5456f322e94ec37e872d373d2bf16c6526f8317289fe67bd1699ff90afc3c63c08414e653f58a1f551f1bd8da77db34334767b303ba9d