Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe
-
Size
464KB
-
MD5
85324725f4c30310caed80ca7c058ccd
-
SHA1
6692167762e4185bb226c5993ac7ccb932caa5d9
-
SHA256
4c98a6239adffb07937c70eacf1f0ea92f788da88322ce4ccdc6010d8cdf76cf
-
SHA512
fb4b94273ad2271de6c4c18488bb59bbdd3a0a2a8a27e9ab637fd4205fa988a73dd1bb1774a8c129278796ce48f0b6644ce835ec61c35d8b1c1ea25165c4cf3c
-
SSDEEP
6144:zRPu8zwNAZYCZrIik3tHOvdnDxILQMhBcR9xhzX0LNtDmJm1oLVbQJeBLFSvSsHd:zJrIik3anW87E5mmU1DTOj9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1444 35B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2948 2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2872 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1444 35B.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE 2872 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1444 2948 2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe 28 PID 2948 wrote to memory of 1444 2948 2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe 28 PID 2948 wrote to memory of 1444 2948 2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe 28 PID 2948 wrote to memory of 1444 2948 2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe 28 PID 1444 wrote to memory of 2872 1444 35B.tmp 29 PID 1444 wrote to memory of 2872 1444 35B.tmp 29 PID 1444 wrote to memory of 2872 1444 35B.tmp 29 PID 1444 wrote to memory of 2872 1444 35B.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\35B.tmp"C:\Users\Admin\AppData\Local\Temp\35B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.exe C0A27D1A7C030E8B62948D0452A66B315FB06F59DA5519E68D367AA6A449F5CED8D82CABF741D4AEDD7279F747A7D17C74996FD0616F64A8EEFCA4DBD2AAD2922⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-01-28_85324725f4c30310caed80ca7c058ccd_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
464KB
MD55bdcf69af794b48ad765ee28fcfb27a8
SHA1f5161a3ae278d1f598548124aac5c4f1d3f8a9ee
SHA256bf20c78674d899034e0a30ba2f1cfe657ea26d55c1faa59a25a0e0d93443850e
SHA512709feb5c36ff9201f3b143d776512fbc4644c88d609f9410cc917b371f25b6cfa1ef3f719ccdc08a32afe4e3cf17ed86cd54703e9bf3a227a06ba45038ad46ba