Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe
-
Size
462KB
-
MD5
c95ca78ae7cc930ac3dfc24b93bb90f4
-
SHA1
0c001143a6e3a46093e8523d9a07c5867056a2a8
-
SHA256
42fbd0e2cd652695ad5efd5744c73deef1fdfb132ac0432184f64517a4e7b82d
-
SHA512
eb46bf583fc96c8bb68c86504cd9ef8ba07695c8f7450e81818f67436ef055fd3c551c928016e1e64017a3c33ad2d6836794a10e7f5237003a8c8384e4fc757f
-
SSDEEP
6144:0A4psmawWIrFUJe5X8bbUgduzqlq5KL85nnuMJHXooWpUDXNk+cRzAB0ZFsHZi:0oJe5X8bQzOqAuuMFXooWixk+cRlU5i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 1748.tmp -
Loads dropped DLL 1 IoCs
pid Process 2216 2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3036 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2052 1748.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE 3036 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2052 2216 2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe 28 PID 2216 wrote to memory of 2052 2216 2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe 28 PID 2216 wrote to memory of 2052 2216 2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe 28 PID 2216 wrote to memory of 2052 2216 2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe 28 PID 2052 wrote to memory of 3036 2052 1748.tmp 29 PID 2052 wrote to memory of 3036 2052 1748.tmp 29 PID 2052 wrote to memory of 3036 2052 1748.tmp 29 PID 2052 wrote to memory of 3036 2052 1748.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\1748.tmp"C:\Users\Admin\AppData\Local\Temp\1748.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.exe 6B0D9ED7C06923D690F7D64840F2A42DABE8D308EBA6AD8F7A9DED3EE0E5F5ABEFE53B428FDD9A37E30CAD5B0D90AEF1A7B49EF665681A663B7B879D9186C7872⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-02-04_c95ca78ae7cc930ac3dfc24b93bb90f4_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD53c53494aab7920d3a66e2ddf54be8b60
SHA10fcf42fb567290a97000a5e9c3f78441a5a40100
SHA2567c32e60bf6d5c4bf3e98640a42a7a9fe606f1f8036cdcad5c92ed71631f4b530
SHA5128d2005c48d8c72a2562bed8e5431cc4a8caf02cae1ed16309900e6140989cd2e37a6b14d26ae3ffc6ec2db69780c18db46f2067295668454a0e86f312cdf8565