Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe
-
Size
462KB
-
MD5
10e47777fc7a496b95fc4da98c7a6b9d
-
SHA1
a66030cb6ab5b63f3fc5511f586a5d336f23afcf
-
SHA256
68fa25343a7fec1f6af683d3e39e1b5496e59bd41670c48420dd82b456b32be2
-
SHA512
e33b689f338ac533d047793386738da8ab47e63db77ff09d19bcb2f23fe68efbac867c037f0fec5f248ed1414dab7ba747ea5e660e68dc496277a8c22a86c4b4
-
SSDEEP
6144:0A4psmawWIrFUJe5X8bbUQLGWTiYxrzCWDAjQAVhyTz1Z9skoMCXFgysGLdwWp2t:0oJe5X8bbGWp0jgZ9qnXrLVoY5i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 4F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2372 2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1736 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1664 4F.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1664 2372 2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe 28 PID 2372 wrote to memory of 1664 2372 2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe 28 PID 2372 wrote to memory of 1664 2372 2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe 28 PID 2372 wrote to memory of 1664 2372 2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe 28 PID 1664 wrote to memory of 1736 1664 4F.tmp 29 PID 1664 wrote to memory of 1736 1664 4F.tmp 29 PID 1664 wrote to memory of 1736 1664 4F.tmp 29 PID 1664 wrote to memory of 1736 1664 4F.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\4F.tmp"C:\Users\Admin\AppData\Local\Temp\4F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.exe CB64AB149099C0ED9FD81CB6161ACB23E3DE8DF586F584C4A4B975EA16F52CCE25FEB6670AA5496FE222C3B8D866AF4456E2FB1EB7ACCFD54FE1C5527CF545CE2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-02-13_10e47777fc7a496b95fc4da98c7a6b9d_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD5e3534a1a7e518b7d9f11a977192fd724
SHA1da4427bf18c99f4fa191dce51f49dd579b255180
SHA256a82207efc7ddc56cd1e0a23cdfe850a238aa4c06c43f4c4e792222ebd2ef4bc8
SHA512aeee09cfc9d53b5be575164636f2febb9b1d200a2b1379e65e7861a6bd840032c6d65721b46147031efa832af92abb8e3e987cbae7624503b70cb0dcb590caea