Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 23:39

General

  • Target

    2024-02-22_df8572ddb53c028d2c535bfb49497c8f_mafia.exe

  • Size

    465KB

  • MD5

    df8572ddb53c028d2c535bfb49497c8f

  • SHA1

    394309f9855d35123c46479a0feb246fdc94d82d

  • SHA256

    5de44871c38a499a803841c6e4f826fe50bfb5ac200787d2459bc0fb23e14000

  • SHA512

    852c2d36fbb53b32295bca9dff66fdf6912f5389810502e147216918b047d8eb24947c5b7e87b4229bb1b4a5b86ed6bed4bd5f9e850dfa233c91e5db4a2a0fdc

  • SSDEEP

    12288:Bb4bZudi79L3HFAr8vNoOIE1oQE4yzUgys5A:Bb4bcdkL3HKA1oUg4Cys

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_df8572ddb53c028d2c535bfb49497c8f_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_df8572ddb53c028d2c535bfb49497c8f_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\563E.tmp
      "C:\Users\Admin\AppData\Local\Temp\563E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-22_df8572ddb53c028d2c535bfb49497c8f_mafia.exe AAEC8C4A85289D1C47F389D61012B6998EBD8572EB7E3EF66A05ECA172326E9628325931C26C7C5A634484B087D9C1EFA6F9D383FC607324FC69C3D3D9B11149
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-02-22_df8572ddb53c028d2c535bfb49497c8f_mafia.doc" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_df8572ddb53c028d2c535bfb49497c8f_mafia.doc

    Filesize

    35KB

    MD5

    a6b03fc9e5439b7504ba08010a960962

    SHA1

    e93a74f35ac1ed020158642eb1f2087fd31fc7c6

    SHA256

    b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1

    SHA512

    decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0

  • C:\Users\Admin\AppData\Local\Temp\563E.tmp

    Filesize

    465KB

    MD5

    ffdfad539d36b1a192101f02c4666d08

    SHA1

    246d42ef63dbe111f0d9db7a2a0fcd2b3b6727e7

    SHA256

    5d4edf03a7a71547ada7b016515de163c193a5f8b6fde820a31a57807a06f649

    SHA512

    9a7949cd1ceb6c2c9069f90e591be0e01ad80e77bd4da6d57bdfe61db60fce23e97ce40b620ee4643f8bef91b6c233d2f885b0f66eda53b9fdcc9b6f5a2a6a07

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2468-27-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-19-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-28-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-17-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-29-0x00007FF9E3470000-0x00007FF9E3480000-memory.dmp

    Filesize

    64KB

  • memory/2468-18-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-20-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-21-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-22-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-23-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-24-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-30-0x00007FF9E3470000-0x00007FF9E3480000-memory.dmp

    Filesize

    64KB

  • memory/2468-26-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-14-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-16-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-15-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-25-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-13-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-48-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-49-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-50-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-69-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-70-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-71-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-72-0x00007FF9E5990000-0x00007FF9E59A0000-memory.dmp

    Filesize

    64KB

  • memory/2468-73-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-74-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-76-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB

  • memory/2468-75-0x00007FFA25910000-0x00007FFA25B05000-memory.dmp

    Filesize

    2.0MB