Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe
-
Size
387KB
-
MD5
56ae159db30d3c9e1e05fa5c890df4a3
-
SHA1
582c101e2c2eadcbdc49172d13adbca707aa02c4
-
SHA256
7a87adb381b7e312636e71d63c412c807536e6bc12309101f139d83e9934c389
-
SHA512
5cef420aab2bdc9e9d612d92b964bd9273449c18521952cc9f5c2f0c80b547adff4b791bf6f09459b685e71181dc5e88cbb598ad13e119ce85f3df654eda4620
-
SSDEEP
12288:BqYXje0DF9k64/QSywqP0T8oIN1AHDFhY25fC2WF9sY204P:BqYDF9k64/Q9j28okAHDHY25fC2WF9sp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 512 StikyNote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\StikyNote.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 512 set thread context of 4924 512 StikyNote.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4288 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 512 StikyNote.exe 512 StikyNote.exe 4924 iexplore.exe 4924 iexplore.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3884 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 95 PID 1976 wrote to memory of 3884 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 95 PID 1976 wrote to memory of 3884 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 95 PID 1976 wrote to memory of 3884 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 95 PID 1976 wrote to memory of 3884 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 95 PID 1976 wrote to memory of 4164 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 96 PID 1976 wrote to memory of 4164 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 96 PID 1976 wrote to memory of 4164 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 96 PID 1976 wrote to memory of 512 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 98 PID 1976 wrote to memory of 512 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 98 PID 1976 wrote to memory of 512 1976 2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe 98 PID 512 wrote to memory of 3568 512 StikyNote.exe 103 PID 512 wrote to memory of 3568 512 StikyNote.exe 103 PID 512 wrote to memory of 3568 512 StikyNote.exe 103 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 512 wrote to memory of 4924 512 StikyNote.exe 104 PID 3884 wrote to memory of 4172 3884 rundll32.exe 111 PID 3884 wrote to memory of 4172 3884 rundll32.exe 111 PID 3884 wrote to memory of 4172 3884 rundll32.exe 111 PID 4172 wrote to memory of 4288 4172 cmd.exe 113 PID 4172 wrote to memory of 4288 4172 cmd.exe 113 PID 4172 wrote to memory of 4288 4172 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"4⤵
- Adds Run key to start application
- Modifies registry key
PID:4288
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-03-09_56ae159db30d3c9e1e05fa5c890df4a3_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:3568
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD54e6ae648332976d399d9e08171c8eca6
SHA1dfdbadb13cc1ef1f36db595f979bca8b89a83a69
SHA2569d5d5865481b2ac7b1a57d0f5de0e5d6392d72f51b8ead268a734e1c228a71ad
SHA512aa2535a5ea95ac1b7823833b322d57634e40e8d1c2ff340f97a1c1932746af6650f027e295eac1ae1b268bc4aefd7837c310a6e9e62c5214c088aab0efb787c1
-
Filesize
387KB
MD556ae159db30d3c9e1e05fa5c890df4a3
SHA1582c101e2c2eadcbdc49172d13adbca707aa02c4
SHA2567a87adb381b7e312636e71d63c412c807536e6bc12309101f139d83e9934c389
SHA5125cef420aab2bdc9e9d612d92b964bd9273449c18521952cc9f5c2f0c80b547adff4b791bf6f09459b685e71181dc5e88cbb598ad13e119ce85f3df654eda4620
-
Filesize
387KB
MD550e1a7de0f8e8a03543a61e830d8b004
SHA16fd4949b4fc9b90095bdecd6a605773944ed36ee
SHA256b8c4ca321f6097bc90b7d4b0b942acb21334fd9079feac5eefad18142168e1df
SHA5128d37660b12ef8df0fe9c92145431f2c17140ce53b371298187f1dca2d8b96038e324fc337bc3434d5bc6fcca8de51fcfe7ccafbdebd04f8f4f0b8dfa73d77143
-
Filesize
47B
MD572a392628d7f368bb9bc9689a694f55a
SHA1feacee9c66028a333446f2c968bcb3d567a4033d
SHA256afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd
SHA51276f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e