Analysis

  • max time kernel
    124s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2024 07:35

General

  • Target

    2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe

  • Size

    395KB

  • MD5

    5931e1ecebc9f9dd7b5134f870814506

  • SHA1

    33b39356f906f7f7340e21d280c918bb3383057f

  • SHA256

    51d7a3bb0dd46fbb55f2ad4aca07e573b53a588bfc41ca7620cf57e5730939cf

  • SHA512

    6d011b97300d21acf0bcce247dcc23bcc73cfc1f9a47e69621b75b3bbb962faa46ecedde4058d9acaab6bc2a937f90a2e72383747a8d2466c195559114f23f6f

  • SSDEEP

    12288:PqYXje0uF1k64/QSywqP0T8oIN1AHDFhY25fC2WF9sK2d4q:PqYuF1k64/Q9j28okAHDHY25fC2WF9sN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:1664
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
      2⤵
        PID:2300
      • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe
        "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7efeeb158e4ef0dc1a50dbd1535bf7bc

      SHA1

      d5c2491004396fea261c7d9ad59300e991d48d71

      SHA256

      e2899ebe1d0b0d69f1264ce70ec1ca095670d632cc7dd575488effe74ce3a9c1

      SHA512

      90f1d5ed2e2b28637620710dfbaca229cbcf68bd656c33586dbb629099084e6c38fe763de8c0222a818c66a60fe1521561bf086533fad4770f90ef937a05ad4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e24152d037f1ab9f3c3d2c2a811b9969

      SHA1

      f22a51051c7d36abbbd69e969ea7cd2d4b69f1a5

      SHA256

      ef75ee356d7b42280522d10fa8ce67c5e1d8a61a6d0114901d56fb236bd7ce69

      SHA512

      ec0d4ec8c9d15666b54b69bc38b6a56a0847d47e7d5b6b594168bf813d719885730d57b26060d0f6c30cf64272e9ee4a6d9c32cd92af898a245156ac53e08926

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b2fc8d4e142f6ac8a663e986d1664298

      SHA1

      05028c0144326e02b4164d8819bdffb06658e5a8

      SHA256

      c43750b5ef92cef206b34b470e3c1de45d7da50d352b41b2671050de63d67ee3

      SHA512

      8ea4ed7a3df4775d77255e9e58f4239ced30813f636914e2d342584be18023cbc46c668e4741906e7bd7ef767c01e520cc4dc1ae394b53af62fd16c7a7ff71eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      acbde9c24f7cd3c47ca865c2eb53965b

      SHA1

      b32519c1dfa9e42ab2a4d9f3ece95c948d64060b

      SHA256

      6be43eb7354b02eeb848c799fd72ce128a02567b39c3530271c33df366b299c8

      SHA512

      f03d27e21bac56b70e83ded5bdaa0b9f0c28d786d45c76b676585e4e016f63a6870f229c0e62c6fd21e6edcb5cf5ebcc0bb889376bf87cd4b73deb55597c2931

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5316bdf88e90ff364dae4c022b748419

      SHA1

      b4cf76892417877a7d4a83b258afc4437aa51f91

      SHA256

      d4dc4f365ab2d3b1852bdbebf4711a17d723c7a7bf909edea7915b0fe1f97a49

      SHA512

      e1b152a76461051416a257310bcea3530100aeba37dabd273a8f016e7811bf6529f63309dd97e55cbe0c4834f5226b4e7b4e540c3696561b5dd2f26ee8466872

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3f83ed37a051f8e329daa9139a4bdbec

      SHA1

      ee81cc160464942036d56fd722e904ada8cc337e

      SHA256

      f98819793e55f6a71ed22bbd41d6dc6d0c4c06c803f80fccdfb1672c98ee7a4d

      SHA512

      8ecc39f1edb75fbc9b20da2cd5eb73def08334e98191ffe7a2c2452cfe86dec1a05518bd4f8cd2fac1c6a354194ef8bbf048755b087fdf7519c5ff5c4070d35c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6a74669f6833744fa738797a41a59c37

      SHA1

      1554cafd002ad5657f27e3992c70b8e59599ce0e

      SHA256

      4694dd060a109b0a5219eef59f93324cf305049ffb9a5ed5bb8d29bd8b18cb35

      SHA512

      57d962c3aaa27a3895964e6f46d3422df5d7942bb31ea9100033f8357d75e0fb633c4c9b917df9b2fe338fd948d5477b14cbb297ebecfba9d07c1cc6b9ca096d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6cb09b8cf8289e6f7bab72533e82871b

      SHA1

      c83ec7668b24b951f6e2b8115bd4f740aeabbd7d

      SHA256

      144c8cba31b7df0c8fbe0a5780c14a773a9bdd5757320322794de1e408d0c65e

      SHA512

      1f4f293d838528dc0165a611fcee409be6b85e59c3f4ea61c1cc7c264a1754851976734bcc521030aeae9bf5de3d7258cd4b5d8729988eee5da0344fd2e6417c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a6a41244f0cf07fb5c47af9629b6b411

      SHA1

      9c370997889342caefe2c0c0872102bc0b6518c9

      SHA256

      6c6327ee8d0c41a74c50ae3fa5a194513f2461c199bc38c3eeb21fe6dd5404c6

      SHA512

      d3238fa86406d06c663ff69cfd17e30e1ea3bb01957d0a4138cbbe924e6220f10f3d1148e9854062a861557e8bff277136b3aa503ea4b8c90307b87f17f8aef1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f9a2c170f229534a264fd24247313ce7

      SHA1

      91ff07208ba923bd422a2fe739c26d7a4cdb2888

      SHA256

      3bf8c7b73864859a871f60cbc9fbb5bd0f1f8c54b374d3c501b3d2db0713c7d0

      SHA512

      9a9e08f94f30f40e0c732942ea141c311bbf0302133bb0a99c6234fa282c508ee4a369c2400d1794216710780178f366a8a90f9e73019fb4b2b4858cbcb5c051

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7dfe3b673265c22aa84f16a5691479cc

      SHA1

      961f413828826a8b991ffb9fd853c029329a7e91

      SHA256

      b93591f3ccecdeebd9e18297d3c09efa4ac7d5eda3714cce715bc7655adcd649

      SHA512

      ded981a185932c056adc63a8b212ba11c1dd45b43615c2512c1edd13f524188c5ecca2e1d84da82dd8138ab615466a9da2d45fdb4ac62302872d561b16059182

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      19a116a9249b8a9309d4dce4cd8d23fe

      SHA1

      edb7458262dae0474733429f7fec9787105d07ab

      SHA256

      2e958cb2fcc31bf8ecf299402eb96ba3ed1b09baf4cc543da9d09223b584c807

      SHA512

      68caff7364f53b73ffdfae0cbca71aaa735f97a78316b00522e0aa70c53f3b6e209a71c7322b29c4c412730d5d8c9d8fd158940467db9512b4665c67c18d5171

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8b60960699c6110f0a956c5c52c9b886

      SHA1

      9efaf505b2de3405fe81e0347d79e07ce7508b26

      SHA256

      134a7eaafa3dc3d882544056acfa01b203e2281a38e8285b09a55f7214c6c518

      SHA512

      94f0d245ca325a622941d394fd65808b130fc90e7842ccdb7fe78e11673da17e93c2f48f2f8398ca45151902a65a6afacbbaf81a799164daf9e741db7fc5d524

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b37e891f8d92230f6c26e9178aaeaaf3

      SHA1

      841a1657b49d253086bba76b728e237fbd3cc349

      SHA256

      3d2683276b9bfdd2eb29aebac527a36e631f401e4928caecd586b6f5d0c35352

      SHA512

      2cd0135de1aaf349eefd9b07ceec9ac27e3938a25dd159520ededee99c23afddd229e7f43ba06517b4091cfbed86842dd3fa570dfc316fc557cc38909b2fd026

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f61b06cef9b72261b6d74839644ebcea

      SHA1

      30d9bf75f3381b20ff3a17943a645e5343bb5392

      SHA256

      89b64fe9b5ba75ac15ebb3efb42a4740c967ee304cbb4f26a0afd2e9e2e565f2

      SHA512

      dc88a0e22e07392daac2e96da9a9b38d03a65395e3d039627c11baba762a6105f947b0c9cc9badb91803d81b9884aee4ac69eab1cb1efd86a51b187638d3a4d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      009394ca3e197e51b35667bcd4540f40

      SHA1

      4f2b739c1e1411ad8f524549bdb7ea4e8281e33e

      SHA256

      033c4c0e02fdc9bc373c64ea255952967698e580d575a5c008c99e1c5ad945df

      SHA512

      2a3a32aed6f318da770ff52def5f3b19c82acf73b519c03f001f6229066b401f9fda2658eb1608e2418822c2ea0b4e95c594e536a13b904ce77dcfc07d0f32c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3de2244d2b55b90f8553e46ca4456d65

      SHA1

      a54c0d48195bb0c5b5d1192dd85b91cba0401834

      SHA256

      ac3fc70fcbe548b8e96ff25dec37c74d1acfcf34dab998e6403e14c717df37ed

      SHA512

      6bcc2bfdfc7406d0c7b1d66ba778834d199188803bd55f972630132034bfb6e1c181c5cf6f5ebc54f3dac18e772e482eaed1615b052c59976ecad6ba6d2a9086

    • C:\Users\Admin\AppData\Local\Temp\Cab45F7.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe

      Filesize

      395KB

      MD5

      5931e1ecebc9f9dd7b5134f870814506

      SHA1

      33b39356f906f7f7340e21d280c918bb3383057f

      SHA256

      51d7a3bb0dd46fbb55f2ad4aca07e573b53a588bfc41ca7620cf57e5730939cf

      SHA512

      6d011b97300d21acf0bcce247dcc23bcc73cfc1f9a47e69621b75b3bbb962faa46ecedde4058d9acaab6bc2a937f90a2e72383747a8d2466c195559114f23f6f

    • C:\Users\Admin\AppData\Local\Temp\Tar4738.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Users\Admin\AppData\Local\Temp\setup.tmp

      Filesize

      47B

      MD5

      72a392628d7f368bb9bc9689a694f55a

      SHA1

      feacee9c66028a333446f2c968bcb3d567a4033d

      SHA256

      afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd

      SHA512

      76f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e

    • memory/2260-496-0x00000000757D0000-0x00000000758E0000-memory.dmp

      Filesize

      1.1MB

    • memory/2260-20-0x0000000000BF0000-0x0000000000C5B000-memory.dmp

      Filesize

      428KB

    • memory/2260-16-0x0000000000BF0000-0x0000000000C5B000-memory.dmp

      Filesize

      428KB

    • memory/2260-21-0x00000000757D0000-0x00000000758E0000-memory.dmp

      Filesize

      1.1MB

    • memory/2628-19-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2944-0-0x0000000000FF0000-0x000000000105B000-memory.dmp

      Filesize

      428KB

    • memory/2944-15-0x0000000000FF0000-0x000000000105B000-memory.dmp

      Filesize

      428KB

    • memory/3040-7-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/3040-4-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/3040-2-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB