Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 15:33

General

  • Target

    2024-04-08_1c7e5df695d650a80853ce7d5ead15f0_mafia.exe

  • Size

    460KB

  • MD5

    1c7e5df695d650a80853ce7d5ead15f0

  • SHA1

    1f04c33b8bded7a8095e0bd12db338f3ed30738a

  • SHA256

    2b15179dbf9404a2effb18ce5e870e562dbf6b6ca65dc770b848d262537e4b9d

  • SHA512

    725fcf6cfc0a5cffd8c2a244e2e0bb936690ae5f4e00b186694ebfdd68114b58e897cf1cd1b7a24d3c57ff2cf4e2f59a32e430effc569e2833f617d042a86278

  • SSDEEP

    6144:0A4psmawWIrFUJe5X8bbU5gkn4+AN2aZ2jACylereGJurBHd07Q7ZK3sHZ:0oJe5X8b4FkYwlereGJurBHtH5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_1c7e5df695d650a80853ce7d5ead15f0_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_1c7e5df695d650a80853ce7d5ead15f0_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\5EC9.tmp
      "C:\Users\Admin\AppData\Local\Temp\5EC9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-08_1c7e5df695d650a80853ce7d5ead15f0_mafia.exe 2CAEDA8945C8D832C67D9E80A6C4FEFB05E4975A31A74E95ECB53435E6F487EEB55D3F6C71E7A5A1528EB851E810EEA357FDBFFC883FBDA2B4F10D59F060F174
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-08_1c7e5df695d650a80853ce7d5ead15f0_mafia.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4676
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3920 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2024-04-08_1c7e5df695d650a80853ce7d5ead15f0_mafia.docx

      Filesize

      21KB

      MD5

      7079891932a64f097abafd233055a1e9

      SHA1

      246d95feafe67689d49a5a4cadba18d3ac1914e5

      SHA256

      c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1

      SHA512

      6e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a

    • C:\Users\Admin\AppData\Local\Temp\5EC9.tmp

      Filesize

      460KB

      MD5

      cf7a8c48aaebfcc215a532019cb52909

      SHA1

      f5f9ba077ab57e04bd6c13913502d45e635d0230

      SHA256

      f3a1fda8135ed053d3f31f20b640c3c8779dffb58f9314a90744097e2ae499d2

      SHA512

      acb72a9e59b397ce40123884fa76da33622ffdefa1c466830c6d3b614e8d6abf8a847a046db2b9cbee74b5cd7ef40c3cf798c6c867b59042d1ca505c24c54617

    • memory/4676-16-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-18-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-12-0x00007FFB97470000-0x00007FFB97480000-memory.dmp

      Filesize

      64KB

    • memory/4676-11-0x00007FFB97470000-0x00007FFB97480000-memory.dmp

      Filesize

      64KB

    • memory/4676-13-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-14-0x00007FFB97470000-0x00007FFB97480000-memory.dmp

      Filesize

      64KB

    • memory/4676-15-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-17-0x00007FFB97470000-0x00007FFB97480000-memory.dmp

      Filesize

      64KB

    • memory/4676-9-0x00007FFB97470000-0x00007FFB97480000-memory.dmp

      Filesize

      64KB

    • memory/4676-10-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-19-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-20-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-21-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-22-0x00007FFB94C70000-0x00007FFB94C80000-memory.dmp

      Filesize

      64KB

    • memory/4676-23-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-24-0x00007FFB94C70000-0x00007FFB94C80000-memory.dmp

      Filesize

      64KB

    • memory/4676-25-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4676-38-0x00007FFBD73F0000-0x00007FFBD75E5000-memory.dmp

      Filesize

      2.0MB