Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe
-
Size
387KB
-
MD5
5b58a3b223deb4ab098aa730f7f6768a
-
SHA1
edc2f865920d47c7e5086605aa4fbb69a995f7ff
-
SHA256
bb4ed148080dd24b7efba90bc14e48f4dbc15401ad6d3ba04246a79eece5be55
-
SHA512
884da943ba3bfc9b0a74f6e916e0ecece3a6e219afc9bae291f3b3b3d574de250cf8f7457518ef1f90ba6e5fa28d1d7b3c9988dfc26b11b8dfe2704dbc2b111f
-
SSDEEP
12288:BqYXje0DF9k64/QSywqP0T8oIN1AHDFhY25fC2WF9sD204P:BqYDF9k64/Q9j28okAHDHY25fC2WF9ss
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 StikyNote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\StikyNote.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 3996 2356 StikyNote.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3128 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 2356 StikyNote.exe 2356 StikyNote.exe 3996 iexplore.exe 3996 iexplore.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3208 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 94 PID 2280 wrote to memory of 3208 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 94 PID 2280 wrote to memory of 3208 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 94 PID 2280 wrote to memory of 3208 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 94 PID 2280 wrote to memory of 3208 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 94 PID 2280 wrote to memory of 4640 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 95 PID 2280 wrote to memory of 4640 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 95 PID 2280 wrote to memory of 4640 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 95 PID 2280 wrote to memory of 2356 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 97 PID 2280 wrote to memory of 2356 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 97 PID 2280 wrote to memory of 2356 2280 2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe 97 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 2356 wrote to memory of 3996 2356 StikyNote.exe 99 PID 3208 wrote to memory of 3164 3208 rundll32.exe 103 PID 3208 wrote to memory of 3164 3208 rundll32.exe 103 PID 3208 wrote to memory of 3164 3208 rundll32.exe 103 PID 3164 wrote to memory of 3128 3164 cmd.exe 105 PID 3164 wrote to memory of 3128 3164 cmd.exe 105 PID 3164 wrote to memory of 3128 3164 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"4⤵
- Adds Run key to start application
- Modifies registry key
PID:3128
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-04-10_5b58a3b223deb4ab098aa730f7f6768a_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD51ea512214bb632c1d465708a0a35f65b
SHA1db0286779b9d678a32306fdc13c5f46e8dc7bd43
SHA256fee6a6f44030b20fe935558c4dd7e63643ed978d53c59bf3a6b633b7f7ae5f73
SHA512e8aa0c1a163c6c7b19a270c4bc65dfb72c076eaa71a20b20e84a87d16a3040b84b2d878ac620929174e1c3cad87fff06e083b2e79643238769359b87ffdf448d
-
Filesize
387KB
MD55b58a3b223deb4ab098aa730f7f6768a
SHA1edc2f865920d47c7e5086605aa4fbb69a995f7ff
SHA256bb4ed148080dd24b7efba90bc14e48f4dbc15401ad6d3ba04246a79eece5be55
SHA512884da943ba3bfc9b0a74f6e916e0ecece3a6e219afc9bae291f3b3b3d574de250cf8f7457518ef1f90ba6e5fa28d1d7b3c9988dfc26b11b8dfe2704dbc2b111f
-
Filesize
47B
MD572a392628d7f368bb9bc9689a694f55a
SHA1feacee9c66028a333446f2c968bcb3d567a4033d
SHA256afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd
SHA51276f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e