Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe
-
Size
464KB
-
MD5
17e695d2e8b0fee1a1a882e8897c9eae
-
SHA1
f7cdcf80db386f89ab43c97709aeb5ddd9d9b822
-
SHA256
c1618a816778ccf4dc1bf680d07b00967316d7f895dd397ddf9e0861db595e71
-
SHA512
3e015a561fd8a20fe17bc0344a2acd466a2d779f01f3ce127db62551b448de12da66ee583adefd2ddecd710396e303dcc92b87ef7f1fbe80dec7ff68b422a9b1
-
SSDEEP
6144:zRPu8zwNAZYCZrIik3tHBEhxhEhvnBitiNWyIOcfPAtszHKD8nsH5f:zJrIik30W7QiNWyL5SWQs9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2816 983A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2508 2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2900 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2816 983A.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2816 2508 2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe 28 PID 2508 wrote to memory of 2816 2508 2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe 28 PID 2508 wrote to memory of 2816 2508 2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe 28 PID 2508 wrote to memory of 2816 2508 2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe 28 PID 2816 wrote to memory of 2900 2816 983A.tmp 29 PID 2816 wrote to memory of 2900 2816 983A.tmp 29 PID 2816 wrote to memory of 2900 2816 983A.tmp 29 PID 2816 wrote to memory of 2900 2816 983A.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\983A.tmp"C:\Users\Admin\AppData\Local\Temp\983A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.exe FF65D2BACCCA0BBE9987C6730705204611FCFA4856E18DB5220F3D6576990B6DCFB82D07F5FDA7B4231B69587C4D55961330F640E74406DD6C2C31DA2822CA952⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-19_17e695d2e8b0fee1a1a882e8897c9eae_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
464KB
MD5c5599af13d26aaafb92319a5a612a80f
SHA12242840d6aeea53dae18d50effac69c443c1f298
SHA2568db1fc27fdcb134e22aa8132422dc7fcee764535431a979ddad6fbc80ffe4b35
SHA5121110e1cc4ccc87c6f9f98e5d5b24211c3c707b048c1a28a081aaa1e81e0f441d50a20754e6c6fc16599a272445f54321850e270ee475561067b67236b1fdf583