Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 13:03

General

  • Target

    2024-04-22_019a793ac367de52919c5d8bc57bfb95_mafia.exe

  • Size

    462KB

  • MD5

    019a793ac367de52919c5d8bc57bfb95

  • SHA1

    2ada299bc00362bacc362376d890ff98de8ce755

  • SHA256

    ce107c4ef89aacc0e21f7eba2703b210807ca64ad8a36c05fb4f988a26641901

  • SHA512

    8c365358a3190e800b990fed1c3986a712c8be3a95d34d6395307a4b08ea7ca8f5c0b52aa0de330118582922831b37e88fc57f13ed1754271d2738dbbba82567

  • SSDEEP

    6144:zRPu8zwNAZYCZrIik3tHSvkmvcJI46HxGORc5IQ/72GMGBpVix9JsH5f:zJrIik3VacKHWVadu9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_019a793ac367de52919c5d8bc57bfb95_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_019a793ac367de52919c5d8bc57bfb95_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\FC61.tmp
      "C:\Users\Admin\AppData\Local\Temp\FC61.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-22_019a793ac367de52919c5d8bc57bfb95_mafia.exe 7533F5AD42F7603DA34670348C8BD568828F20B24410BDB4DDD69DDB9723DF593480D5A53EA68239528CE3124EAD6774168CE01AD454CCD782A10BF1C8133C38
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-22_019a793ac367de52919c5d8bc57bfb95_mafia.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:5008
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2392 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2024-04-22_019a793ac367de52919c5d8bc57bfb95_mafia.docx

      Filesize

      21KB

      MD5

      7079891932a64f097abafd233055a1e9

      SHA1

      246d95feafe67689d49a5a4cadba18d3ac1914e5

      SHA256

      c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1

      SHA512

      6e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a

    • C:\Users\Admin\AppData\Local\Temp\FC61.tmp

      Filesize

      462KB

      MD5

      466c5a5698246f8a5ed54799abe22403

      SHA1

      3c78257adc556cc28ff90cac3274e961c2c62618

      SHA256

      0f5c760c2c5d1e1a50de4c608c9976b67756212b992d32ad18cf57d28b6e9a97

      SHA512

      ee1e4df8a4d248611b1e3c630a5e5f94e21c78deb59a94b02241211d3eae342056d8c015194934708a4894007a77063d8757af6aeada850b41027dbf9771a9bd

    • memory/5008-15-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-16-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/5008-10-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/5008-12-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/5008-13-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-14-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/5008-9-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

      Filesize

      64KB

    • memory/5008-11-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-18-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-17-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-19-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-20-0x00007FF9E3B10000-0x00007FF9E3B20000-memory.dmp

      Filesize

      64KB

    • memory/5008-21-0x00007FF9E3B10000-0x00007FF9E3B20000-memory.dmp

      Filesize

      64KB

    • memory/5008-34-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-35-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB

    • memory/5008-36-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

      Filesize

      2.0MB