Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 10:48

General

  • Target

    2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe

  • Size

    486KB

  • MD5

    8f48e64b176f0346d6fde854be12db40

  • SHA1

    1c6d82931b09ebf330f09d2189618b9e43035aca

  • SHA256

    8659d08eca45ab4754e839a38b7efa9645c95003c4a7656d59af1a1f97369bfa

  • SHA512

    4fdeb3bbbea1d8de649479bb853dfc4b24a3a34b988136e1fca71c88c69644d96fd69c5568d4fda75c08c0e46f8c7c9c702ef71c7c8cc9fa839c8abbbfc56ba9

  • SSDEEP

    6144:pRPu8zwNZZYCZrIik3tHDvBE+2qgrYhpT00ZiKNvHyyRZiaafI9sH2ft:psrIik35BE+R8YnpiuvroVUt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\EFE.tmp
      "C:\Users\Admin\AppData\Local\Temp\EFE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe A6DC6C4705634DC15006334C5E3DF274F37F8B4AB12A52EFA29DB0D54249FADA6C32EE6D70698C5BC0C41718C4AE775EFFF042DBACE7F7B3359B8BC4C21B1B23
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.docx"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.docx

          Filesize

          21KB

          MD5

          7079891932a64f097abafd233055a1e9

          SHA1

          246d95feafe67689d49a5a4cadba18d3ac1914e5

          SHA256

          c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1

          SHA512

          6e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a

        • \Users\Admin\AppData\Local\Temp\EFE.tmp

          Filesize

          486KB

          MD5

          c26ba2190578a91c0f3464febb9b8e73

          SHA1

          efc579e16a15f83465d34507ab37e5f91fa87fc6

          SHA256

          efb1ba58289e009999a51879cc0e54a0bf82e60c8c115cb2357107422fdd0438

          SHA512

          fd087c2384f35038b8e1f6e95bbcb24fe74da5026060f610253a944d4e8517edf3d9f055ce2772ad4878e64b2e10142c88cfff38d229399574fd49aed20ee0f7

        • memory/2636-11-0x000000002FF81000-0x000000002FF82000-memory.dmp

          Filesize

          4KB

        • memory/2636-13-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2636-14-0x000000007189D000-0x00000000718A8000-memory.dmp

          Filesize

          44KB

        • memory/2812-8-0x0000000000E90000-0x0000000000F12000-memory.dmp

          Filesize

          520KB

        • memory/2812-12-0x0000000000E90000-0x0000000000F12000-memory.dmp

          Filesize

          520KB

        • memory/2964-0-0x00000000010B0000-0x0000000001132000-memory.dmp

          Filesize

          520KB

        • memory/2964-6-0x00000000010B0000-0x0000000001132000-memory.dmp

          Filesize

          520KB

        • memory/2964-4-0x0000000000AC0000-0x0000000000B42000-memory.dmp

          Filesize

          520KB