Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe
-
Size
486KB
-
MD5
8f48e64b176f0346d6fde854be12db40
-
SHA1
1c6d82931b09ebf330f09d2189618b9e43035aca
-
SHA256
8659d08eca45ab4754e839a38b7efa9645c95003c4a7656d59af1a1f97369bfa
-
SHA512
4fdeb3bbbea1d8de649479bb853dfc4b24a3a34b988136e1fca71c88c69644d96fd69c5568d4fda75c08c0e46f8c7c9c702ef71c7c8cc9fa839c8abbbfc56ba9
-
SSDEEP
6144:pRPu8zwNZZYCZrIik3tHDvBE+2qgrYhpT00ZiKNvHyyRZiaafI9sH2ft:psrIik35BE+R8YnpiuvroVUt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 EFE.tmp -
Loads dropped DLL 1 IoCs
pid Process 2964 2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2636 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2812 EFE.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE 2636 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2812 2964 2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe 28 PID 2964 wrote to memory of 2812 2964 2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe 28 PID 2964 wrote to memory of 2812 2964 2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe 28 PID 2964 wrote to memory of 2812 2964 2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe 28 PID 2812 wrote to memory of 2636 2812 EFE.tmp 29 PID 2812 wrote to memory of 2636 2812 EFE.tmp 29 PID 2812 wrote to memory of 2636 2812 EFE.tmp 29 PID 2812 wrote to memory of 2636 2812 EFE.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\EFE.tmp"C:\Users\Admin\AppData\Local\Temp\EFE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.exe A6DC6C4705634DC15006334C5E3DF274F37F8B4AB12A52EFA29DB0D54249FADA6C32EE6D70698C5BC0C41718C4AE775EFFF042DBACE7F7B3359B8BC4C21B1B232⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-25_8f48e64b176f0346d6fde854be12db40_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
486KB
MD5c26ba2190578a91c0f3464febb9b8e73
SHA1efc579e16a15f83465d34507ab37e5f91fa87fc6
SHA256efb1ba58289e009999a51879cc0e54a0bf82e60c8c115cb2357107422fdd0438
SHA512fd087c2384f35038b8e1f6e95bbcb24fe74da5026060f610253a944d4e8517edf3d9f055ce2772ad4878e64b2e10142c88cfff38d229399574fd49aed20ee0f7