Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe
-
Size
486KB
-
MD5
cea015d550a294698024f588613ab14c
-
SHA1
16b8ba054d64fa2202836af32031b7fd1959613f
-
SHA256
795eef6dee8c60b48ccf89081f5cf9f48b54330e74a900cb81bcd9ee9648b539
-
SHA512
3ca7d6e8c4cbfae35a0d6f23fb1ab310e26b110484038ab0973c8a5bd237723a23128b47c95a401b76ffa933e5eb31ef39cfb90889662271504f33d039b8943d
-
SSDEEP
6144:pRPu8zwNAcYCZrIik3tHDvBE+2qgrYhpT00ZiKNvHyyRZiaafI9sH2fw:pUrIik35BE+R8YnpiuvroVUw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2100 A5D.tmp -
Loads dropped DLL 1 IoCs
pid Process 1708 2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2744 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2100 A5D.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2100 1708 2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe 28 PID 1708 wrote to memory of 2100 1708 2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe 28 PID 1708 wrote to memory of 2100 1708 2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe 28 PID 1708 wrote to memory of 2100 1708 2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe 28 PID 2100 wrote to memory of 2744 2100 A5D.tmp 29 PID 2100 wrote to memory of 2744 2100 A5D.tmp 29 PID 2100 wrote to memory of 2744 2100 A5D.tmp 29 PID 2100 wrote to memory of 2744 2100 A5D.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\A5D.tmp"C:\Users\Admin\AppData\Local\Temp\A5D.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-26_cea015d550a294698024f588613ab14c_mafia.exe 265F39D02BBA8A0A5FE71E641C7AEA7281FC0335E816F1AAA35B74554143F382D82D53E2173BC9EBE2D4B4C2FA97FDE94587218D475279BB1FC09A9BE04EDF562⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-26_cea015d550a294698024f588613ab14c_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
486KB
MD551ef9f6a4b185c41a59be6c78e44067b
SHA15ee17922319d237c54447f89636b37adda9edc0f
SHA2568e4a465ddf05f612da64aa5e02e6b8f555795613c86acb80a7d427d9a479230e
SHA512e952f1ca02dce5ff297a67dd44ee2d69f579ebfe3d336140bbcc3fb32aded592bc174d9ca7840e8466065ac4deb0665f78840d6e3309001b41fa5549b3be4b88