Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 17:25

General

  • Target

    2024-05-07_865a2c116652b7856857732c181693ff_mafia_revil.exe

  • Size

    14.4MB

  • MD5

    865a2c116652b7856857732c181693ff

  • SHA1

    cf4a02c5a78657d67984b09cccca93ee8d1ddd92

  • SHA256

    673aa85cb6448f7169724bce79a7eb418306b97acc4e5fa0f98ad6c6772a7707

  • SHA512

    8ea89c29804a469c50e16b4a167a1e7d2c13e3dad2684255edf6f1cc1afe4e5f6dd8eb31673e1151439d26169615f6b7efe8c99e66c839eef56e0d76509b38b1

  • SSDEEP

    393216:1VyxYtON/uEoo9VvHO3/M/bZIo07opsu30d2N5cj8gwEYXvx1YHjxvmdqz+GtxAO:1EOtON/uEoo9VvHO3/M/bZIo07opsu30

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-07_865a2c116652b7856857732c181693ff_mafia_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-07_865a2c116652b7856857732c181693ff_mafia_revil.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1480
      2⤵
      • Program crash
      PID:2920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 4424
    1⤵
      PID:1428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Pandora.ini

      Filesize

      19B

      MD5

      3f8f9b9de078b663a74c860f4f08f9a7

      SHA1

      40d948b6c6f17e67bd561c6544ff421c5e81dbbc

      SHA256

      f389de4738326264abbb27bc27ad4510373ea9ba37785acbd2736fadb56e0bd4

      SHA512

      c88777ec5e6582ded83102fdf8ae8c44e801cc4b1a4dd0a529a9c6c39c51a7c626f6ea620fae1a58e7cd1807b994b4cee9b73d5686d70a9f9573ff48cffdf644

    • memory/4424-15-0x0000000007F50000-0x0000000007F51000-memory.dmp

      Filesize

      4KB