Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 04:42
Behavioral task
behavioral1
Sample
2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe
Resource
win7-20240419-en
8 signatures
150 seconds
General
-
Target
2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe
-
Size
1.3MB
-
MD5
3bab718d577a60b66fcf421437a24186
-
SHA1
1ade733cd947eda964a4bf6e10f398713bc321cf
-
SHA256
b807c789883ffd0a0b220b4bf214423f33c22d558ce2275b617cdbc8d7af4e58
-
SHA512
dacfe01e7c67dcc6244b0600fafac5bbc9dca7ab5b0491d9735637214f0163941e57d39da2eae8106e170d934882f0c01a32ec8745605c2eeafbfc3e9f93d03d
-
SSDEEP
24576:R1UGLrmwPVsjEkazzCm8pslRI4/iK6LfGJErGCkfp0sUPYud9mj1uRyRsGyz:Ru2jkaqm8pwOOiMeGPfp0sUPYu7UQq
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/1728-2-0x00000000008C0000-0x0000000000A31000-memory.dmp family_blackmoon behavioral1/memory/1728-12-0x00000000008C0000-0x0000000000A31000-memory.dmp family_blackmoon behavioral1/memory/1728-13-0x00000000008C0000-0x0000000000A31000-memory.dmp family_blackmoon behavioral1/memory/1728-14-0x00000000008C0000-0x0000000000A31000-memory.dmp family_blackmoon behavioral1/memory/1728-15-0x00000000008C0000-0x0000000000A31000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/1728-2-0x00000000008C0000-0x0000000000A31000-memory.dmp UPX behavioral1/memory/1728-1-0x0000000010000000-0x0000000010014000-memory.dmp UPX behavioral1/memory/1728-10-0x00000000004F0000-0x0000000000508000-memory.dmp UPX behavioral1/memory/1728-12-0x00000000008C0000-0x0000000000A31000-memory.dmp UPX behavioral1/memory/1728-13-0x00000000008C0000-0x0000000000A31000-memory.dmp UPX behavioral1/memory/1728-14-0x00000000008C0000-0x0000000000A31000-memory.dmp UPX behavioral1/memory/1728-15-0x00000000008C0000-0x0000000000A31000-memory.dmp UPX -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WPS.lnk 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe -
resource yara_rule behavioral1/memory/1728-1-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral1/memory/1728-10-0x00000000004F0000-0x0000000000508000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeLockMemoryPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeCreateGlobalPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeBackupPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeRestorePrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeShutdownPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeCreateTokenPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeTakeOwnershipPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe Token: SeDebugPrivilege 1728 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe