Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 06:54
Behavioral task
behavioral1
Sample
2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe
Resource
win7-20240611-en
9 signatures
150 seconds
General
-
Target
2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe
-
Size
1.6MB
-
MD5
49ed775e66e2cd74be732cc95bab5ef0
-
SHA1
9b10b9e0ec21e85e2c0ec8a07c774488abb58cdb
-
SHA256
3464397fe5b97bef1dedab8818a3f0679d555b3f0264ce6c539f45941f0b5881
-
SHA512
c290e2bdd9e920378a4698b276e3d43269066ce3d157cb5d16562714715abd5e9903218d0160da18ee145621eb597220d7acc4baf1b028f7ddaa6dbb26462563
-
SSDEEP
24576:kEoD7eAzxG0Jc0a1VjXsIQRJ5OTJ7hIVymFNlMtRVblP9PIjo3rSAp0sUPYud9m4:kZzju1VbsIQe/I07SAp0sUPYu7Uo7
Malware Config
Signatures
-
Detect Blackmoon payload 10 IoCs
resource yara_rule behavioral1/memory/1460-10-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-12-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-11-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-13-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-15-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-16-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-18-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-19-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-21-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon behavioral1/memory/1460-24-0x0000000000EE0000-0x000000000109B000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 11 IoCs
resource yara_rule behavioral1/memory/1460-10-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-12-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-11-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-9-0x0000000000750000-0x0000000000768000-memory.dmp UPX behavioral1/memory/1460-13-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-15-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-16-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-18-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-19-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-21-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX behavioral1/memory/1460-24-0x0000000000EE0000-0x000000000109B000-memory.dmp UPX -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WPS.lnk 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe -
resource yara_rule behavioral1/memory/1460-9-0x0000000000750000-0x0000000000768000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeLockMemoryPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeCreateGlobalPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeBackupPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeRestorePrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeShutdownPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeCreateTokenPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe Token: SeTakeOwnershipPrivilege 1460 2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe