Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe
-
Size
906KB
-
MD5
05bdb8478c008bd36523d9d503578e9a
-
SHA1
e3e6067bc98a0b552def6c29b00212eedec66906
-
SHA256
d7a10e595e2a57efe9e77aa1110436f29d9890335a8d25b0b0a34dd0f827a289
-
SHA512
18fdbeaeb24c465b2807dac3f20e9264ba05d01abcebcfabb17ed95b0623a471074541eb28520c66a2886d65e13070a1b4a5987d9bb280f0fd73180966c266bf
-
SSDEEP
12288:xUHzKufgk0IpzpXxsPsM+80/9OCOaVLR7g1xGkgBaFSkYu8DU0OYhLu0O49gY4B:SHVfSIpzpBsGACO0LRs1kk6i6uKVOu4B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe -
Executes dropped EXE 3 IoCs
pid Process 3020 minidownload.exe 3972 DownLoadDlg.exe 648 ExceptionReport.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DownLoadDlg.exe File opened for modification \??\PhysicalDrive0 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File created C:\Program Files (x86)\SogouDownLoad\html\images\dlbg.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlico.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_set.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\bg_line.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btn_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\errorbg2.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_close.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\attention.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error2.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_min.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\download.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btns.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket2.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\swfobject.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\down.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\img_exe.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\check.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\errorbg1.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_t.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\progressbar.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket1.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\repair.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\downloader.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\actions.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\settings.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\warning.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\jquery-1.11.2.min.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\crash\ExceptionReport.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\config.ini minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error.png minidownload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000900000002327a-2.dat nsis_installer_1 behavioral2/files/0x000900000002327a-2.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 DownLoadDlg.exe 3972 DownLoadDlg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3972 DownLoadDlg.exe 3972 DownLoadDlg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3020 3680 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe 82 PID 3680 wrote to memory of 3020 3680 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe 82 PID 3680 wrote to memory of 3020 3680 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe 82 PID 3680 wrote to memory of 3972 3680 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe 87 PID 3680 wrote to memory of 3972 3680 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe 87 PID 3680 wrote to memory of 3972 3680 2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe 87 PID 3972 wrote to memory of 648 3972 DownLoadDlg.exe 92 PID 3972 wrote to memory of 648 3972 DownLoadDlg.exe 92 PID 3972 wrote to memory of 648 3972 DownLoadDlg.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-30_05bdb8478c008bd36523d9d503578e9a_mafia.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\minidownload.exeC:\Users\Admin\AppData\Local\Temp\\minidownload.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3020
-
-
C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe"C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe" /Install?status=true&softurl=https%3A%2F%2Fxiazai.sogou.com%2Fcomm%2Fredir%3Fsoftdown%3D1%26u%3D5M778mNuk-IR5IpbEw6j9YpS1Wc4Ved3WXa85rh1XgyheSu4KSc873XX-0eLlV_4F8i1TnLGSv3WCEhQ8gp541fzIsbQqzhWSYgtsYpPEdeVaQV36m8XUwDnxvyjCrmDYWCpkDN0CEiS5mxV4Nz15XXmmtomLEANRjXrf4w8V2BQI45GGymLW2BerAtBedNjguDD3zUoyh0QPeaLH3gS2w..%26pcid%3D-8962761102861935100%26fr%3Dxiazai%26source%3Dtencent%26filename%3DDwg2pdf_Setup_V3.3.5.zip&iconurl=http%3A%2F%2Fpc3.gtimg.com%2Fsoftmgr%2Flogo%2F48%2Fpdfcreator_48x48.png&softname=DWG%E6%89%B9%E8%BD%ACPDF%E5%B7%A5%E5%85%B7&softsize=32.12MB2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\SogouDownLoad\crash\ExceptionReport.exe"C:\Program Files (x86)\SogouDownLoad\crash\ExceptionReport.exe" "dump202406300545"3⤵
- Executes dropped EXE
PID:648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD51a21e9b1435c06e562a1c6a2e92a82d6
SHA160457394473cb75fca7d3fe5069231e82c84a4e6
SHA25635e9bfc9e668511572a1e41f9421b5bd931e1b66a0562789453690f306a9af8e
SHA512d4336ddc4969c19078c0b06ae799a9062c571de12f471cdc6fcc8f9d27e3f8aebe75a0de47eaf7f719c3a58f69d40f7c28a964ab88cd9ef2b566c73e0e9f3eff
-
Filesize
111KB
MD5ba7121a86dbffafc97e1b8c11c17e199
SHA1922e584be46621e0ab57d3bb47b7c5dee8230ea8
SHA2560bc616a788f782a37b8fb0134ffabdd8a2988205a125b2f400c3deb43e2a8971
SHA51222641abfa34f8ed5c24375b221b6cae935fadffb4b1cf9f8c452658538dd4af459ec7e6a95d05fb7b3aa0fcb4bd195fa18d6fe787ece282fa5c5a8187da76197
-
Filesize
116B
MD5ffa1443199298e2c4ff1122f1ae14b05
SHA196175a64c1f8ba142aa057e8f76e13467ecefb82
SHA2562d21ddb94831d5345bbfbe52ecd342067cf49c6eaf8c78057e1901b6c69c6574
SHA5123955846ed694c43d2d9857168e1c3fee9714ecea70c0af04b1db6d7be5b4805b92730d74bc4a74ed5464c47e4af558b8d040d0efc8ec276fcb8c50c346fe61de
-
Filesize
7KB
MD50079cdb145c388c3e4c5e2235ac97bce
SHA17a8fee29992183dd572c52a1f6ca24219f4d8cba
SHA256f4890eb5df2bb1b2921c0e561388780b4e2871998ca5aa7f4ec8bbf6ea1a715c
SHA5127387d097152a49f8c57db203d89f64f6d2f905b60f69fa90d26ee3ebcab6428865e745fca63600c724c296db85d299502b4133cacd4b7dbcd4653712a82caa46
-
Filesize
7KB
MD5382c18d88309c186f501dc3d31876461
SHA11c602b521deec4e2826e9280fed7e586351282c4
SHA25667293d69f293e3347dd6eaabf19b84d3bba0fbc00fcc19d79be354da3f105687
SHA512f82ba3616734551eef1239203cc09531280f1c9118edc1f1218c18247c13dc3455e7d783f440a919a1df47922d33ed8526deabd979fe4d12e6cef2a5707c045d
-
Filesize
657B
MD50e0ac8352cd69f396f271fa32f3ab554
SHA1ed6d306a5033707f45477df3318a53d15b47cf43
SHA256c2c34d6bf4e17b756954e409dc9b5663169d68997abd722ce1e86473b769f10c
SHA5125d2528489c21600f16f04559500be3ebe9db5a1dc7bf9abc9c1312187b4b8b7bc5966f9eb2a38e26bff26c854a6d964fa156641fed9501cf0e7befedb60fd7e0
-
Filesize
8KB
MD53b4a5f925a08bd18b636880b8d557077
SHA173ed8c3697681e7999bae4fdcc62867b263182ce
SHA25648b8718ba8de855d6c937b23eb7ccc4f5482e6619de9261324c12a48ae6769dc
SHA512aa5ffd3040a6eb964ed7c70d138e3201989f78551610e22585077fa86bff58740500d6309c339a2dded56481d04f7416ca97b22548fde4661f7da39c9600644b
-
Filesize
93KB
MD55790ead7ad3ba27397aedfa3d263b867
SHA18130544c215fe5d1ec081d83461bf4a711e74882
SHA2562ecd295d295bec062cedebe177e54b9d6b19fc0a841dc5c178c654c9ccff09c0
SHA512781acedc99de4ce8d53d9b43a158c645eab1b23dfdfd6b57b3c442b11acc4a344e0d5b0067d4b78bb173abbded75fb91c410f2b5a58f71d438aa6266d048d98a
-
Filesize
10KB
MD5631f38cfac458788af482eba736e5ac3
SHA1b1d09def39ec74eff2c9e0aafe0a7c12e7650150
SHA25613e6cf03cdd65a8174cce7b0cb40c9821d2aff04a79c3374e8664fb0abb5694d
SHA5123ae47c895cd586b1dca8bdf65c58bc896b27837881cc42bb7b3d55c9a71ea9e857939a69c5146b445b64714996393d1ec9c0d95b18d18fd5cb48f02bb8a53f42
-
Filesize
108KB
MD51f3f7234bfefa7004556a38cd3ec34a4
SHA16bedae65f2c55662a48a4764980751f68120dc9e
SHA25671315605ec839cd1fb4d5e08cab65e2aa9c273c4ac6b78d6c431f68375f36608
SHA512f8df4c23034ab3d6807f74d4d38e72b18029a23b4a3c5698aea8a3fda83646c34811acc4f5fef81ee498f5f4fee86d524223b790f2d6c24dbbdf9deb7e8b1885
-
Filesize
34KB
MD5bb03d783f904094fd8aac40774b536ea
SHA1d2faa59a9f2fe41fec5a074909813043abe2d5a6
SHA256492b225a5ab143a010946a316535cbcb4d37cf1573873b4b21460271135349e2
SHA5121254304836fd1f5a81e0c61bd40aaac0b01bb0c3c8d965c3f4f0e87649ac41c1ed57a58d0ba86f76db19a07c6db371c4ac9e32d7c8661a89fff25a70548d7f8c
-
Filesize
499KB
MD592611a7ef872df59c53eab1e76855a9d
SHA141351edd9c7a5587a2ba7793131205a8bc3896e8
SHA256b655815e0b129134ccebd00f44eb87f85e72eb37a1879509e90f539dda4600cc
SHA5121b07e6ef576751ee20e4d2c43031aa4d668b8dd3f58dd403db56fb9cce39c4c8646cb2c0268596c3df67f7fbbddefc017e5205f8f27612fb269caffa52536f0b