Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe
Resource
win10v2004-20240730-en
General
-
Target
2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe
-
Size
387KB
-
MD5
9e03be269c58a15b6ffc9a1502569686
-
SHA1
d034168bfa1deecf9f4f0ed702dc1be55d87064b
-
SHA256
eac4613b8c69b4b84acb79e19ce02e41835de1ced41af5d913fe1869223ca614
-
SHA512
cd42b990eb30b6bbff95658f34bc96218d8b19aaa4bde6b0e18acfb3b6b3208a958907e8a8a8e05b4640f9e3badab885543266e4ebd5d21973373508a7f2e457
-
SSDEEP
12288:BqYXje0DF9k64/QSywqP0T8oIN1AHDFhY25fC2WF9sr204P:BqYDF9k64/Q9j28okAHDHY25fC2WF9sk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 400 StikyNote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2927035347-1736702767-189270196-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\StikyNote.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 400 set thread context of 4544 400 StikyNote.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2776 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 400 StikyNote.exe 400 StikyNote.exe 4544 iexplore.exe 4544 iexplore.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1796 wrote to memory of 3300 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 86 PID 1796 wrote to memory of 3300 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 86 PID 1796 wrote to memory of 3300 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 86 PID 1796 wrote to memory of 3300 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 86 PID 1796 wrote to memory of 3300 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 86 PID 1796 wrote to memory of 3264 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 87 PID 1796 wrote to memory of 3264 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 87 PID 1796 wrote to memory of 3264 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 87 PID 1796 wrote to memory of 400 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 89 PID 1796 wrote to memory of 400 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 89 PID 1796 wrote to memory of 400 1796 2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe 89 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 400 wrote to memory of 4544 400 StikyNote.exe 90 PID 3300 wrote to memory of 3532 3300 rundll32.exe 94 PID 3300 wrote to memory of 3532 3300 rundll32.exe 94 PID 3300 wrote to memory of 3532 3300 rundll32.exe 94 PID 3532 wrote to memory of 2776 3532 cmd.exe 96 PID 3532 wrote to memory of 2776 3532 cmd.exe 96 PID 3532 wrote to memory of 2776 3532 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2776
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-08-02_9e03be269c58a15b6ffc9a1502569686_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5ebf683481c47263168510694ef24d9e7
SHA14f75a9eff3183634b58869594deb81b5439f20d3
SHA2565c1038348fd6100aed907dfe05a55f61113394e8dfab47d8d0c9eaa92970d1d2
SHA512c0dcd19e8932c160be51ec8547d9ce9568031e52955e9071f52342559e8ca18077e5b624c75d3d3e7b0e79f10dbacffef979abeeb3198338bb8c2f64be90aef1
-
Filesize
387KB
MD59e03be269c58a15b6ffc9a1502569686
SHA1d034168bfa1deecf9f4f0ed702dc1be55d87064b
SHA256eac4613b8c69b4b84acb79e19ce02e41835de1ced41af5d913fe1869223ca614
SHA512cd42b990eb30b6bbff95658f34bc96218d8b19aaa4bde6b0e18acfb3b6b3208a958907e8a8a8e05b4640f9e3badab885543266e4ebd5d21973373508a7f2e457
-
Filesize
47B
MD572a392628d7f368bb9bc9689a694f55a
SHA1feacee9c66028a333446f2c968bcb3d567a4033d
SHA256afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd
SHA51276f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e