Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 03:36
Behavioral task
behavioral1
Sample
WindowsFormsApp1.exe
Resource
win10v2004-20240802-en
General
-
Target
WindowsFormsApp1.exe
-
Size
1.3MB
-
MD5
865a5dfc61b496c6e86abc200bb4916d
-
SHA1
60b678a4a0032e59a07349e202c4ec42e5a387f8
-
SHA256
4930e4ddd35a5ef7ad3be161ef88a2fd5f7cf314883af7498573d1ad57824d3c
-
SHA512
c57b5b06adc462615f26661320f9d2f825e4e4a3d2ea518846b175e1cb89f205b592ccdecec0f9e822cc5521cde25388b271c29164640ff02699a0fc1a30551b
-
SSDEEP
24576:cTSTiRsBE12BIVpT2QhYpAILUo/g9QZqpMC3QVbIoTdWR8SfEuGujqZF13z8H81:cT7RseZDT2tSbvQsIbe8YVjPH81
Malware Config
Signatures
-
Detect MafiaWare666 ransomware 1 IoCs
resource yara_rule behavioral1/memory/4936-1-0x00000000009C0000-0x0000000000B10000-memory.dmp family_mafiaware666 -
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Renames multiple (85) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini WindowsFormsApp1.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini WindowsFormsApp1.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini WindowsFormsApp1.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini WindowsFormsApp1.exe File opened for modification C:\Users\Admin\Documents\desktop.ini WindowsFormsApp1.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsFormsApp1.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1932 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1932 taskmgr.exe Token: SeSystemProfilePrivilege 1932 taskmgr.exe Token: SeCreateGlobalPrivilege 1932 taskmgr.exe Token: 33 1932 taskmgr.exe Token: SeIncBasePriorityPrivilege 1932 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe 4936 WindowsFormsApp1.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe 1932 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsFormsApp1.exe"C:\Users\Admin\AppData\Local\Temp\WindowsFormsApp1.exe"1⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4936
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1932
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4152