Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 23:25

General

  • Target

    2024-10-05_3cae4581ac71614638012763dfcc4150_mafia.exe

  • Size

    2.6MB

  • MD5

    3cae4581ac71614638012763dfcc4150

  • SHA1

    c162658b1b792427f6717186c599bb2d1a451289

  • SHA256

    51373c0c4512109ee8bba8149f5fa371cb944081aaa38108ce6077e4e23da862

  • SHA512

    140a1c3e29dcb75dd1695a14cdbfab0e589d3fd7827ac71376490ee289a467ccd0a70de7c72c3035a8b09a8aaf32340fabb915bc92f8eeeca4bcf038f8af40cd

  • SSDEEP

    49152:OTGkQy5QZuTtS0rQMYOQ+q8CE0TG4QnTGHQc9KFeMv:OKkVWsM0r1QnDK4uKHT0Feu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 14 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 6 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-05_3cae4581ac71614638012763dfcc4150_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-05_3cae4581ac71614638012763dfcc4150_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2700
  • C:\Windows\Syswow64\d9ecc184
    C:\Windows\Syswow64\d9ecc184
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    17b4db97c2d8f150c8d8260d9b864d6b

    SHA1

    e8081118d4c162c0229b2c19931b701907404c26

    SHA256

    e61bc3fa7eb7a62f43532d2c17041386fcf625270fc3522eea7355747ef6bf36

    SHA512

    5a84cce602049bef6e7c56d023d258355179e0d2d3acd493e3b21f438b910918088c7de4114896f972113701076953789f01114044768c55ac09a67e8ea7634b

  • C:\Windows\SysWOW64\d9ecc184

    Filesize

    2.6MB

    MD5

    e7fca9ed47be75aae53615a1fd4ab741

    SHA1

    4d538145a3ef0826c6fb70da11973ca918c6a588

    SHA256

    563458f54a3c957b9975dbc17326cc19931ba940b4027a85c6d6781dd03e6c62

    SHA512

    101d7b055bb15d8161654ca48769197ae1967793d357b9ad73b68d5c230fb2243ef3efafe9d7460db0e069edf82f9edf95ba5a3096b70c5d222b47825f0c4711

  • C:\Windows\Temp\Tar4CBE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2700-4966-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-2473-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-189-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-0-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-4914-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-3977-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-1845-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2700-3365-0x0000000000330000-0x00000000003B9000-memory.dmp

    Filesize

    548KB

  • memory/2764-239-0x0000000000A60000-0x0000000000AE9000-memory.dmp

    Filesize

    548KB

  • memory/2764-2551-0x0000000000A60000-0x0000000000AE9000-memory.dmp

    Filesize

    548KB

  • memory/2764-1930-0x0000000000A60000-0x0000000000AE9000-memory.dmp

    Filesize

    548KB

  • memory/2764-1119-0x0000000000A60000-0x0000000000AE9000-memory.dmp

    Filesize

    548KB

  • memory/2764-240-0x0000000000A60000-0x0000000000AE9000-memory.dmp

    Filesize

    548KB

  • memory/2764-3-0x0000000000A60000-0x0000000000AE9000-memory.dmp

    Filesize

    548KB