Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe
-
Size
388KB
-
MD5
7fd7e8d15c002d5b78e4b6c0efb17319
-
SHA1
c74948b0b72a9a2c4365e3caa9788344a4631b7b
-
SHA256
56ab59ce5ea456d97d2d9f8eb0fb842ef03ce8c68b6b1296dbbb7a40b074d847
-
SHA512
ffba0076ec3c18dbaae4cb85bbb267b5d90762d5dc95f0fe153ec1d8725df17a64c36bd04407fcb15a74317e1becd8826b011cd25dfe368e105426d95310c860
-
SSDEEP
12288:BqYXje0DF9k64/QSywqP0T8oIN1AHDFhY25fC2WF9s+204:BqYDF9k64/Q9j28okAHDHY25fC2WF9s3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 StikyNote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\StikyNote.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 3308 2168 StikyNote.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNote.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4888 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 2168 StikyNote.exe 2168 StikyNote.exe 3308 iexplore.exe 3308 iexplore.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1096 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 86 PID 2040 wrote to memory of 1096 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 86 PID 2040 wrote to memory of 1096 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 86 PID 2040 wrote to memory of 1096 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 86 PID 2040 wrote to memory of 1096 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 86 PID 2040 wrote to memory of 540 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 87 PID 2040 wrote to memory of 540 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 87 PID 2040 wrote to memory of 540 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 87 PID 2040 wrote to memory of 2168 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 89 PID 2040 wrote to memory of 2168 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 89 PID 2040 wrote to memory of 2168 2040 2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe 89 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 2168 wrote to memory of 3308 2168 StikyNote.exe 90 PID 1096 wrote to memory of 2548 1096 rundll32.exe 97 PID 1096 wrote to memory of 2548 1096 rundll32.exe 97 PID 1096 wrote to memory of 2548 1096 rundll32.exe 97 PID 2548 wrote to memory of 4888 2548 cmd.exe 99 PID 2548 wrote to memory of 4888 2548 cmd.exe 99 PID 2548 wrote to memory of 4888 2548 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4888
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-10-12_7fd7e8d15c002d5b78e4b6c0efb17319_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD560b26244b3f778861dd16a22283111fb
SHA14003c12eec94c33024d16ed805d236c51489e050
SHA25683e33cd15a02168cf35bc518abc013ab0d8f4d153f9970d553bbba93b691e8eb
SHA51297066671ee3e662e91473f252b8d2f25a8996f8dce4a7f768710d915dd78d6daba3123a69da95a5d597d93abb85c95ca45c8163157b5a81ba3c47c703a73c853
-
Filesize
388KB
MD57fd7e8d15c002d5b78e4b6c0efb17319
SHA1c74948b0b72a9a2c4365e3caa9788344a4631b7b
SHA25656ab59ce5ea456d97d2d9f8eb0fb842ef03ce8c68b6b1296dbbb7a40b074d847
SHA512ffba0076ec3c18dbaae4cb85bbb267b5d90762d5dc95f0fe153ec1d8725df17a64c36bd04407fcb15a74317e1becd8826b011cd25dfe368e105426d95310c860
-
Filesize
47B
MD572a392628d7f368bb9bc9689a694f55a
SHA1feacee9c66028a333446f2c968bcb3d567a4033d
SHA256afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd
SHA51276f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e