Analysis
-
max time kernel
105s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 11:50
Behavioral task
behavioral1
Sample
skull.exe
Resource
win10v2004-20241007-en
General
-
Target
skull.exe
-
Size
1.3MB
-
MD5
3dce90e3a6daa8810d0dec78fd960e7d
-
SHA1
d44f4aa742092f33ec60264e15f09fd127a7bb87
-
SHA256
096ef1633a1e4b28ea46406a6324998b5f4dc59f6596c3dfbe7d6ee403186733
-
SHA512
bd68ff08882a61bbc4d51ca4ae2e055e20db853c79f6ea0dd5867e673af38785ddc4f992c1891ecf6d658bba89556b23797d708f3d7ca1da1eb4332f9a2ea84c
-
SSDEEP
24576:RTSTiRsBE12BIVpT2QhYpAILUo/g9QZqpMC3QVbIoTdWR8SfEuGujqZF13z8H81:RT7RseZDT2tSbvQsIbe8YVjPH81
Malware Config
Signatures
-
Detect MafiaWare666 ransomware 1 IoCs
resource yara_rule behavioral1/memory/2452-1-0x00000000007D0000-0x0000000000922000-memory.dmp family_mafiaware666 -
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
Renames multiple (69) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini skull.exe File opened for modification C:\Users\Admin\Documents\desktop.ini skull.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini skull.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini skull.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini skull.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skull.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 112 NOTEPAD.EXE 2292 NOTEPAD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 112 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe 4100 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4100 wrote to memory of 112 4100 OpenWith.exe 95 PID 4100 wrote to memory of 112 4100 OpenWith.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\skull.exe"C:\Users\Admin\AppData\Local\Temp\skull.exe"1⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:2452
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GroupHide.csv.jcrypt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:112
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\___RECOVER__FILES__.jcrypt.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
487KB
MD5d018de2dd344bc6be8b5aeba1344d5c1
SHA17924b7ea2365cfc133e0699747a581e6b7147f02
SHA25656052dbf752ec649d55e1449bcb6d0d1e64c6ee6f36f250c58ae37cee1f32865
SHA512c9d2c8687f2458f3941615f56b0557d5043ef6cb25fbd8dbb1aca927aaa765dad568938ee5c53de3374c61830346702c1732dc9334c8552d52cd3d9cdf8fc597
-
Filesize
3KB
MD58efdf2c9bda6f498b6ad872ab45c4364
SHA108738ac6765b78ba111bd957d66a6d761de45db4
SHA256285be6e25d46cb90d3027d222198b7abec9584550617ba11fbbfa6dc887439df
SHA51284bcd93816df15bdeb4e479120895f11aa6f7e08a44802347004c1a4e288bcb85060a6c449fa70e62e53869561b5447ea43a4ffc58ff5fa7c245ac2698f577bd