Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/03/2025, 08:06

General

  • Target

    2025-03-21_07b1087127e38101002b049e95e1ddcf_amadey_mafia.exe

  • Size

    2.7MB

  • MD5

    07b1087127e38101002b049e95e1ddcf

  • SHA1

    394702087a93e47a25f3610c096cdc82747224ca

  • SHA256

    6800e76ac53d68c3576f2293f4447e93496b337ef447cb57be447149a0c4ebfd

  • SHA512

    8e9d1e973d73164108b0a458060f7ec0e1bf24bb0d9186fa5cbf54f927de15a25d5995f66cf0d4fcc0e08703ca5b5d48221a63f53027ed7b91174b614beb6f58

  • SSDEEP

    49152:9HHKO29Qm5QZuTtS0rQMYOQ+q8CEKTG4QaTGHQ89KFeMK:9nKdtWsM0r1QnxK4DKH30FeT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-21_07b1087127e38101002b049e95e1ddcf_amadey_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-21_07b1087127e38101002b049e95e1ddcf_amadey_mafia.exe"
    1⤵
    • Unexpected DNS network traffic destination
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2096
  • C:\Windows\Syswow64\ded1f850
    C:\Windows\Syswow64\ded1f850
    1⤵
    • Executes dropped EXE
    • Unexpected DNS network traffic destination
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    16dc5b2fed1c6e5cdeed305ef5d65376

    SHA1

    27ccb8787ecb66a43c2a5c8dbec7d9880cf601a2

    SHA256

    05d7f5b337b108539656cb6f853e5a801d53558ff1ae2f146427735cd742baa3

    SHA512

    ca86cbc462bd68653e652e8d9bfd5ea4ea131b5175512fac09b14133802bc24c3a9e119c4abaad82d64ba0f6fc3eca13e6b4b9444830df6946d23ad5d37ebc49

  • C:\Windows\SysWOW64\ded1f850

    Filesize

    2.7MB

    MD5

    3e50e7fc673c13c6218f7e8ae5258607

    SHA1

    cfd4869057b366570e0fe887f12c3d7a13fdabb4

    SHA256

    2d7993562ec7ee3d3aae7c0e3d48645214f55ea4be25f346beb0048f6d005667

    SHA512

    1e3b254b03c33d1285de031f36295552fd667b32754dece76fbe5baf0d6532209da9cf5f9d164eab4245346c56f45ee06edd3421b4bec1af42192a5a4629b968

  • C:\Windows\Temp\Tar16D0.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/2096-0-0x0000000000160000-0x00000000001C3000-memory.dmp

    Filesize

    396KB

  • memory/2656-3-0x00000000000B0000-0x0000000000113000-memory.dmp

    Filesize

    396KB