Overview
overview
10Static
static
10f5ae5532f1...b5.exe
windows11-21h2-x64
10f5cb51ffdb...c0.exe
windows11-21h2-x64
10f5ed127464...bc.exe
windows11-21h2-x64
10f62837f3bc...7a.exe
windows11-21h2-x64
10f628fa20e8...3b.exe
windows11-21h2-x64
10f640f01e80...c5.exe
windows11-21h2-x64
7f66fa3036e...07.exe
windows11-21h2-x64
7f68f044685...50.exe
windows11-21h2-x64
3f6ac1ea5c1...25.exe
windows11-21h2-x64
8f6b7978847...1a.exe
windows11-21h2-x64
7f6e2978004...35.exe
windows11-21h2-x64
10f721adec82...71.exe
windows11-21h2-x64
10f736c152b3...c8.exe
windows11-21h2-x64
10f780377dd9...c9.exe
windows11-21h2-x64
7f7a96bf083...c8.exe
windows11-21h2-x64
1f812ad48d0...9b.exe
windows11-21h2-x64
10f8173be0fb...a4.exe
windows11-21h2-x64
1f835ddaf49...d7.exe
windows11-21h2-x64
10f846950431...1c.exe
windows11-21h2-x64
10f89219b77e...00.exe
windows11-21h2-x64
10f8a3f1d5a1...b0.exe
windows11-21h2-x64
10f908d30321...39.exe
windows11-21h2-x64
10f926cc363c...a8.exe
windows11-21h2-x64
10f947bf8f07...dd.exe
windows11-21h2-x64
10f97418dbfc...06.exe
windows11-21h2-x64
7f98ee08aed...cc.exe
windows11-21h2-x64
10f990d850e1...f8.exe
windows11-21h2-x64
8f99ae4a378...93.exe
windows11-21h2-x64
10f9a573b21a...18.exe
windows11-21h2-x64
10fa0d8e0c80...8e.exe
windows11-21h2-x64
10fa8e531e08...84.exe
windows11-21h2-x64
10fa942bbb98...d7.exe
windows11-21h2-x64
10Resubmissions
14/04/2025, 07:51
250414-jp1kfssjz9 1014/04/2025, 07:46
250414-jl9nyssjt9 1008/04/2025, 15:58
250408-tevasswl18 1008/04/2025, 14:19
250408-rm2nqsvqw2 10Analysis
-
max time kernel
142s -
max time network
112s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/04/2025, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win11-20250410-en
Behavioral task
behavioral4
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win11-20250410-en
Behavioral task
behavioral6
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win11-20250411-en
Behavioral task
behavioral7
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win11-20250410-en
Behavioral task
behavioral8
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win11-20250410-en
Behavioral task
behavioral10
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win11-20250410-en
Behavioral task
behavioral12
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win11-20250410-en
Behavioral task
behavioral14
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win11-20250410-en
Behavioral task
behavioral16
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win11-20250411-en
Behavioral task
behavioral17
Sample
f8173be0fb3bebc0120e2cb017eb9922adebbb430734d0363e2d38e28ee47ea4.exe
Resource
win11-20250410-en
Behavioral task
behavioral18
Sample
f835ddaf4933c7bd4a3aa1f015442bb48b69f863f467dd8d1db09e6f2a427fd7.exe
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
f846950431f463a0a7e663ea7003e31c.exe
Resource
win11-20250410-en
Behavioral task
behavioral20
Sample
f89219b77e5fde5a7a1581e3e4cc0b00.exe
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
f8a3f1d5a1d18a666d9b81a974e212b0.exe
Resource
win11-20250410-en
Behavioral task
behavioral22
Sample
f908d30321810e4c87131f6fea397e39.exe
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
f926cc363c27c542c23e14398096eda8.exe
Resource
win11-20250410-en
Behavioral task
behavioral24
Sample
f947bf8f07543c9beae3fdba615ba1dd.exe
Resource
win11-20250410-en
Behavioral task
behavioral25
Sample
f97418dbfcdd3f6d26c6cad46d16ec06.exe
Resource
win11-20250411-en
Behavioral task
behavioral26
Sample
f98ee08aed6b41b1f9e6e1ca752d22cc.exe
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe
Resource
win11-20250410-en
Behavioral task
behavioral28
Sample
f99ae4a3786f8c8da71654ddaba30b4791692d795c93ec1f60b0c58f3be43c93.exe
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
f9a573b21a7be92000f27a3802bb3518.exe
Resource
win11-20250410-en
Behavioral task
behavioral30
Sample
fa0d8e0c80c4d5be75d4ff442d6a85ea4750bffb3526d4d2d3b2e03f3ccfb28e.exe
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
fa8e531e0860851ba2d1fb27a07f1879162d4f9bee94df2b818bae9d7834a884.exe
Resource
win11-20250410-en
Behavioral task
behavioral32
Sample
fa942bbb984e2be3a2e1d8414cc00cd7.exe
Resource
win11-20250410-en
General
-
Target
f89219b77e5fde5a7a1581e3e4cc0b00.exe
-
Size
294KB
-
MD5
f89219b77e5fde5a7a1581e3e4cc0b00
-
SHA1
557c9ff996b42056c0531e63ebf5e7d794b23b19
-
SHA256
6c8d0a52686544703953357f4d7655e5e1a27a90e2f1aeac9eccdddb618333e5
-
SHA512
9ba62300e547e971ff79e4ec0209e07197414071ddf0b90d4a951e06a82f258ab2abcd9653b5fdeb5febe9b6fc8b6a28ce52f7360d94b63283fd0485168b6a40
-
SSDEEP
3072:bC6UBkwelNBVB18I8qk49NWa+miRztQYi+GVnkgLmVv3yniVH9T2mZP:bdHvH8+k49wa+LRBQYi+OkgKLVH9T2m
Malware Config
Signatures
-
Detect MafiaWare666 ransomware 1 IoCs
resource yara_rule behavioral20/memory/3028-1-0x0000000000850000-0x000000000089E000-memory.dmp family_mafiaware666 -
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
Renames multiple (110) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-599783296-1627459723-2423478968-1000\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe File opened for modification C:\Users\Admin\Documents\desktop.ini f89219b77e5fde5a7a1581e3e4cc0b00.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f89219b77e5fde5a7a1581e3e4cc0b00.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-599783296-1627459723-2423478968-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-599783296-1627459723-2423478968-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-599783296-1627459723-2423478968-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-599783296-1627459723-2423478968-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-599783296-1627459723-2423478968-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2432 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f89219b77e5fde5a7a1581e3e4cc0b00.exe"C:\Users\Admin\AppData\Local\Temp\f89219b77e5fde5a7a1581e3e4cc0b00.exe"1⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
PID:3028
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:3684
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2432
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\49bf93a0-2174-4ea6-9448-5b3dcaa8465c.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD58eac0df6d05d014fbbc51e0139015737
SHA10260efbfe34f79a361e935cb0fa5a0e58ae23d0a
SHA25618963958c728bec48aa034995bd4a54bacd61a548c7475e51002604741bbf5e3
SHA5121781707f9fccb71db5f19552f877629337fcdd4b8f946398beb2f2b641ab2df3e53d0cd5f5588be55adb0fc821d274462ba75fac408c3f71dd77cf0656c8f787