Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/08/2023, 15:41

General

  • Target

    5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe

  • Size

    1.2MB

  • MD5

    5c03afb24fcc268de9031bf5a99fb430

  • SHA1

    159d335f09b0a90b0dea0cf55332e85432e06fff

  • SHA256

    059e16945b0be818a794ba11b4ed4fcd2617a9af827299c65ef909fbb58b3214

  • SHA512

    46111c473a96180adc5fdcbfe4b597ed3ee71a6d663455b7cf5be9236f5216b8a1fdd61ccf093408f5a3a0d3a2a9c1d327273a2077335494a5f86e3e5255dc78

  • SSDEEP

    24576:lEfCvka3N3Xi6kgaINVRX/diX2n0e435qkLeI+t2r48WocYuK5eK/TR9AGOjbvDp:6fCL93XiTcNjPdiGnT65qkYt2r48Woc9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Users\Admin\AppData\Local\Temp\GVLVYEAROTQFTH\tmppack.exe
      -y
      2⤵
      • Executes dropped EXE
      PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GVLVYEAROTQFTH\installer.pak

    Filesize

    1.6MB

    MD5

    858a3300bc5955dc77eb4e9df137bbca

    SHA1

    2b21ff580d19cfbfa7668e5f3572758e17cd18d5

    SHA256

    c4dcc3e35bc35dcbcef87223eb3555de374c2e25b48fde984eb7edd18ba89c79

    SHA512

    dd67930bef3c60695e53b1c6e8f211042154d9971e00c03ef302b5f42ac88dfe055cd4b9a7a5170edd1caacd74688f1ed144e57d69d5dd62708826ebd729a36d

  • C:\Users\Admin\AppData\Local\Temp\GVLVYEAROTQFTH\tmppack.exe

    Filesize

    718KB

    MD5

    07132df56fcc549cdb764a5030221f70

    SHA1

    e3ad21a65c5d1511571dda82ac75050ebebe1390

    SHA256

    e1d31f8bceee54e4e53ba3e876adc8758c82678cc3e7052b1f56dee6fd4fc099

    SHA512

    77977fb6f869903fd9c67d5c796211e0c0c21bb8b9457e733e42c8fedae4fb5d32eb19b26c8bb9d4a9a462c268f4f8dd3577e6c48cb370b650036427a58fce82

  • C:\Users\Admin\AppData\Local\Temp\GVLVYEAROTQFTH\tmppack.exe

    Filesize

    718KB

    MD5

    07132df56fcc549cdb764a5030221f70

    SHA1

    e3ad21a65c5d1511571dda82ac75050ebebe1390

    SHA256

    e1d31f8bceee54e4e53ba3e876adc8758c82678cc3e7052b1f56dee6fd4fc099

    SHA512

    77977fb6f869903fd9c67d5c796211e0c0c21bb8b9457e733e42c8fedae4fb5d32eb19b26c8bb9d4a9a462c268f4f8dd3577e6c48cb370b650036427a58fce82

  • C:\Users\Admin\AppData\Local\Temp\f0oao0x7\gui\YandexNA.html

    Filesize

    4KB

    MD5

    b2b80f6b9da9c27e80b06c2298586fb3

    SHA1

    0c39712dfda210eb1524ef9a678be158abb97f44

    SHA256

    0c0375359b17d8707ecc6f024f48a1843e7453cbf12bd6f53c1e477bce68ede5

    SHA512

    dffdb0db427a869871cfcc8bdc1945e9740ab698ab3d7b5b722b6aa88c6a3dfd0f80742845a16e1bba3c30895acc264e53c7eca75d09aff949c1a2838c964785

  • C:\Users\Admin\AppData\Local\Temp\f0oao0x7\gui\events\cav.xml

    Filesize

    1KB

    MD5

    53db8144c2937638ab55fbee6dc0cc71

    SHA1

    47ebda58e209e18c46ca0bd974775b3a7489d1d1

    SHA256

    fcbaf17f3d3d9ed76c37252a6fba06e740678034edf1d741564de22e6e4f1a33

    SHA512

    10709f9fd2bae525de8976562937490a8cc967c754c64e9a97f43b93b17d6707eb3c527ac3240c2daebc9cb9204c565dd5a3ad62e14e143a0ec0e80807564899

  • memory/4436-140-0x0000000002330000-0x00000000024CF000-memory.dmp

    Filesize

    1.6MB

  • memory/4436-207-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/4436-230-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB