Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe
Resource
win7-20230712-en
General
-
Target
5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe
-
Size
1.2MB
-
MD5
5c03afb24fcc268de9031bf5a99fb430
-
SHA1
159d335f09b0a90b0dea0cf55332e85432e06fff
-
SHA256
059e16945b0be818a794ba11b4ed4fcd2617a9af827299c65ef909fbb58b3214
-
SHA512
46111c473a96180adc5fdcbfe4b597ed3ee71a6d663455b7cf5be9236f5216b8a1fdd61ccf093408f5a3a0d3a2a9c1d327273a2077335494a5f86e3e5255dc78
-
SSDEEP
24576:lEfCvka3N3Xi6kgaINVRX/diX2n0e435qkLeI+t2r48WocYuK5eK/TR9AGOjbvDp:6fCL93XiTcNjPdiGnT65qkYt2r48Woc9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3928 tmppack.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4436 5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe 4436 5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3928 4436 5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe 85 PID 4436 wrote to memory of 3928 4436 5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe 85 PID 4436 wrote to memory of 3928 4436 5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\5c03afb24fcc268de9031bf5a99fb430_mafia_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\GVLVYEAROTQFTH\tmppack.exe-y2⤵
- Executes dropped EXE
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5858a3300bc5955dc77eb4e9df137bbca
SHA12b21ff580d19cfbfa7668e5f3572758e17cd18d5
SHA256c4dcc3e35bc35dcbcef87223eb3555de374c2e25b48fde984eb7edd18ba89c79
SHA512dd67930bef3c60695e53b1c6e8f211042154d9971e00c03ef302b5f42ac88dfe055cd4b9a7a5170edd1caacd74688f1ed144e57d69d5dd62708826ebd729a36d
-
Filesize
718KB
MD507132df56fcc549cdb764a5030221f70
SHA1e3ad21a65c5d1511571dda82ac75050ebebe1390
SHA256e1d31f8bceee54e4e53ba3e876adc8758c82678cc3e7052b1f56dee6fd4fc099
SHA51277977fb6f869903fd9c67d5c796211e0c0c21bb8b9457e733e42c8fedae4fb5d32eb19b26c8bb9d4a9a462c268f4f8dd3577e6c48cb370b650036427a58fce82
-
Filesize
718KB
MD507132df56fcc549cdb764a5030221f70
SHA1e3ad21a65c5d1511571dda82ac75050ebebe1390
SHA256e1d31f8bceee54e4e53ba3e876adc8758c82678cc3e7052b1f56dee6fd4fc099
SHA51277977fb6f869903fd9c67d5c796211e0c0c21bb8b9457e733e42c8fedae4fb5d32eb19b26c8bb9d4a9a462c268f4f8dd3577e6c48cb370b650036427a58fce82
-
Filesize
4KB
MD5b2b80f6b9da9c27e80b06c2298586fb3
SHA10c39712dfda210eb1524ef9a678be158abb97f44
SHA2560c0375359b17d8707ecc6f024f48a1843e7453cbf12bd6f53c1e477bce68ede5
SHA512dffdb0db427a869871cfcc8bdc1945e9740ab698ab3d7b5b722b6aa88c6a3dfd0f80742845a16e1bba3c30895acc264e53c7eca75d09aff949c1a2838c964785
-
Filesize
1KB
MD553db8144c2937638ab55fbee6dc0cc71
SHA147ebda58e209e18c46ca0bd974775b3a7489d1d1
SHA256fcbaf17f3d3d9ed76c37252a6fba06e740678034edf1d741564de22e6e4f1a33
SHA51210709f9fd2bae525de8976562937490a8cc967c754c64e9a97f43b93b17d6707eb3c527ac3240c2daebc9cb9204c565dd5a3ad62e14e143a0ec0e80807564899