Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 17:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fd3bb911ce649eeee48bbd9f68a9606d_mafia_JC.exe
Resource
win7-20230712-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
fd3bb911ce649eeee48bbd9f68a9606d_mafia_JC.exe
Resource
win10v2004-20230703-en
9 signatures
150 seconds
General
-
Target
fd3bb911ce649eeee48bbd9f68a9606d_mafia_JC.exe
-
Size
3.5MB
-
MD5
fd3bb911ce649eeee48bbd9f68a9606d
-
SHA1
29b04ae78c7864f03061b7eda5df27be45a80673
-
SHA256
4942c765186087676d5c8abd8f779a5fc2d1ba4965f22bbbe626f30ae1f4891d
-
SHA512
d24799603fb7c5c4f26e5f1240027b88bac9e2cb8f5ec98c1185784ac68db9a19819dfa61449d22e26af8d1b253ee66ec937868dfa8e6e28f45593140ac2cf54
-
SSDEEP
49152:t9yiCJ5rFwnANZGEXep+9TxFegOSDAmosh3ANkTTlV1diUh93M/x4Y/+2JSuZT:eJ5rFwnApezgOS9V3AMxg29td2Mu
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe Token: SeShutdownPrivilege 2812 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd3bb911ce649eeee48bbd9f68a9606d_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\fd3bb911ce649eeee48bbd9f68a9606d_mafia_JC.exe"1⤵PID:2600
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2812