Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2023, 17:04

General

  • Target

    617879f200adf61e0431337edb96a9bf_mafia_JC.exe

  • Size

    303KB

  • MD5

    617879f200adf61e0431337edb96a9bf

  • SHA1

    91cae508b9de7f39d2f30f1407923281f63e170c

  • SHA256

    b532a69e8a0b8e123f70f142183f7b6d1d835971a10d09cb85f5205b4f0f955c

  • SHA512

    d6f45ff8ca56145723994afaaa74552cb61baaf8c0878e996405988bff361e7542a008966ef71e6629559a507491680294e27f254c45e8cc851f5e1afdee210b

  • SSDEEP

    6144:nNgF4DxNuJc06j4YBa77xMQxA5i5knmv1SL/mQXxzclrnqSP:nu4lNAtYytvS5Aku1YL9clrnqS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\617879f200adf61e0431337edb96a9bf_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\617879f200adf61e0431337edb96a9bf_mafia_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/rxzgzb.html?s=156&v=157&c=207&a=175&m=&t=1614136862
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ff521781d474fada864d97cdf95f81a

    SHA1

    15393b32b959d897e5866e9193921529d75e5ec6

    SHA256

    e5c5092273835bb4d9dce4acca32497eb76a836e6822b49bc65555be08fd8ee0

    SHA512

    95eba21c1fe082ae67fe66d7390c5de85380ff203e41c05551151a805c90af98de82e8cd0da7c97d36564b3aa2c1a33f745c66699fee6b87a8520de0dddd857e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a9584a75a8c5341b48689eade205234

    SHA1

    d019cc06ea00c3358eb32ef99c0362edbb5efbda

    SHA256

    ac7e4e072b7cd9cc89036f2830a185723c2902e4b90c04910efe8cfb1e606ee9

    SHA512

    6ae47972ec5a006b65ae2c093cbc1b72ca529d5cd6c8b8deaeed5dc10bdf7bcaa3f834e75320fd7d029fdafb06ae0b405342c7c9b472d93e25dc24ce6081d82e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff78c594085a0b8dcfb24ef2ca4907a7

    SHA1

    be0325a2a207532139cd80c1fc0148464bbeb03d

    SHA256

    3a1da30c4493f1b51c9b04fe50fdd9ac2f7a68eda9b7866661ed3c59749eaa27

    SHA512

    0b450829f5a02a7e0a2e282b02614f307e88d429987dfd499625da9b2dd5c341d4c126f4e08807574b7f827528718f81d7c99d1e33f1d196e69c5d96ce2edd2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb953ae7d1d3de3478cbd1395c4c1e8f

    SHA1

    348e6f8bf2630c31252ac7e8b98c8b7d3e3fab04

    SHA256

    f32fc404e9db69380d578eef68199d5de28b136e07345cb1870a718d470f55c2

    SHA512

    087ee0f9880db4d873e90092d3c8202f213150b3b4d8c4e1b238fe7e379caddef00b2375c9f7c158066a78b2e6b85150d917a530305444f28d79f57457e6230c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85a7e544967d6add67f301b2eb2f2672

    SHA1

    6c64e3ff74d65dbeb260760ead1df7f4c215686b

    SHA256

    9d8d4155abadaaaeaee90075f87e029f93b05485487e03c4b781cc5b90824ec2

    SHA512

    38352d9a53d5d279ed5409b01c053a9cc96b5879d7e8721874e54a6dd8ff898ad3a67bdd5739fb67d0f48df893486cd19b094822abc041a142310a2b92102626

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3400bd074c420cc111cc211d1ea0c3d0

    SHA1

    b0b2d907791b369472bfc199467782fb770c4609

    SHA256

    c62cd4b917b46339c501ae3b5c58064ad2a62c9eae169302d9746ba7b7036158

    SHA512

    4e60d779cebc0d2b1f701ac51be134885d5a75defb24c73cc59c8ff92eeba6f7867c4cd15e7f55100601579855ff1c01b514084a83d3e8326f4939bfcca10c69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57f20b3667b735901867953f3c3fad48

    SHA1

    8de944dc39db0d80e7124bdb99b9192deae18e8e

    SHA256

    6289a3bfd4a1b4e3edd9e6bdd5701d7b3dbc8ccdf00677d45b80691d2c418d15

    SHA512

    8e3e7d3a6a26294a894ff31ec29c0b9c232c3fc753a39b2b1cd9e65124e7ebd2c5bcd6c83cbee29773aaebbabdecfbf8577a9fe676404c3eecab1b5417773c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06816bb023f0498de978fe72cdf0cd8a

    SHA1

    a784a42ed73d2bc1f27f671d0c9f22c7d743d478

    SHA256

    338475b6cbeac6027cf711514cb946784056edf779112dc4c286b778b68edb72

    SHA512

    659f4bd7c7463ea5824b626cf38f477286f32a637e17990f88072c9f1f391aa176c31ddc842d33bc2bba1cbd85bdcda9a98305c52ebd2ccedc5e9da924810dde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3929ded32e351fada65acda3c565782f

    SHA1

    629da7e5b9854bacaf5af25f7597ce163804cc10

    SHA256

    5b690c54fff4b14736604274be568c797238335f30f40cd9e9929cdcfb70aa11

    SHA512

    fc47db696c59c057782fe6a751cdfc52823dbbc24b0cc39138d6f8701e1fd1513e0b40f9e693ddea3d9b4d1a0ec9e0617548e002cf3711f76e50f7df063dd8f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6ab176f9e6176bbc5cb792ad76894ff

    SHA1

    bdd7b400f44a5559cc92bcf8c99d6f41e70bf7b6

    SHA256

    afc3c99773117f020523f06017d4421782b5dcd85a1363e0d97260c8b14a6d78

    SHA512

    f5264296b52984417651e64f9c4214e382a78621a3cb733d62b9998555a7cb40b2f783368e11410cbd409e5604e85a8782c5ca53066eebf7fa713612abcb4153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    962e3d48588bb9f7ae5c8d8db19741b5

    SHA1

    8c8058875f0df53a382c739ed80d24bdfb3cf22f

    SHA256

    e1cb2cf33220ae0b1e21b80ff6a457d3546969f1e4a0c30c7c8627b4cebf8337

    SHA512

    cf2419cd139aa957df7913e1c1a613f98faaf6d21379eccb34635bb7b6861f4f1097dc4a9d94e4e188959737b48e477866fd32d103692493045271a30faea583

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef27a9e0c75f6e5ceb2f0c7162775d24

    SHA1

    b4bc7046259b0735bcf85813efcb9caf82b260d1

    SHA256

    793d229698427f828a483fef486462dca80155d25af82db4275877a15a06033b

    SHA512

    8804e521b320f24a8e77269e721a501404f59486aa248b692a625691cc2bc6a05c08a599fdb4ffe33efbc4b26efcd394d7d9285a7a3b58c2a45f9b6e87230802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5186604330af91eecad9433d56ca972

    SHA1

    415ce9cc39aedbf56e8f2be1e66fcc240801904e

    SHA256

    9479ac8e8441b186e4c7497f7eb294e50a8d27035fd66a7ff03f35aa9c714b37

    SHA512

    fab8d6e347072a4876483bc62d73ad68bd78934a29837caaac156e770bb9067417911651e004d353641665f5747a457c41ca81aab3783f5da8a2f56e75e2116d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    664deac6e67099d1ee5e2e52e54ef024

    SHA1

    6057bd3f9f84f7e08557812b686a4ad7c740b2c4

    SHA256

    1cc436cc861bab034657da1372dc6647fc3d64adc5cabe71c8cee5899ed65821

    SHA512

    eeb3ca49be295276c534f4882bc6188dbbc3cadd1d89a08cba6f3ecfe96d4b27756a0c8265630ee4ff17abcd57ef41a875937b31d5107bf5687dfa3d6674a95d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    559aedfbfcfbd908f7676d4941a0218d

    SHA1

    3c7a2f8c3799d588b7da557c85e3f1fc4f812940

    SHA256

    94f3ebb502a2bcabf90954d82ef87540a2797132a7b2052c804f39d9cb98f568

    SHA512

    0a1a9573049953b77ebfafa4dafe5a3145d8daef75de9711dd61cfafadd3baab806cbfbe0889c4e8e8a67219c97ac85be3485be3c97a6fb6e1cff85cd6b2869c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8dbb9470d076ee475fb881e564521232

    SHA1

    fa206a2017443d7321f68d82df8656f95c2b8207

    SHA256

    9b3b05723f3441389aad36dd2667d9b88b1e400f5520473b4569496893230739

    SHA512

    d5d5481128397c67f0c269e12c272d03d31a547524be710732d0d059564cd46cce8907f8ab1b19df8ae698e6c003c5c77af633bb3105dd6e59205c1f97632c62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d771960d86acbbeb661d146b74d9922

    SHA1

    091e96a37ee9b6bf0b7d4c625462c0dc9ba70c36

    SHA256

    50cd2ebbf5a62eae12f84bcb8b610cfb58cdbf7355acae4f4149bf52583f50a8

    SHA512

    806d4890dd02faecf4aa4d8166b39fa8cdf150d9a468c8f3f3776b164fcdfc07c09471c36a31ca1d3af96df4b79c3cb9af213565af0e9e56a79250133a3bdf00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0df7af86f57cf5c7d1e14533b2ac0ae

    SHA1

    6f6a44dabbd426a461fc4b2a5d7a9e4d2411d424

    SHA256

    1f3184026fa6ae39955539ce9b696a993a89fd6e3b18ed444e32e1a294e60585

    SHA512

    174c6eb036a7b2f44b41060d50ea7dc902aa135865c206b4bc3fc4bde8d2faa25a931aaff0fde8c0e446672caa48dda0c2e7f17f8bdc3c122ae26506d8d061fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dd41dff0e2268ce48ada91f7e6f976e

    SHA1

    9431e86fec4fa612796c66a3adc6ab37ad51748d

    SHA256

    1cefcd02971bb2b2826579dc29649d2a71f19fe2553eb92a44358e08d86b0fd1

    SHA512

    d515f5f721796b1c79a5e5a41abdeb56a1e646736df9ba7e213970b98eee193f7d7bf55afca1f10459bb673c813b8489236cae6c25b456ed3d7f89ab4f794d19

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ba0y71l\imagestore.dat

    Filesize

    4KB

    MD5

    61d6436616ffa4d504f90f2fc848b726

    SHA1

    3409320cb9d8f61649fe8c48f5ef96a1a383aebc

    SHA256

    fe108d3fe2b4072a5ee9b2f2d026bd2a13ab0e59699844a90c778c5de49078fa

    SHA512

    99f6e5a975894a3835c8a47f379c230cb20902546c170cc0bb7425c9f653a9b80588c2f13450888fed3ac87ae5b4e8c5e679fffe37eabc2d0880f5a214e12776

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\2[1].js

    Filesize

    10B

    MD5

    74e1080b5e3125ca3a5abc7b340399aa

    SHA1

    b1e150e5809482e54c347d440f1824179c0d6d5f

    SHA256

    623017a5748ff1b4e9d0f227f5cd58869ae4959d1ca8fd204c9441cd11e2695b

    SHA512

    51985a333a6c225976863cf49eca3492f5b8a61f525d08d0bc69c25a7eecaad6fc3ec6f71420f06bb1c3fbfbd197eed6c5c4a99929bd0dbdee73ec2f88265f80

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0WV8E8S\TCaptcha[1].js

    Filesize

    79KB

    MD5

    cf1f7b5f26170b63eb1a5fea4abb05a5

    SHA1

    d03a929c5f82d8d31cd8e9aaa0b686086a15ae6b

    SHA256

    bc4ac878d90b7721264cb605ea1efae6bc7ab573c801620651416fab052c1f4a

    SHA512

    97954bd96e60bbc32934db460ae71ceb8122e6be0e01b7bdd98a9a30d0744fdb9bb56f3cf65ef3967372ede0c60e0400d129375a1d9ba80eb07e779c54806588

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0WV8E8S\favicon[2].ico

    Filesize

    43B

    MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

    SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

    SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

    SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

  • C:\Users\Admin\AppData\Local\Temp\Cab5822.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar58C3.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27