Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2023, 17:08

General

  • Target

    7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe

  • Size

    1.2MB

  • MD5

    7a9b9f1f294c7b9dc0300d7be856ce91

  • SHA1

    09839b13b355b23341ee3ede17a27d2d93dac9e5

  • SHA256

    2242a74b85a02094e99c1d96494729aedcf84232ba373bbf65be6f8b8208ee2f

  • SHA512

    0526e18f4c67ae549b57913abdf0996b4e8137b225da93253ba25f251f686b884795c07ef53710598aa96572ac01504b38f384356d5c8fba791d0250db148919

  • SSDEEP

    24576:sv1Okt3JTNHwAFgxa/ZGSylS12LOxZCiocoEuZ7mdOHfM0OAw0:sY43JTNQ0gxuGSCj8CiocEpOAz

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fjhs3k02d\gui\3118.html

    Filesize

    29KB

    MD5

    133b3fb5828fc8eb31e49c4a3e6963bc

    SHA1

    d51484bf91fdd70089cd8cdb9f8447d57a7a30eb

    SHA256

    597e26b68b6e91ef0af5f583f3631ff8a3bd84367fb5c1dc579d3750a8168307

    SHA512

    950a727e99a34b7fe6a21cf7370e66801223f67f71c35795dc0bd07848251186a09201b9286c4e1659e086427699e78e6eb64eb360f81d90e94f8f3e6b8b2d79

  • C:\Users\Admin\AppData\Local\Temp\fjhs3k02d\gui\page_3468_attr_3.png

    Filesize

    10KB

    MD5

    d34103434d594f426447edfa02244bb6

    SHA1

    320e63503f10e70a64cad286e885bc1f9e229da7

    SHA256

    aff1063413d7b4850023e77c50dd455072dc6e44394ac9544e911809c42da3dc

    SHA512

    c3f767030f374f75ffee5536e41f57e507029a97adde1132f9282611e35c32b7d106104548532783f2977c7688a0c60f043c8988bf4037c744edfdb0e63130c5

  • C:\Users\Admin\AppData\Local\Temp\fjhs3k02d\gui\page_3468_attr_46.bmp

    Filesize

    41KB

    MD5

    19cafe521085d306aa66d256bce120c6

    SHA1

    a41ae63f80dc451fb68a34f64aa86867f2cdbd6e

    SHA256

    ce22b3fa0bb7ad842657737c51a287caea2623019fcefbea4906462f49e31894

    SHA512

    936e0ca8f2accfaba11dc190e89ae3d19e2ba0963824e87c24ab7e1cc006cc7232163c90924a1e93abe7d602b64b4b5543544e114d9059ea56b6f28535c8527d

  • C:\Users\Admin\AppData\Local\Temp\fjhs3k02d\wizard.xml

    Filesize

    7KB

    MD5

    eb9a484a2e1cb6e2f8cdb0d9c285ea02

    SHA1

    f3c9403e30a7839eb57d3be19cf7d2cd0a5c33c2

    SHA256

    ea52b7d1ec71fdefd2347e0c333657ffcd5de6aa0d5a0e514a521464cd37a03f

    SHA512

    ae0daa8a6bd6df1d3e5b5f935114b605fb6c3b91cc79fba911fd9073295e4187649046a395b48abc009b35c37ddee27e5566472a98370eb4b2a357fa3cf3735e

  • memory/1964-0-0x0000000002A50000-0x0000000002C0B000-memory.dmp

    Filesize

    1.7MB

  • memory/1964-89-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1964-135-0x000000000A6B0000-0x000000000A6D0000-memory.dmp

    Filesize

    128KB

  • memory/1964-165-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1964-167-0x000000000A6B0000-0x000000000A6D0000-memory.dmp

    Filesize

    128KB