Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe
Resource
win7-20230712-en
General
-
Target
7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe
-
Size
1.2MB
-
MD5
7a9b9f1f294c7b9dc0300d7be856ce91
-
SHA1
09839b13b355b23341ee3ede17a27d2d93dac9e5
-
SHA256
2242a74b85a02094e99c1d96494729aedcf84232ba373bbf65be6f8b8208ee2f
-
SHA512
0526e18f4c67ae549b57913abdf0996b4e8137b225da93253ba25f251f686b884795c07ef53710598aa96572ac01504b38f384356d5c8fba791d0250db148919
-
SSDEEP
24576:sv1Okt3JTNHwAFgxa/ZGSylS12LOxZCiocoEuZ7mdOHfM0OAw0:sY43JTNQ0gxuGSCj8CiocEpOAz
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main 7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1964 7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe 1964 7a9b9f1f294c7b9dc0300d7be856ce91_mafia_JC.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5133b3fb5828fc8eb31e49c4a3e6963bc
SHA1d51484bf91fdd70089cd8cdb9f8447d57a7a30eb
SHA256597e26b68b6e91ef0af5f583f3631ff8a3bd84367fb5c1dc579d3750a8168307
SHA512950a727e99a34b7fe6a21cf7370e66801223f67f71c35795dc0bd07848251186a09201b9286c4e1659e086427699e78e6eb64eb360f81d90e94f8f3e6b8b2d79
-
Filesize
10KB
MD5d34103434d594f426447edfa02244bb6
SHA1320e63503f10e70a64cad286e885bc1f9e229da7
SHA256aff1063413d7b4850023e77c50dd455072dc6e44394ac9544e911809c42da3dc
SHA512c3f767030f374f75ffee5536e41f57e507029a97adde1132f9282611e35c32b7d106104548532783f2977c7688a0c60f043c8988bf4037c744edfdb0e63130c5
-
Filesize
41KB
MD519cafe521085d306aa66d256bce120c6
SHA1a41ae63f80dc451fb68a34f64aa86867f2cdbd6e
SHA256ce22b3fa0bb7ad842657737c51a287caea2623019fcefbea4906462f49e31894
SHA512936e0ca8f2accfaba11dc190e89ae3d19e2ba0963824e87c24ab7e1cc006cc7232163c90924a1e93abe7d602b64b4b5543544e114d9059ea56b6f28535c8527d
-
Filesize
7KB
MD5eb9a484a2e1cb6e2f8cdb0d9c285ea02
SHA1f3c9403e30a7839eb57d3be19cf7d2cd0a5c33c2
SHA256ea52b7d1ec71fdefd2347e0c333657ffcd5de6aa0d5a0e514a521464cd37a03f
SHA512ae0daa8a6bd6df1d3e5b5f935114b605fb6c3b91cc79fba911fd9073295e4187649046a395b48abc009b35c37ddee27e5566472a98370eb4b2a357fa3cf3735e