Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_544fbfdee381a4aab63c645c3f8ffa13_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_544fbfdee381a4aab63c645c3f8ffa13_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_544fbfdee381a4aab63c645c3f8ffa13_mafia_JC.exe
-
Size
4.1MB
-
MD5
544fbfdee381a4aab63c645c3f8ffa13
-
SHA1
e4afd390a349c14ded0db5765acad9305e9f95bd
-
SHA256
cb30d45a9f31c08928cfd8f36051de95c46986ad7e97174952b3683016f3dfce
-
SHA512
2ca130e6459f66877c4875a872920dc5085f1beadb15fb5a188ca964c0d679d47a75f1e9501aa69a933dd3ccc6be7977e15175e76c73d8c2af4b6b4afe9d7db2
-
SSDEEP
49152:j9yiCJ5rFwnANZGEXep+9TxFegOSDAmosh3ANkTTla2UhYtwziKBV6jYmwIi:8J5rFwnApezgOS9V3AMwWgkxi
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2972 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe Token: SeShutdownPrivilege 2972 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_544fbfdee381a4aab63c645c3f8ffa13_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_544fbfdee381a4aab63c645c3f8ffa13_mafia_JC.exe"1⤵PID:2568
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2972