Analysis

  • max time kernel
    174s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 20:51

General

  • Target

    2023-08-25_d3e46767c36889fbefe4aad594b6ac3d_mafia_JC.exe

  • Size

    3.1MB

  • MD5

    d3e46767c36889fbefe4aad594b6ac3d

  • SHA1

    851b1d932d55e89ae70bd7620bf0cee1be30178f

  • SHA256

    8adb40dfa9a3ca2efe9b4a851aca94ce8d3616ef40a8cb63394e87ec07c3c195

  • SHA512

    dc69c49bd92dd536fd7651483b2304171be4f7ca3bbaa66e5aa262fcb47e599c3759cda1f00b494e4d4bdb6738094af64286e758a6eacb6901ef40562c0d2e48

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlUFnHXtWWeRsZFaeKCIM7O9:c+8X9G3vP3AMiFnHXPRs9

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-25_d3e46767c36889fbefe4aad594b6ac3d_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-25_d3e46767c36889fbefe4aad594b6ac3d_mafia_JC.exe"
    1⤵
      PID:2820
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1924-0-0x0000000004320000-0x0000000004321000-memory.dmp

      Filesize

      4KB

    • memory/1924-1-0x0000000004320000-0x0000000004321000-memory.dmp

      Filesize

      4KB

    • memory/1924-5-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB