Analysis
-
max time kernel
167s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe
-
Size
484KB
-
MD5
44614306d01779d09d2754b7efa153ff
-
SHA1
0cc1a6ff366b8c2ebe68cf30f792d85ce47c8cbf
-
SHA256
ec6c63c93f128dd7db611dc3a7ac994c043fac27d4810ff7d053222dfa8e775a
-
SHA512
3aad0e082c13c26b496e2c9e3deb07663ae638f3274b59effb029d1d349275ea05c453bc3d18fb872a807e75ee65e227f8ba8fecf522467dd184bb82e1628c29
-
SSDEEP
12288:iu4lNAtYytvS5Aku1YLtxdkUoDj9JU01tuMsTp:iwhtvSLuCeUoPo0uM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001525ae190b18d34db1dbd7ec81932576000000000200000000001066000000010000200000003cef3ac3a94936cc72f90199f75308453580913cb018f1915162d9853f636e62000000000e8000000002000020000000635f1e46179d2aa32bb2852e1a8e40dba8aed91183fe856d3a99a9c8700472bf20000000b7f7dd9641f3c797b72f4454ffcb6328ee73ce36e32058703009914b056bcd2a40000000e94beb7aa70c3ded28df3c444f29a5e9c6d615b1df72830d199704f8f154e1477dd3e92cc5821ae536aef7fa412087a8c493fa9f7546e9d7708f44ce5edab3fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DOMStorage\gtimg.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\gtimg.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e366c5cffed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2772026515" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2772026515" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "404074532" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31063759" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CEF5C114-6AC2-11EE-8688-CE3E7C77A9B8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31063759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105129bccffed901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001525ae190b18d34db1dbd7ec81932576000000000200000000001066000000010000200000003ca318a3c6030e4ce0723fa49a7e03b76b3361f03a50284afdc99b2325f9c4d0000000000e80000000020000200000007cd21d3f5f28ebb005eb483aca65bb525e9f8a9e80242d335051428691a594c720000000febc93e464118ac847a6aa46b6cabc1171a19a68b2626735d2a50a1b2c5b5f80400000005c0fe2f77945b1c767a1602fbae6cdc8923f86a7d9b6a059b4fa26bd136da764148bc69fffd46aa454ff13ecbc954c4881a543093016c7b0bc8fb26d3d740863 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703639cbcffed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\gtimg.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001525ae190b18d34db1dbd7ec8193257600000000020000000000106600000001000020000000d105702a4523b9b779e6e23d75f0e86f8d4d1f492c89bd6f8a22d9026d366fae000000000e8000000002000020000000036136ad2e86fb9bf0fda4d4a546d62f2ab4a53dc257a5c1c8cbb5d8705e1f7d20000000399bc42017330213ad6efefa5d30815715620b033404b81ae71f8e34b420ee0b4000000075c9bd671a69a45e3903764cc681728687a728d0068508fd9acfe1c80ade7e4b0c6aa4c4ea3a2dd4354c8f1b50ca86e8af84f7356f082797614e8a60c2940ec6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1926387074-3400613176-3566796709-1000\{FFF13D18-A37B-457B-9168-F54E4712991F} IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3920 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: 33 3136 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3136 AUDIODG.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE Token: SeShutdownPrivilege 2440 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 2440 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3920 iexplore.exe 3920 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3776 wrote to memory of 3920 3776 2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe 86 PID 3776 wrote to memory of 3920 3776 2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe 86 PID 3920 wrote to memory of 2440 3920 iexplore.exe 87 PID 3920 wrote to memory of 2440 3920 iexplore.exe 87 PID 3920 wrote to memory of 2440 3920 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_44614306d01779d09d2754b7efa153ff_mafia_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/rxzgzb.html?s=140&v=141&c=148&a=175&m=&t=16146062692⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3920 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD51ba1de46fff8c9bde173cbf50bcf8ecb
SHA1c23239e4a3f4c10e854cdae25c68a989625276a9
SHA2561ab3a6867859ded1e6d4ee4f8a34497371708136b846cd7fe276cac6f3735e89
SHA512755dba15581f148f58cb1eb89f7f32b06ca6da551206d5f4fa04b35bddafd095b2c57576c90c3b6c8579a99df9053bf59b52870b85d2956b56ac3035a26946d8
-
Filesize
79KB
MD5cf1f7b5f26170b63eb1a5fea4abb05a5
SHA1d03a929c5f82d8d31cd8e9aaa0b686086a15ae6b
SHA256bc4ac878d90b7721264cb605ea1efae6bc7ab573c801620651416fab052c1f4a
SHA51297954bd96e60bbc32934db460ae71ceb8122e6be0e01b7bdd98a9a30d0744fdb9bb56f3cf65ef3967372ede0c60e0400d129375a1d9ba80eb07e779c54806588
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
43B
MD5ad4b0f606e0f8465bc4c4c170b37e1a3
SHA150b30fd5f87c85fe5cba2635cb83316ca71250d7
SHA256cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
SHA512ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910
-
Filesize
7.2MB
MD586f9f13f354a7948803009d2909336c2
SHA1cbf093676a5c6d21d1666ede7d958eb9b235eba4
SHA256f57c7a5854ddd02bac462eb3a0bf89a72f27c2790196f0181c9b137e3594d5fd
SHA51207ad1b39b2e180be14a26efcaded0ce137d9e5aa711329e865a6b153ce6c72b09b99ce58cb8e0995eb47a2b7654756c4d12a3c73e417c4c094dfb5f88d0b6f6c
-
Filesize
10B
MD574e1080b5e3125ca3a5abc7b340399aa
SHA1b1e150e5809482e54c347d440f1824179c0d6d5f
SHA256623017a5748ff1b4e9d0f227f5cd58869ae4959d1ca8fd204c9441cd11e2695b
SHA51251985a333a6c225976863cf49eca3492f5b8a61f525d08d0bc69c25a7eecaad6fc3ec6f71420f06bb1c3fbfbd197eed6c5c4a99929bd0dbdee73ec2f88265f80