Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2023, 20:37

General

  • Target

    NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe

  • Size

    1.5MB

  • MD5

    c756d2db2d9644bb7199eff3df3e6254

  • SHA1

    3eaf410412e26e30381b435d0a765c668e9eab8a

  • SHA256

    7f96f91bb08b71cfc13d95db38f3035a4efa1a0e835683e2b165488ee4d929fe

  • SHA512

    04079c2dae1fee2c85f33b915669e7ff754e3811dced4e8b3fd36bc7d1dcc70db124f18242e896f860788f905e4235e863569253e28c070dde6e0d9c681c4bc6

  • SSDEEP

    24576:T2/r48zC6/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:a/08m6LNiXicJFFRGNzj3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Modifies registry class 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1520
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2536
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:4652
  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:3972
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:384
  • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:4132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

    Filesize

    2.1MB

    MD5

    1cbd758c067969b6d208bb2f4ac17356

    SHA1

    a7870092f040d0eeb661e3e46c9967aef452129e

    SHA256

    e89cf24e914dca9dc9eba1cd18bbc0581da31296a889e044b7056b8d14bcdfaf

    SHA512

    b33074c267646e9d97d002edc937fa41ecc1543ff0bc190fbd81e9ca85ab0465e5807aa6d781ac58e46379a3acf7fb3d552f671b272446f01c4288c60ed22fc8

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    23664ddb987fadddbf0b1754df3eead1

    SHA1

    abd751fe7defd793ab56d37c670e43a4e4f8b48c

    SHA256

    c5a65096f3069279453b79206ea39e606f25d7b019829e62ac348b8c4a2fc41b

    SHA512

    b53dc6371ac83d9e7391414dd1a13f02c9c99f339f9d1231482a13af8a27179b8023a40718583304ef75cb5d068324904a3c28747ab620c59a4c3bf2c81316dd

  • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.5MB

    MD5

    a7499b175ed9049c0465d43a2d224520

    SHA1

    6c56c21aafbcb9ecab5c87917c4edc8dfd6e9809

    SHA256

    90e4a7005043e39044c0fba148e24c070637bdd38b7996cf47c0cb1562a36d1a

    SHA512

    666270aff78bdf9fbc8f60ac7f5d6ec38045286559540f2316cbddb928eba2c82ad7dc0c1d4f56a6b6c6aecca66f447c356796df746bda8c649c2e35db28628c

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    c70dcd79fb386033ab380e6bdde90908

    SHA1

    60a1ec8dd864fa8e7e9e44b9c2c4e2b73e23afa6

    SHA256

    0e4f938cce95afc9be6181145442938140a14f962c11fd1390d28bdf4f7957d3

    SHA512

    4972eb2472b90ab9c98972a143edf4164a8bb67beb6fb378f7ab2a2085bd8cdff33ece8981891b2c1a39be66c253e2d224c9388b24e0e02df0525de960217fb4

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    04793f9ffa70c3a11b3263078b707585

    SHA1

    d8e1787921ef84ac4e70c6c708cc39b866f1c75e

    SHA256

    9fbc0ac24a9ccde6b0af476e6227f9404a8cdab815a527e5bd54dae068a98e0b

    SHA512

    fad5535ec210cd8e94192d14814f2981c348b0a60fd31ec3f159183d3f2ce91b119b6bf55292e56361a05b9b2e99d1494b2296192909048baceb37403d2c9472

  • memory/384-64-0x0000000140000000-0x0000000140221000-memory.dmp

    Filesize

    2.1MB

  • memory/384-62-0x0000000001A50000-0x0000000001AB0000-memory.dmp

    Filesize

    384KB

  • memory/384-58-0x0000000001A50000-0x0000000001AB0000-memory.dmp

    Filesize

    384KB

  • memory/384-51-0x0000000140000000-0x0000000140221000-memory.dmp

    Filesize

    2.1MB

  • memory/384-52-0x0000000001A50000-0x0000000001AB0000-memory.dmp

    Filesize

    384KB

  • memory/1520-14-0x0000000000400000-0x000000000062C000-memory.dmp

    Filesize

    2.2MB

  • memory/1520-7-0x00000000024A0000-0x0000000002506000-memory.dmp

    Filesize

    408KB

  • memory/1520-0-0x0000000000400000-0x000000000062C000-memory.dmp

    Filesize

    2.2MB

  • memory/1520-6-0x00000000024A0000-0x0000000002506000-memory.dmp

    Filesize

    408KB

  • memory/1520-1-0x00000000024A0000-0x0000000002506000-memory.dmp

    Filesize

    408KB

  • memory/2536-22-0x00000000004C0000-0x0000000000520000-memory.dmp

    Filesize

    384KB

  • memory/2536-15-0x00000000004C0000-0x0000000000520000-memory.dmp

    Filesize

    384KB

  • memory/2536-81-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB

  • memory/2536-16-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB

  • memory/3972-47-0x00000000001A0000-0x0000000000200000-memory.dmp

    Filesize

    384KB

  • memory/3972-40-0x00000000001A0000-0x0000000000200000-memory.dmp

    Filesize

    384KB

  • memory/3972-88-0x0000000140000000-0x000000014022B000-memory.dmp

    Filesize

    2.2MB

  • memory/3972-39-0x0000000140000000-0x000000014022B000-memory.dmp

    Filesize

    2.2MB

  • memory/4132-73-0x0000000000420000-0x0000000000480000-memory.dmp

    Filesize

    384KB

  • memory/4132-66-0x0000000140000000-0x0000000140226000-memory.dmp

    Filesize

    2.1MB

  • memory/4132-67-0x0000000000420000-0x0000000000480000-memory.dmp

    Filesize

    384KB

  • memory/4132-74-0x0000000000420000-0x0000000000480000-memory.dmp

    Filesize

    384KB

  • memory/4132-109-0x0000000140000000-0x0000000140226000-memory.dmp

    Filesize

    2.1MB

  • memory/4652-28-0x0000000000C60000-0x0000000000CC0000-memory.dmp

    Filesize

    384KB

  • memory/4652-27-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/4652-34-0x0000000000C60000-0x0000000000CC0000-memory.dmp

    Filesize

    384KB

  • memory/4652-86-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/4652-35-0x0000000000C60000-0x0000000000CC0000-memory.dmp

    Filesize

    384KB