Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe
Resource
win7-20231020-en
General
-
Target
NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe
-
Size
1.5MB
-
MD5
c756d2db2d9644bb7199eff3df3e6254
-
SHA1
3eaf410412e26e30381b435d0a765c668e9eab8a
-
SHA256
7f96f91bb08b71cfc13d95db38f3035a4efa1a0e835683e2b165488ee4d929fe
-
SHA512
04079c2dae1fee2c85f33b915669e7ff754e3811dced4e8b3fd36bc7d1dcc70db124f18242e896f860788f905e4235e863569253e28c070dde6e0d9c681c4bc6
-
SSDEEP
24576:T2/r48zC6/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:a/08m6LNiXicJFFRGNzj3
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2536 alg.exe 4652 elevation_service.exe 3972 elevation_service.exe 384 maintenanceservice.exe 4132 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\394c0e05cae432ce.bin alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_125046\java.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe -
Modifies registry class 52 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CLSID NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577} NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ = "ICphsSession" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1\CLSID\ = "{C41B1461-3F8C-4666-B512-6DF24DE566D1}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CurVer NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1} NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\VersionIndependentProgID NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\HELPDIR NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A}\ = "IntelCpHeciSvc" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\ = "CphsSession Class" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\0\win32 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\AppID = "{11AC3232-E7D7-49CD-ABFE-501700100B3A}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1\ = "CphsSession Class" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CurVer\ = "IntelCpHeciSvc.CphsSession.1" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\ProgID NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40} NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IntelCpHeciSvc.EXE NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\IntelCpHeciSvc.EXE\AppID = "{11AC3232-E7D7-49CD-ABFE-501700100B3A}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\ = "IntelCpHeciSvcLib" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\Version = "1.0" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\TypeLib\ = "{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\VersionIndependentProgID\ = "IntelCpHeciSvc.CphsSession" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\Programmable NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\TypeLib NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\ = "{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A}\LocalService = "cphs" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe\"" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\ = "{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ = "ICphsSession" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\ProxyStubClsid32 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\LocalServer32 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\FLAGS NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\0 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A}\LaunchPermission = 010014806400000074000000140000003000000002001c000100000011001400040000000101000000000010001000000200340002000000000014000b000000010100000000000100000000000018000b000000010200000000000f02000000010000000102000000000005200000002002000001020000000000052000000020020000 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\ = "CphsSession Class" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession\CLSID\ = "{C41B1461-3F8C-4666-B512-6DF24DE566D1}" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577} NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A91E0BDD-79B0-42C5-A3A0-5BE434329577}\TypeLib\Version = "1.0" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{11AC3232-E7D7-49CD-ABFE-501700100B3A} NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IntelCpHeciSvc.CphsSession.1\CLSID NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C41B1461-3F8C-4666-B512-6DF24DE566D1}\ProgID\ = "IntelCpHeciSvc.CphsSession.1" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{66DBA565-0D3D-4D8A-9391-A2A4CF16DF40}\1.0\FLAGS\ = "0" NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1520 NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe Token: SeDebugPrivilege 2536 alg.exe Token: SeDebugPrivilege 2536 alg.exe Token: SeDebugPrivilege 2536 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_c756d2db2d9644bb7199eff3df3e6254_mafia.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4652
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3972
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:384
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD51cbd758c067969b6d208bb2f4ac17356
SHA1a7870092f040d0eeb661e3e46c9967aef452129e
SHA256e89cf24e914dca9dc9eba1cd18bbc0581da31296a889e044b7056b8d14bcdfaf
SHA512b33074c267646e9d97d002edc937fa41ecc1543ff0bc190fbd81e9ca85ab0465e5807aa6d781ac58e46379a3acf7fb3d552f671b272446f01c4288c60ed22fc8
-
Filesize
1.4MB
MD523664ddb987fadddbf0b1754df3eead1
SHA1abd751fe7defd793ab56d37c670e43a4e4f8b48c
SHA256c5a65096f3069279453b79206ea39e606f25d7b019829e62ac348b8c4a2fc41b
SHA512b53dc6371ac83d9e7391414dd1a13f02c9c99f339f9d1231482a13af8a27179b8023a40718583304ef75cb5d068324904a3c28747ab620c59a4c3bf2c81316dd
-
Filesize
1.5MB
MD5a7499b175ed9049c0465d43a2d224520
SHA16c56c21aafbcb9ecab5c87917c4edc8dfd6e9809
SHA25690e4a7005043e39044c0fba148e24c070637bdd38b7996cf47c0cb1562a36d1a
SHA512666270aff78bdf9fbc8f60ac7f5d6ec38045286559540f2316cbddb928eba2c82ad7dc0c1d4f56a6b6c6aecca66f447c356796df746bda8c649c2e35db28628c
-
Filesize
2.1MB
MD5c70dcd79fb386033ab380e6bdde90908
SHA160a1ec8dd864fa8e7e9e44b9c2c4e2b73e23afa6
SHA2560e4f938cce95afc9be6181145442938140a14f962c11fd1390d28bdf4f7957d3
SHA5124972eb2472b90ab9c98972a143edf4164a8bb67beb6fb378f7ab2a2085bd8cdff33ece8981891b2c1a39be66c253e2d224c9388b24e0e02df0525de960217fb4
-
Filesize
1.3MB
MD504793f9ffa70c3a11b3263078b707585
SHA1d8e1787921ef84ac4e70c6c708cc39b866f1c75e
SHA2569fbc0ac24a9ccde6b0af476e6227f9404a8cdab815a527e5bd54dae068a98e0b
SHA512fad5535ec210cd8e94192d14814f2981c348b0a60fd31ec3f159183d3f2ce91b119b6bf55292e56361a05b9b2e99d1494b2296192909048baceb37403d2c9472