Analysis
-
max time kernel
54s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe
-
Size
257KB
-
MD5
337eb10e84de4980f2cd0f9d68badb1e
-
SHA1
076bd34d98789642f0372a11c8764caf7aa51d50
-
SHA256
35346e9c61d4ba2953d0c04a23e927855dccfab2ef619ec47f63635adb670f56
-
SHA512
e9e9edcf6f310609220bc742f5102e5d703db1a97194d623fa63c16cb6de69aa3d960a94ddb9c8647d60fc3d41dceee3baa213381fc80a554035bac9e45e5c21
-
SSDEEP
6144:nCEgOZk0cU/1ZMuo3a0k+iqgw4uMHKdhXo6:CEgJ0Ziq0k+iqgwW4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2684 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 28 PID 2668 wrote to memory of 2684 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 28 PID 2668 wrote to memory of 2684 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 28 PID 2668 wrote to memory of 2684 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 28 PID 2684 wrote to memory of 2680 2684 chrome.exe 30 PID 2684 wrote to memory of 2680 2684 chrome.exe 30 PID 2684 wrote to memory of 2680 2684 chrome.exe 30 PID 2668 wrote to memory of 2288 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 29 PID 2668 wrote to memory of 2288 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 29 PID 2668 wrote to memory of 2288 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 29 PID 2668 wrote to memory of 2288 2668 2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe 29 PID 2288 wrote to memory of 2880 2288 setup.exe 31 PID 2288 wrote to memory of 2880 2288 setup.exe 31 PID 2288 wrote to memory of 2880 2288 setup.exe 31 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2696 2684 chrome.exe 33 PID 2684 wrote to memory of 2888 2684 chrome.exe 35 PID 2684 wrote to memory of 2888 2684 chrome.exe 35 PID 2684 wrote to memory of 2888 2684 chrome.exe 35 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34 PID 2684 wrote to memory of 2000 2684 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_337eb10e84de4980f2cd0f9d68badb1e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6af9758,0x7fef6af9768,0x7fef6af97783⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:23⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:13⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:13⤵PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1468 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:23⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3228 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:13⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3512 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3628 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3744 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3724 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 --field-trial-handle=1300,i,4492598760436961427,8973288866872368473,131072 /prefetch:83⤵PID:564
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --multi-install --app-launcher --verbose-logging2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x15c,0x160,0x164,0x130,0x168,0x13f907688,0x13f907698,0x13f9076a83⤵PID:2880
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD511b9ef326a4851ce75c5768187b8d574
SHA1ebec9cc2871219a70441db5dbab6d6c1e73b70fe
SHA25692e236809af52434ee84e9dd0494b4748b40d3b6729a76c9f5d456dee9e6c7bc
SHA5120e8f39bcb557a7ab92db8e26c3d913f722ca84d2e7ba6bee706eb3aa21ae86a924e6abf529a62b6f7dd7104bcfdade25fe7b364d138fb2da60e71399eb79304c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5ba35b0e054a780dd4ffbec8c92659de2
SHA118b583fe714c6ac191990cf4cec2f07bf5957c86
SHA2560ecbe7ab002758b35ba5ad9b5ba5b34385bec0e248d35fc22b44bcd4b1a29e02
SHA512f99d71e2356224b0de75752231b7c7f6e81e889c529b1d4d9e4b36141636376b6f3d3b1bd313dc68c21f1c3645eecafe6b195bd53d3964bd824591e286c5a08a
-
Filesize
4KB
MD5de31460b08bf4287697203bff84d3956
SHA1ebd363535a0e060cccddfac3cf4aded353949562
SHA256f806a61252db9573fbddd4a922f299dbd0d9bae07f65e40bc59bbd24dabea800
SHA512b69da868a04ae835e9ccc97c0169123485d0eb169866b3172b1153e17ead54b54a1ae1ddeff2bb9be8f4132b5da1cc8df63840dce98ed7ef18c6f9f863cb8fb5
-
Filesize
4KB
MD5dd18534cf3a07ce8c5e857f2d34afe61
SHA1ce82fa49907c984dd77057edb50c7db1055ff817
SHA256778e01824c6845d62ecfad11a471b4f299698278424ed2bed6dd454ad982019a
SHA512058c9ee48f583698376530691ffd7155e2e2c840eae1f5600b8c8e9294170a2a80681894fdd5778fbc83cb13895cc325823a829094926fc2f960703b996e6289
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2