Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe
-
Size
367KB
-
MD5
2e8e3e9f88587fc1d8965b4f45648c6e
-
SHA1
72c3db1c0b9be7aca8a6c4817256c7e967be310b
-
SHA256
435a919e28721fa30911ee164da4631386b99743440e2373b7d846ac135df3d3
-
SHA512
9aa9efb49a4edc97e79ad4cbbd3b33c5a1f2d3835c6f0da226974a299202764898c42c0ed2a9c758215da84127e6b1ab9865adfe653483c4313930a73548d93f
-
SSDEEP
6144:vNgF4DxNuJc06j4YBa77xMQxA5i5knmv1SL/mQXCD47l5Olw8l:vu4lNAtYytvS5Aku1YLCWN8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415808285" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0153fe6036fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2811931-DAF6-11EE-85B9-4A8427BA3DB8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007d849946d346867781748501b0e857b9e97962b92c5e35886e76266efef786cb000000000e8000000002000020000000d001e6e39935b3c0b57a471b50cd331035230a56e26ee020ba930742d0b118a9200000006492154cc2a3812af806cd746dc089884e2be394ec40f5c96a0bc10bf61bd371400000008d79774c39c8e04f4ce8f719b58d23b5a191177a05b4264913bc31f8550ca47524456f42174647ca69469b7b2739c81ea68916a7f484c47b36e145d6805ebebf iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1508 1204 2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe 28 PID 1204 wrote to memory of 1508 1204 2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe 28 PID 1204 wrote to memory of 1508 1204 2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe 28 PID 1204 wrote to memory of 1508 1204 2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe 28 PID 1508 wrote to memory of 3004 1508 iexplore.exe 29 PID 1508 wrote to memory of 3004 1508 iexplore.exe 29 PID 1508 wrote to memory of 3004 1508 iexplore.exe 29 PID 1508 wrote to memory of 3004 1508 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_2e8e3e9f88587fc1d8965b4f45648c6e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/ds2taob.html?s=154&v=155&c=185&a=376&m=&t=16142193822⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542608ede43b71e6c312caf8bbe2e7010
SHA13e9cde26e924379aa51b7db525916b547fdd8114
SHA2569e07ab0fb300f40042aabccd17553cd3b854d39ffdf9d168790a41266b4bca35
SHA5128cf8f0ead1f012edcde6f14253705b9303c080f1f06faa9c09a98493b7d0f4fd98240189609fd470baa96dea46db66e4936b055f04a8f25dc60dc388a201d583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537e9c22930a9c4909ad236036d4b6062
SHA14b8f23f7fae8acca358783e4447cbd4fcbc65c53
SHA25629b1f7a1c0aa07785050c573652329ef6483c84f55b90ed6d3804909544c2d0f
SHA512d8b2572161b5efce533a015980b7dab54e7ad1d608e81ecb9cfc18a1d63b74e5271dbc1169d7fceda5f4fc54ee923c4c2eb3c05d410b19ec973a28d121442d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbb35894e26e9f126b2efbadb1c2d59a
SHA1826175a10b0e587df011f28cafafa200e65685bd
SHA2565a1ce075638181b9c6ceb1dc012971ebebdf8174746a7d87a3c11465501f544b
SHA5123b661179111a5739e7eb88a3f4132505c4e860e1cbba3ecfa97a1dbe0f0b3282df031ba39931f616fc5c5f97327800f8779e31839c5bf3a40ffcdd9b13f17f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5417ebb2362fca077212a7c88a4d881f1
SHA1619896a26c29e4bedaf31e2720969d3f1cc69df3
SHA25673208f73caffa8f86e4ddd5ec8c07bc553360724a896563113582199e6e9913d
SHA51206e5f0f9b60bc31b034493809eb95e0aec0f8b0145e4af8c71fa61a131e2317191032ab674a07152234296bf56c16834cc9f58cc7c8b45ee7d61a70f695266eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5463a89a8c3763d7dc29139f729e84cb8
SHA18e647bb6c67b422e103f0687a9452f9808689d66
SHA2565d2fa850ff4c7bd6aad8c71fc8cba09af6c50079ac6ceacdf443f2fe52a1935f
SHA512a1ac685ffc40de14a89c9032edbe1f80f3e88053c8321036aabb245f3a6b13df1604d647b039ba61ddc259235c813d3a9aad3d8fa32c3f7c5099c7e80b1bc934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638b1fa54f43f84877034f0324ef9835
SHA1804d119a7f09190fb551e096949bc01ba2a2c7c5
SHA25689e87161aea51907a36f9303822392828ac4c3e152f0d90f1c7125702ae3ff0f
SHA512dbfa19f6fb833111ecabe90c54247c9fb411e5b8aacb1c45c341bd856622f829dca9985e73514c1bfb6573edd3945169573fdfb609d44f987c51124d0e856ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdfd45c0852682c67444f47640d5793d
SHA1cefb44302128b3914e8c735efd0e2b12ac55dc2f
SHA256b602a3198fedf795d2b9e1d7df5c306967f2d5445a605965eac2e577804901d3
SHA512dd84428edd2a754e5aafabf6e4a92e71c6ad33b2351298470e511f9cfb0f2e573be9fa485aaa57885093bdb47a4a339bfea39876a45c3bafab874da0539ea311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdde004cf01b62b2148f6c8a7814a714
SHA14be309a5417141f1ee3ef7caab0545889b484df4
SHA256a7cfbad815b41c0c31a7c816d81f796a10b52aaf333483778d448c22c2a9d62a
SHA51291da468dc8d2863a377229bfb58e9e1d738a7349fdfc6c4f2dc1680e5f4bda90b1a8e15e3bbaa15730a6d57662e245e6f045fbaf273776900fab93b732ff9c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3ac723a916981ed717835add1fb2b0
SHA1b39d338218f2e81dff7f2a465e50f092bb987331
SHA25657af46245346e4aae02d898bf9839aaf0332904f39ff46dd67c5d98c1e7b2794
SHA512d2a1a0cd7f67cd67c298fc4e4acd75804394164c618f9c4b3c0d048f56559a27435a29a7b4d0bca588f0833d4d68866de133d77f1f5b652981f8d4a9065270de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598fa980405ad657e6900e35f424df1ca
SHA1b2b067f648a625d61abeb8de83a84865214db9d4
SHA256a73436c025c23ae084a2e1a5f0cfc933f36788b2308663f23606a1d683aea58c
SHA5120f8862353cb384eb63dddc9e755199b3421c971388f1a69d18624982c0581e37d8d5f335a99607221ead7aff3c4b2c497a8f6b56a7a74d3fb492766f4d828ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9d081a69524a734fcb13ce7ea0fa6e
SHA1a5fc380ac273062987000e40d450d050fd408fde
SHA256114242a2e7d25d29dd07b39e8a65ac86949cab9423a06699b77b6cc1b5b278c0
SHA51238ebc96680db92592b9f30bea79f5e9e646c6ba0a53d0ad3124289737a85e35c762067fcda4e3e25e7cb0df4865a4a3f405315acc778e1cb94cac0a4318254a8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63