Analysis
-
max time kernel
55s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe
-
Size
1.8MB
-
MD5
48179b0813f5c138f8e1d6f8fa1d7cc6
-
SHA1
29a566ccfeedc7a0eef248c7dbd2e6daf6e90f46
-
SHA256
14bf1596ef71450482fb4b11300d8b9dd3339bc20d9c28291918dd4ccd9676ba
-
SHA512
28ed060a11c588522bbb438c3b42fadcd38fe84c990dc4d5736b444fcbaab990e5d138f2eaa22cfbb379bcfac9944477d08c6acbf45bccbc496e924d56dc0628
-
SSDEEP
49152:mJc1DfI6yGhgMyM3GI+XVEeSTuwpEwh4bOEuQF77Sl1vO54jkMQsoKZ:hDw6Rh6ML+XVEZTuwpEwh4Og77S3O54w
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Internet Explorer\IESettingSync 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe 2252 2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_48179b0813f5c138f8e1d6f8fa1d7cc6_mafia.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51d064767b1b2eaf5683e5a0bb3cd7726
SHA1555b40da7e964c7a32b4d9547982ddd3aacab059
SHA256b1c9499cf287e0c2e627c2779c33375e0ced6266cdac47adf95e700da0610254
SHA51223e616e251ff700ccf3a59d39a5210deeaf29b327c59aa8ad28eb51ec8e90225c2f983fe65dec06efd6e02e296fe7de64225d530978772ac245eb477ba53aad7