Analysis
-
max time kernel
142s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe
Resource
win7-20240508-en
General
-
Target
2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe
-
Size
1.3MB
-
MD5
364a5f2c0fe182076123d0fd29c99274
-
SHA1
8f21a28e0c3bb8dd3784be5ac557b031288727e4
-
SHA256
4db6cf843b4c65e7a3e7c87918c74c1565d6fb346e132b02a95435d568d60328
-
SHA512
31028d32bce5504ac0adaf6880935bf308773bb98d2ebbc3adfc551d4a024657bbb406986204432cadcc00c371df85fd80ea7f85d85e6d33e79a8acbc8090aac
-
SSDEEP
12288:q60B8l6jaOC4owiDhTFjpK0GMFgRnAkZFHANU+:q6FnOCsiDjpFGMeRXFn+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3940 cpllsa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\Z: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\Y: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\U: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\W: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\T: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\R: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\Q: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\M: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\J: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\X: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\K: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\I: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\V: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\S: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\N: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\H: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\G: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\E: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\O: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File opened (read-only) \??\L: 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cpllsa.exe 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe File created C:\Windows\SysWOW64\cpllsa.exe 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeChangeNotifyPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe Token: SeBackupPrivilege 3224 2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_364a5f2c0fe182076123d0fd29c99274_mafia.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
C:\Windows\SysWOW64\cpllsa.exeC:\Windows\SysWOW64\cpllsa.exe m3i1⤵
- Executes dropped EXE
PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD559babb838a876914f6b5402512da3d41
SHA1eb72a9af96d374bc1d0045513ae1f4541060a7e5
SHA256443c07a2c83b7b0253a325d2b72ac757c3aa5b41cd749842bc74fb3ee9b26866
SHA5126c7f7fd694df9949b4716d009242b423216aa52e579414505406d6d3fcaa84fd8c9227e55eb80d28ba40068d80fd6f8be089f2b655ebc72872cd226236fa97ea
-
Filesize
1.3MB
MD5364a5f2c0fe182076123d0fd29c99274
SHA18f21a28e0c3bb8dd3784be5ac557b031288727e4
SHA2564db6cf843b4c65e7a3e7c87918c74c1565d6fb346e132b02a95435d568d60328
SHA51231028d32bce5504ac0adaf6880935bf308773bb98d2ebbc3adfc551d4a024657bbb406986204432cadcc00c371df85fd80ea7f85d85e6d33e79a8acbc8090aac