Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe
-
Size
806KB
-
MD5
41e766366642548e1fe460443cb42059
-
SHA1
666f5034f61810e6ff22aa7f1b90c1f41acd9eff
-
SHA256
9dd8f7fcd28b2c0115ead28250493afc07ccb8cb6022ce3c5a8a5ef453325580
-
SHA512
ab3606398d2090dd031966d033a40fb7578f44ec2280b39745c6b9e05e81dabb894a061d619265470de37000132bda7180b676c72471a1e049fe3e9b7aaa268d
-
SSDEEP
12288:EIJf7dcTDvOMf7TgzVddzdhxFE6nBuWsrv2GMgbEIcOuw/vRd4SVXXxNDhaUs2bT:EIJfvMfaZFECIcOlnpvDzs2bsT7o
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wxlog\XiconShell_2024_06_03.log 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 1868 msedge.exe 1868 msedge.exe 2160 msedge.exe 2160 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2160 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 83 PID 2336 wrote to memory of 2160 2336 2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe 83 PID 2160 wrote to memory of 2416 2160 msedge.exe 84 PID 2160 wrote to memory of 2416 2160 msedge.exe 84 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 2968 2160 msedge.exe 85 PID 2160 wrote to memory of 1868 2160 msedge.exe 86 PID 2160 wrote to memory of 1868 2160 msedge.exe 86 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87 PID 2160 wrote to memory of 2696 2160 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-02_41e766366642548e1fe460443cb42059_mafia.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://wap.tanwan.com/htmlcode/97650.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd952e46f8,0x7ffd952e4708,0x7ffd952e47183⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,3888725182255827435,2114884995529250481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:23⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,3888725182255827435,2114884995529250481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,3888725182255827435,2114884995529250481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:83⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3888725182255827435,2114884995529250481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3888725182255827435,2114884995529250481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,3888725182255827435,2114884995529250481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD53184368b7280dc41fdd5c28330a8576f
SHA14ae199684e42e9912877f91d523d7a1f210f6fb2
SHA256ab5fa11adbb627f4b13a0108c6b36d6ba6e9f41caeb5ac2d545dd333ca247621
SHA512abfd333c6d04b911403ca93f9be88e45a59ac434fdaf9fda111437ae12ca7eb7e576794fa378c7349019d61c0b877c50a00d4be4a0408c2a70ca2ee69714aa8c
-
Filesize
253B
MD56d1e2df47ad8c41a549a05b11d8602d8
SHA1fb640a854e5bee57035197430095bfef29f69db7
SHA25645a026e3eae064fbdcb9186a567f6ab47940cc7ba122f2b99b0f2428894ea5af
SHA5121ba9943f74beb44aa3ad7f4fef8014a8559d797fc5da876659de2441fbdf82863ec14c5e58cb6a9a8e6d369da9d5369f367c037fc4318396a9f4d877802848e5
-
Filesize
5KB
MD58fa159af5723b7ca40f51ee69a27415c
SHA1e3bf489bf415dc87498867fd631b95491406f70d
SHA256c62dbef577c1b25a00a26de49446d160a29283748816a9db78fce280411fc208
SHA512511a0c53fd704677f8a47ebc588cd18fc27edd65a425cdc1cf8c43e96a35643f7043382a4b4ed85dcacf66516be9adeaaa382f81b9a4367c04d82b33396ee7d2
-
Filesize
6KB
MD594924b9b3af96cebe0207a2ebb41c23d
SHA1cc4720a201bbff872c48e072dc380b80ff7e39bc
SHA256e076692375482e75b0b27e2b0f26a0076c2f24538b81b2a8efced3043e193207
SHA5126ecb71cc2c98b97a5291852c61625a528c38b6c21c050aec766b3be50c8d32222da9a007eacae19c38e075e6d8337051b2b586e4c2e8407b23d77b1e1f76f688
-
Filesize
11KB
MD5a280b4f2e311f4e9be157d7f327b7678
SHA1b51ac2960ae32c2554bf761748e86ee157d69bc6
SHA2569199f4cf0cde975ac4e74d9b12708e723a62b38b1848cc85ebd680dd3aefa053
SHA512f3ee0d080586b4fdd17e549e2b5365228da40853a56c62d3005e771174ab3f0d4052079dbe8311bbf330568b9ea5c9652f9b116b6a136cda97b88bfcaa635628