Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe
-
Size
914KB
-
MD5
812596befe2e8bef7cdc5a9a58263a93
-
SHA1
f66cc37ae9325f66025d72ee9115a0aae944ec0c
-
SHA256
a088d7564fb65b19859e8bfc864617b39a19bfdb156ea24cebbb05edbb9240ea
-
SHA512
c06cb3ae5aa19faead6b42e305bd5e7624b1c597aab612193f8c42dc48cd2cc90d01a061c93bdc89eb1358d3fa20cdc37d6fcf00c37d77bf2922aa5274debfc9
-
SSDEEP
24576:Q7yg5hfAghoRcrwb27XlmrtLQJDtD/yQ5CY7U:7uhfAU3m27QrtINCY7U
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BianyaAcc_2024061106 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\BYNews.exe\" -mini" 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\BianYa\ = "{23170F69-40C1-278A-1000-000100020001}" 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\BianYa 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\BianYa 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\BianYa\ = "{23170F69-40C1-278A-1000-000100020001}" 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\BianYa 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\BianYa\ = "{23170F69-40C1-278A-1000-000100020001}" 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\BianYa\ = "{23170F69-40C1-278A-1000-000100020001}" 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\BianYa 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\BianYa\ = "{23170F69-40C1-278A-1000-000100020001}" 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\BianYa 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2884 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2884 2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_812596befe2e8bef7cdc5a9a58263a93_mafia.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2884