Analysis

  • max time kernel
    136s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 18:13

General

  • Target

    2024-09-13_3b7885be54d5de6c5f372c728f0acfc4_mafia.exe

  • Size

    806KB

  • MD5

    3b7885be54d5de6c5f372c728f0acfc4

  • SHA1

    c64b6fed57e396b6fe7595af967ac7c97d3a583b

  • SHA256

    d3d90858f6ca2d643bca04ae0a7e73bed16b0da2c6521d1788ce82d74f4b88b7

  • SHA512

    6b65c9d5e0fb7bf8434ce85460bebc8703c63a38e3a828def1e38be362033e6812f10329a63e4474d37b6fbe95cc6a9a43ebaba0080d9c742eb3386b4eb18d98

  • SSDEEP

    12288:EIJf7dcTDvOMf7TgzVddzdhxFE6nBuWsrv2GMgbEIcOuw/vRd4SVXXxNDhaUs2bM:EIJfvMfaZFECIcOlnpvDzs2bsT71

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-13_3b7885be54d5de6c5f372c728f0acfc4_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-13_3b7885be54d5de6c5f372c728f0acfc4_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://ad.swjoy.com/pub/20231012155736372688/?swqd=sw&cpqd=kq
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1812fefa54f087f44bde82fbf5efe92

    SHA1

    2649a7c1eaeffb9f6b7d2f48ab4d73e0458f7753

    SHA256

    4e13dda771452c8a3b2f19b5cb04b6b12a2a62d75983abbbc26a6cb969403cb4

    SHA512

    d9e83c9853a999276c72981bcac61a2967c64a8ca6194d0a10149c75b5ab24b8ccce3f8cad3bea1a6b50b61d0626163ef942d34fbe31c26576fbfbc9c2ae0aa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    439efb055c9d027a33d9fea4430f4e17

    SHA1

    c3a991e7fb7d30617255173229a25fe721d39c36

    SHA256

    6269d8d54e8d3f50f6f08ae39c10fd9519272029285e8d1a54a2364067e4a85b

    SHA512

    07131be15eed78ab380cb7a39d3527bede56597342ba29be2440b2957bc3e451362b95440524679465dd2f8e6fc29b338a32977667afaf9328469942776ca175

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f59bad0d4c87a30cb0dc79549bf0fd0

    SHA1

    c96d3f237f8466e1ea3e432fe4721146e11cb76e

    SHA256

    8bc5649cf83f179bf9c38915107a711fd2aff72c81e3f23d922a70821b94d6d9

    SHA512

    6bc4b397be148b319bbb91f7b139661e3bc8d7383e442c71412f2ff0508f5833893371dd24870c79546508ce35e99e2ea1667e0b1c76737b967f78bf1a51f039

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94830d07ce6a30b7fc8f69e6afd4c536

    SHA1

    3f8b37e86ed4b2f15ead8d82f6a5708e767b4bca

    SHA256

    91a335189e45423c70434f29c513b972bece06df5c327dfef777ed2e8d6d7d76

    SHA512

    5c0785cc3ceba995c350ca2522d5b107e4cc6319a00106a443e0a7f1d7c772ae522c8809addbdf03fdb39ad839a01de4568559c12f59ba506f4dcbb52c27c930

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd71e2a287590079a0f6dc2acbd856b5

    SHA1

    6c1e3e50cd0579583a206688d78527e1446c0c8d

    SHA256

    eec4f8a9acfbc49abe2875e4eac8cae9b06cd4b9a6125289ad6beeb9b2c6e790

    SHA512

    459ea00a730b976f4efc25e76c3c2fb694211f15ca946f217853899680f900a6d6c622eb85abf73cec386b26e82e26cc0c8461355906f8555c33840d492ff4d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1df45d1f057d00875bef97f98d7a848

    SHA1

    d811f9b4bb3e3b84d85304c11269c93154ae43b5

    SHA256

    ccdc86723d54326d4fa2d2e4ca4cfc538875156429d4040e6c6719a7542b9341

    SHA512

    550c193da058a1f690035dd249300b9d3751ef1388b6e51db81042a2d8da908a5a6482ef450334cbd56c466aff2daf768838ef8cbb394d9370e4fc317d2d18b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5140e3d9a3c47e87a8db7f8a94de02aa

    SHA1

    58d1ca0c55a7f3909eaba75768aedde272fa668a

    SHA256

    63e3e39c5bcd4c46b76148952c0f3bf0debd9cf6fc9179a77add3d71380e4a79

    SHA512

    384a190e88d6d9dae7e5b23444a8accd3623cf36e47fbdd5057b194d0ce65a88793dc3764ff4e99a2543c927c5f67a088b3c00f6cc899811fcb0d5bd2fb9fb7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cfb787f657ba7ddf5868a7aac978f31

    SHA1

    e9fb5b5873a42d02f67a9914893a9686060057ee

    SHA256

    7c48bb163dd111307058c9c78a285256a42cc125443d4efe8299a12dffbbd894

    SHA512

    83e0df77b02a5c175071a56f44262683cfdfe1d5741f03cbe262026de7eb8a0a8502150c49f5a0abdef3b08e8d98168c28843143c7c20f6314c8af1ac5943cf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b09f4bff66c465c1f7d4e7824f0d7db3

    SHA1

    1f117bed20d9f645425d78a9549892bf15eff911

    SHA256

    469cf06ffa5144b65272b4acd3c78e4d2b4b62437464f7add6e0589f8344631b

    SHA512

    982d280a2483e6211e99746a2c5c8c280e7706e006a963a3ac1928f757812107caae46567f35403b60f588faadb7f2c1a8804d52cccdfc40162b7319b28e51b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc2b50958579b883302463066ac2a232

    SHA1

    d77c989baa71bcd321d30d7c67010309dcc7e133

    SHA256

    85e22bd454364e9f119412a97034d1e135602c43e8b9304ec52cbec634144b61

    SHA512

    22c725221e100aa1fd15b1256818b5c252dcb700786ea3b8ba185abc7ddf6c69b5e65ded9263d5a9a088835e2b690a8be18016dddc4e19207db68734a28036f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3646e2aa5c800382bd789cd358eb7440

    SHA1

    ff0c78f7334befb5c5cbd421f72d1e7f0d21b862

    SHA256

    c0a76baa462c124b6c4e2d46a1a042a052fa9bd0dfc774d5b2bca3e7fbd4c3b5

    SHA512

    de1c0897021d91fafc632f8bbc336866aa96bd4552ef579d08d1054ff32d9e6f5e8a3a108e445d1c6d2b838905dffb936334b6cc6b746c70160e225b801d08c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b0b9a41e14d4018ad120a685592fbb7

    SHA1

    005810cf77bf7d5630d7f9cb1cd725df10959e8e

    SHA256

    f4350a41f0bd7efb5ecb5694d94486f00f5628f6d27a0554d6d16e811105e228

    SHA512

    e3a617356ffbb3bf5ccdd7dac9edfb447ddb0cfe98160530fda72714a20190d6b57371d1d831035d38ef8211459107402f032cf086461fd91c9698c50ccfcb9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e522f280b73278fde91a43e3c926b57

    SHA1

    7de7450953cc026951c41728d52b7697a7c3e6e8

    SHA256

    784bf9e5afba414ca4f361879793afa94d7ebfbcd3095106f4adc2aa0a33d98a

    SHA512

    1082f5d7e7a66330fc91c2905d58612eabc59df142fafab3d8a48ff4d6cbbf88f6f0bcf412327f0e746b9096db9acd6dc6e94454b0214b52cf4a82a161d53275

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67e582c283966b46d9f5d48b9378b210

    SHA1

    d9f6539237103eefbfb3db0a78aa1f4d4fdb6f81

    SHA256

    91b8aca07cecf73353b7ee1a55f3bd4ffa181d911806fb589f76dc48307be5b3

    SHA512

    1925c023da327bb674d0440f222f23e7a93aec88f4ce00f6802476152a055a6199b874833c30d3bbe00303b238ae68595288b93548ad403e600417b2850de740

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acf688785199f3e9b77d88c3637b4aef

    SHA1

    69d7f19243c3898c00d645d74ede301ebf346236

    SHA256

    f5730aa155affb9b0d9f658013c52b522ee80c89a6eda164ee47994282c85a46

    SHA512

    9244e9b0de44fe700ee37ed36159255abd2c4a92477801b4d5f0383f67f81466ab7f136c5d7d7dfbf294794bac5977e0000a2927c7c91c52c6be4034cb04d5f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2db471692f44187f07a99472ccf5b12

    SHA1

    e506b28814fb42336e6a4d6c69f12ab800352f77

    SHA256

    d8d6c0ed4b5ce7b8b604c4a38533b78543932988763779e613b917b7b1860db9

    SHA512

    398cc626ae8d335f653adb6c8e4e8bd71313fe59919210aa8d2d55f1609b069b75602573bd2fac8bda92f23fe8c641b2255990f1178f4284cd0ed74040eab04b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6bed2760db1cd241303df80ca2378af

    SHA1

    3e0a7de3c2521b964dd44dba63fd5cd90d1d101d

    SHA256

    482ef5742298156369c6ff5bff66fa3e5feb449cd07a621434d638d1fb12a635

    SHA512

    af2d90dd6c929567bece381f4c2bc263e8c2f2d751205fe3ce716b646c3a9a07f3b7bdf9738c7691226a4fcb4aeb68ffdba6d610fc28890b160ae9b42a1d7571

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45a18598e008e12c82bd6c7b3e1de49d

    SHA1

    cf46e347086473cf8f49c2bc9653ac7fefa988f0

    SHA256

    91de4dbdb4d082f96ed2608cb4c67362b0482f01b0f7b8dd0b8de34327b76310

    SHA512

    e4a3341a05bf123c5e1bc738086bbe2139a7d9a6f04134bad8dbbda39ae37bf01c09fb056add632c80b0e11d83f75dc72637afbba17b8883a678c2209ac20271

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    323e62addd0b10ebe9cb5d9e3dda0072

    SHA1

    1680bbe0954b32ccee591dbc5640a7b8fc0f9649

    SHA256

    57a26bcaecf4729a6515f1a4a52f429e744caf18fa93dc3e8397e577af728d5b

    SHA512

    e314c13e9e6d20d5968f4bb5904688ac069a9e628d14440b15a40807a3157bbb7ed848f08c93d332187890b1f38128d28934b41a4fe7d41ad8b64ac0f8696b96

  • C:\Users\Admin\AppData\Local\Temp\CabE34F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE3B0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b