Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe
-
Size
2.9MB
-
MD5
0d83c2f8da67dea313304d9d21b63fdf
-
SHA1
ecc09a5b1c29e1540f0da7aa3f4f14a28918b952
-
SHA256
2e5839e984acc3345084ea22bdbe3742fbb3525e25eafdc854233531f59bd17c
-
SHA512
27a65011ae8a6807f7199764e92941d34865b22f46f30e266044361cc78a57c486264caeb7f5f7046db95f925d4e07adad99fdde9128c4fc57dbea973699590e
-
SSDEEP
49152:fKDyY3EuYDY2K9uM4ITG6NDQK4f9z/6M+ROMg2k2oV2WTljr46J/vTeAFwDMDVpM:f7UEuYD+9uM4ITPDQJ9z/6MiOMg2k2o0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2920 Qwqkesq.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Qwqkesq.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Qwqkesq.exe 2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe File opened for modification C:\Program Files (x86)\Qwqkesq.exe 2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qwqkesq.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-e3-b1-bc-a8-e0\WpadDecisionTime = e0cd84cc7706db01 Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D5B2E2E-025E-4641-932A-3A05614DE0B5}\WpadDecision = "0" Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-e3-b1-bc-a8-e0 Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Qwqkesq.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Qwqkesq.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D5B2E2E-025E-4641-932A-3A05614DE0B5}\ea-e3-b1-bc-a8-e0 Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-e3-b1-bc-a8-e0\WpadDecision = "0" Qwqkesq.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D5B2E2E-025E-4641-932A-3A05614DE0B5} Qwqkesq.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D5B2E2E-025E-4641-932A-3A05614DE0B5}\WpadNetworkName = "Network 3" Qwqkesq.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Qwqkesq.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Qwqkesq.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D5B2E2E-025E-4641-932A-3A05614DE0B5}\WpadDecisionReason = "1" Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Qwqkesq.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Qwqkesq.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D5B2E2E-025E-4641-932A-3A05614DE0B5}\WpadDecisionTime = e0cd84cc7706db01 Qwqkesq.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-e3-b1-bc-a8-e0\WpadDecisionReason = "1" Qwqkesq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2388 2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe 2920 Qwqkesq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-14_0d83c2f8da67dea313304d9d21b63fdf_mafia.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2388
-
C:\Program Files (x86)\Qwqkesq.exe"C:\Program Files (x86)\Qwqkesq.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD50d83c2f8da67dea313304d9d21b63fdf
SHA1ecc09a5b1c29e1540f0da7aa3f4f14a28918b952
SHA2562e5839e984acc3345084ea22bdbe3742fbb3525e25eafdc854233531f59bd17c
SHA51227a65011ae8a6807f7199764e92941d34865b22f46f30e266044361cc78a57c486264caeb7f5f7046db95f925d4e07adad99fdde9128c4fc57dbea973699590e