Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2023, 19:32

General

  • Target

    a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe

  • Size

    1.9MB

  • MD5

    a4c4fa2c4783193431ef23b7cf24ba87

  • SHA1

    35970787d49a38684331889adf855b9d6c0c47dd

  • SHA256

    1e7919852e580945155479b817d7f6ad80377f277eba328b7c90013f7cae9b3b

  • SHA512

    6190d32ffd4f28d8361da59a18291994c9584743fb86aa483f0107e0dfca06e2af4615d37fdbaeb8ad0c9b556a9e0ca73ea2790f690459b1cf116906abf723ac

  • SSDEEP

    49152:izX5pRDKnI8dHaPm1iiNU+rMDCgWBqzYU3ytCEzDvEMYiVYiwh+3:izU/sMY2YL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe
      C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC.exe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a4c4fa2c4783193431ef23b7cf24ba87_mafia_JC64.exe

    Filesize

    1.1MB

    MD5

    8d498649c852e56285479359232d3812

    SHA1

    6daf9a7f9a69829c95ab4d84404b559a3254dabd

    SHA256

    fdeb54c00f1f9e9c0c16c2610e82616f7c99ba67555e1ddad3f6faf427bc67a3

    SHA512

    e19803dae3989ca0a090d4e1d09c46537696e084fed2c58e6df4b0f8c1ddf503997310b9445ab2d03c1d4dbfd573e7dbeed99a2f99ec04445b70ab87442af128

  • C:\Users\Admin\Desktop\Rkill.txt

    Filesize

    514B

    MD5

    e26f43a56c3eae3fd5ef0c59d4999730

    SHA1

    16eaa62b89308243946f3dfb879f53bb173658a6

    SHA256

    8e68ff5918a0a5d574779cd461a255b1fdc7895ee4210e83cc073fdf80479970

    SHA512

    f5532db067afd3550a3565f5d46a063b01edf41289a92d49e3a665af67576f01ce51223eb4b752959b96412c3fae2cdfd9e7c8799062a12b18f70aa90ee3c3cf