Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 21:29

General

  • Target

    2024-02-24_5e80cbea129b916a26eca6d644f954ef_mafia.exe

  • Size

    1.5MB

  • MD5

    5e80cbea129b916a26eca6d644f954ef

  • SHA1

    d1206f8eed31db63a5950ba13cc6e436802a5026

  • SHA256

    847ad3b199c407803ae94a75ab0c8b48b77c5d8db553b572cd9ea05c06e51632

  • SHA512

    129b8f0659df3436cf6f20003ad60e9999660ea1d96de45dd624f6f2096a24810b58a866cc7f1980d6a597551dbea761e633ae52aa9107e0528399e93be97722

  • SSDEEP

    24576:rcgGFEpsn2/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:wgGKpC2LNiXicJFFRGNzj3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_5e80cbea129b916a26eca6d644f954ef_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_5e80cbea129b916a26eca6d644f954ef_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1620
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:3312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.4MB

    MD5

    9e26946406156d5b5fab8ab4fd63ebe9

    SHA1

    2a87aee2f2bcbfd8a3e29d57246b7c927adf84f2

    SHA256

    9dfde7394ab41ab9db6c57758908c846f20eee0f973cc50b83b3f8ef7475195d

    SHA512

    32a4ce1a642195cf377b56fd9d87e51ec9e1e31ec50c42feb2a239cb6500d602091a643ad534ee5586f29fd68a0bcceb0d270e9b3abad228cb229cbfbd168cd0

  • memory/1620-0-0x0000000000400000-0x0000000000646000-memory.dmp

    Filesize

    2.3MB

  • memory/1620-1-0x0000000000C50000-0x0000000000CB6000-memory.dmp

    Filesize

    408KB

  • memory/1620-7-0x0000000000C50000-0x0000000000CB6000-memory.dmp

    Filesize

    408KB

  • memory/1620-15-0x0000000000400000-0x0000000000646000-memory.dmp

    Filesize

    2.3MB

  • memory/3312-14-0x0000000140000000-0x000000014021B000-memory.dmp

    Filesize

    2.1MB

  • memory/3312-16-0x0000000140000000-0x000000014021B000-memory.dmp

    Filesize

    2.1MB