Analysis

  • max time kernel
    139s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 13:33

General

  • Target

    2024-05-26_78f61fe21815bdce1e05a1da8e0d8320_mafia.exe

  • Size

    2.7MB

  • MD5

    78f61fe21815bdce1e05a1da8e0d8320

  • SHA1

    eb1c91fd336abfdb576c958d9028161db101fffb

  • SHA256

    5b1512a69e096721894dc1e22d7c25ba1a845eadcab62feb096fc96155657cfc

  • SHA512

    c903c68ca028f8d58c5160a0d2efdda1cce97881f46dc7261a1904e4f4632440555bedcfc5d400f097c6d9770c355266271faaa8152ec7719405e0510addadbf

  • SSDEEP

    49152:9ISkyb8L2zr9ONgwD0rp8baoz4u1UUL1e1TgM3dCw35DZqW3ORW2iS:1koG2zUNgwQV8boecNzvqWeRyS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-26_78f61fe21815bdce1e05a1da8e0d8320_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-26_78f61fe21815bdce1e05a1da8e0d8320_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2472
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:1252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.6MB

    MD5

    c3088388f3dae0806ce9828f867ba596

    SHA1

    6cd2660807d8b1e9c7734b77176c41538e7c02cc

    SHA256

    c02e8420a682fbf4f3b8809b444561f158fcd635ebb689dd9f05457ba3c40881

    SHA512

    55c810c68c5a57e0d57ef71f22ff21ab04d3ad9f20de55daeeefbbd315d1d8f445263dd4063eaea1284bb976466aedfca07f91127f63ec63854dfb0e4348e15e

  • memory/1252-19-0x0000000140000000-0x00000001401A5000-memory.dmp

    Filesize

    1.6MB

  • memory/1252-20-0x0000000140000000-0x00000001401A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2472-0-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/2472-1-0x0000000002400000-0x0000000002466000-memory.dmp

    Filesize

    408KB

  • memory/2472-6-0x0000000002400000-0x0000000002466000-memory.dmp

    Filesize

    408KB

  • memory/2472-17-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB