Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 09:08
Behavioral task
behavioral1
Sample
2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe
-
Size
4.3MB
-
MD5
cde629b0cb2a11d8f6d9d3b6029e4ba9
-
SHA1
03bfb1e05531c5a8a27553bc00cbe7ee51e46e3e
-
SHA256
b3acfcd098191efd748a698fee9629b0e7bd745db99a232262b1f3403e4c0764
-
SHA512
facdb9c45c55667261c5e0158261ef655384dde6bcb936316b9028c491d81d6b9b0ef22eda13c139937e49dc3e49b1c1b8879e795339df71578b27f210326968
-
SSDEEP
49152:RKyf6l5QZuTtS0rQMYOQ+q8CE8SW5wpIXG1Zz9KFeMdOQ+q8r:RglWsM0r1QnLS0G1R0FehQS
Malware Config
Signatures
-
Detects executables packed with VMProtect. 3 IoCs
resource yara_rule behavioral2/memory/1060-0-0x0000000000160000-0x0000000000253000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/1060-1-0x0000000000160000-0x0000000000253000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/1060-5-0x0000000000160000-0x0000000000253000-memory.dmp INDICATOR_EXE_Packed_VMProtect -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 223.5.5.5 Destination IP 114.114.114.114 -
resource yara_rule behavioral2/memory/1060-0-0x0000000000160000-0x0000000000253000-memory.dmp vmprotect behavioral2/memory/1060-1-0x0000000000160000-0x0000000000253000-memory.dmp vmprotect behavioral2/memory/1060-5-0x0000000000160000-0x0000000000253000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe Token: SeTcbPrivilege 1060 2024-06-24_cde629b0cb2a11d8f6d9d3b6029e4ba9_mafia.exe