Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 12:33

General

  • Target

    2024-10-05_903f523a006aa9320d83b30a9a69e699_mafia.exe

  • Size

    1.4MB

  • MD5

    903f523a006aa9320d83b30a9a69e699

  • SHA1

    0539d0234bc5b86c03d0fca32656e53683301dbc

  • SHA256

    4be9d28af7b857a8aa3efe24556736620fe6bd99433cd0027639358c67e77c4f

  • SHA512

    d770377152153885ac144b0a2d2c6217b9f073555deaad2f32b04304de466b32ac4144c0f3977fadcc125558e47763800f1043c8ca9cc28a20dc8fc9b6e84e44

  • SSDEEP

    24576:wbFjZNH3hYxNLwexaR8cKR5CkJJFJ3ShcD:WFrHRYxNLwex+8ck5Ckb3SyD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-05_903f523a006aa9320d83b30a9a69e699_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-05_903f523a006aa9320d83b30a9a69e699_mafia.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2404
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    952e13c76b1c56538e6b277a8c5c146f

    SHA1

    3a503216797402c6916d7353f9db7a114a807c44

    SHA256

    f4876734f13385b33f85a3dac2f406934403398e6207f054d19ec7f40335b6cf

    SHA512

    1f4a7b2041cacf454e02146462df68160e0bdde13fd1a10ee645e95671feac475e05ebe47da2dc7f6685500a9af2b3940c3974c036064f922b30c9f053506d80

  • memory/2404-8-0x0000000000700000-0x0000000000767000-memory.dmp

    Filesize

    412KB

  • memory/2404-7-0x0000000000400000-0x0000000000614000-memory.dmp

    Filesize

    2.1MB

  • memory/2404-0-0x0000000000700000-0x0000000000767000-memory.dmp

    Filesize

    412KB

  • memory/2404-16-0x0000000000400000-0x0000000000614000-memory.dmp

    Filesize

    2.1MB

  • memory/2976-13-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2976-17-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB