Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 10:16
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe
Resource
win7-20231023-en
General
-
Target
SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe
-
Size
5.7MB
-
MD5
c0ef9d267c5557088c0724b75f1d10b5
-
SHA1
160a3a4bd2522bf2da9959d46bef2066d69b4e35
-
SHA256
2b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
-
SHA512
ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
SSDEEP
98304:Pl1miR1gYgNgqVpbTYVgZoj47MZ5FV0ZIvY4mQj1zvJvHfc10YS29F+bfbJBQJqP:ZgYgNvpbXZ778hsIvY6j15fc1S26TbvP
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XRJNZC.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XRJNZC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XRJNZC.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XRJNZC.exe -
Executes dropped EXE 3 IoCs
pid Process 4360 XRJNZC.exe 1440 XRJNZC.exe 3728 XRJNZC.exe -
resource yara_rule behavioral2/memory/4756-0-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-1-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-8-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-13-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-14-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-15-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-16-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-17-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-20-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/memory/4756-24-0x00000000007C0000-0x0000000001618000-memory.dmp themida behavioral2/files/0x0009000000022cee-27.dat themida behavioral2/files/0x0009000000022cee-28.dat themida behavioral2/memory/4360-29-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-34-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-37-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-41-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-42-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-43-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-44-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-45-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/4360-46-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/files/0x0009000000022cee-48.dat themida behavioral2/memory/4360-49-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-50-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-57-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-62-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-63-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-64-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-65-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-66-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/1440-67-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/files/0x0009000000022cee-73.dat themida behavioral2/memory/3728-74-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/3728-81-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida behavioral2/memory/3728-92-0x0000000000F50000-0x0000000001DA8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XRJNZC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4756 SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe 4360 XRJNZC.exe 1440 XRJNZC.exe 3728 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4228 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2612 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4756 SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe 4756 SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe 4360 XRJNZC.exe 4360 XRJNZC.exe 1440 XRJNZC.exe 1440 XRJNZC.exe 3728 XRJNZC.exe 3728 XRJNZC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2176 4756 SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe 93 PID 4756 wrote to memory of 2176 4756 SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe 93 PID 4756 wrote to memory of 2176 4756 SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe 93 PID 2176 wrote to memory of 2612 2176 cmd.exe 95 PID 2176 wrote to memory of 2612 2176 cmd.exe 95 PID 2176 wrote to memory of 2612 2176 cmd.exe 95 PID 2176 wrote to memory of 4360 2176 cmd.exe 99 PID 2176 wrote to memory of 4360 2176 cmd.exe 99 PID 2176 wrote to memory of 4360 2176 cmd.exe 99 PID 4360 wrote to memory of 4228 4360 XRJNZC.exe 105 PID 4360 wrote to memory of 4228 4360 XRJNZC.exe 105 PID 4360 wrote to memory of 4228 4360 XRJNZC.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.ClipBanker.BM.gen.Eldorado.29544.5170.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s3o4.0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2612
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:4228
-
-
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5c0ef9d267c5557088c0724b75f1d10b5
SHA1160a3a4bd2522bf2da9959d46bef2066d69b4e35
SHA2562b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
SHA512ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
Filesize
5.7MB
MD5c0ef9d267c5557088c0724b75f1d10b5
SHA1160a3a4bd2522bf2da9959d46bef2066d69b4e35
SHA2562b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
SHA512ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
Filesize
5.7MB
MD5c0ef9d267c5557088c0724b75f1d10b5
SHA1160a3a4bd2522bf2da9959d46bef2066d69b4e35
SHA2562b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
SHA512ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
Filesize
5.7MB
MD5c0ef9d267c5557088c0724b75f1d10b5
SHA1160a3a4bd2522bf2da9959d46bef2066d69b4e35
SHA2562b4eb665e3459f0bad9d1564c0e9bcf603057c73996290344c92b6c42d6bc66d
SHA512ec13ee5881737f0fef46b2657c5d5d40ebe7d52867063801cb9fdabc19ce062c22da799b1a1c7616024f835aee0b340d338abe8e08d64cda4f427ad162cf2031
-
Filesize
176B
MD56f3b1c931861427ccf8d31b5fa64da9f
SHA17c76006c9c96d37f6de35e178beb0d0dc14aaa90
SHA25655bcbd0610a067c72ba9ca3e947ea10ccfc0ceefad6db133f730131874f05612
SHA512f570e58e127940cc4c9dd455fbd1aa484aeda6252f360b003d244079b8c97f67892bccbb91ffe6f5d537442cd48745bd18c4f294ea59e36027140f3f67e4f2c3