Analysis

  • max time kernel
    1s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 05:56

General

  • Target

    2024-01-10_cd718363be30f8b2a2b307af5319d547_mafia.exe

  • Size

    6.3MB

  • MD5

    cd718363be30f8b2a2b307af5319d547

  • SHA1

    5fccd9e67ad69468f4b590805c8c2927442c0539

  • SHA256

    5a7cb798885665397e3f6280b6ebe48d7f19631ce9ac4a534dcb5431cdbb984b

  • SHA512

    93e650bc41a2c9f0433758fb35476178ae804ea9040b0e3b08cac87dd81af9c1ddc76914e2f26e5ce38b106c201478020bc14c3e497b6e4ae4fe26aeddfa172c

  • SSDEEP

    196608:EnTH90AqjJdo8vGq8dc6YPYeheuazoyc2Z:EnTH90AqjJFv58dcpYJuazZ

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_cd718363be30f8b2a2b307af5319d547_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_cd718363be30f8b2a2b307af5319d547_mafia.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    PID:4180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4180-1-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-2-0x0000000003730000-0x000000000390F000-memory.dmp

    Filesize

    1.9MB

  • memory/4180-8-0x0000000003730000-0x000000000390F000-memory.dmp

    Filesize

    1.9MB

  • memory/4180-11-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-12-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-13-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-15-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-16-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-17-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-18-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-20-0x0000000003730000-0x000000000390F000-memory.dmp

    Filesize

    1.9MB

  • memory/4180-19-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-22-0x0000000003730000-0x000000000390F000-memory.dmp

    Filesize

    1.9MB

  • memory/4180-21-0x0000000003730000-0x000000000390F000-memory.dmp

    Filesize

    1.9MB

  • memory/4180-23-0x0000000000400000-0x0000000001567000-memory.dmp

    Filesize

    17.4MB

  • memory/4180-24-0x0000000003730000-0x000000000390F000-memory.dmp

    Filesize

    1.9MB