Analysis Overview
SHA256
36278b0a27b4955cb06ceec680adbc6040ae3a67a50c051ec74cef1eaf6a012d
Threat Level: Known bad
The file 2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber was found to be: Known bad.
Malicious Activity Summary
Banload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Checks BIOS information in registry
Unsigned PE
Modifies registry class
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-03-04 09:34
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-04 09:34
Reported
2024-03-04 09:37
Platform
win7-20240221-en
Max time kernel
120s
Max time network
125s
Command Line
Signatures
Banload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\LocalServer32 | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\LocalServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLOOK.EXE" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F} | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\ = "Outlook Central" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\InprocHandler32 | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\InprocHandler32\ = "ole32.dll" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe
"C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe"
Network
Files
memory/2036-0-0x0000000002CA0000-0x0000000002EA0000-memory.dmp
memory/2036-1-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/2036-7-0x0000000002CA0000-0x0000000002EA0000-memory.dmp
memory/2036-10-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/2036-11-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/2036-13-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/2036-14-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/2036-15-0x0000000000400000-0x0000000000D6A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-04 09:34
Reported
2024-03-04 09:37
Platform
win10v2004-20240226-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Banload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\DefaultIcon | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\InProcServer32 | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\ = "Power Options" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\InfoTip = "@%SystemRoot%\\System32\\powercpl.dll,-2#immutable1" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\LocalizedString = "@%SystemRoot%\\System32\\powercpl.dll,-1#immutable1" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\System.Software.TasksFileUrl = "Internal" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\InProcServer32\ThreadingModel = "Apartment" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\ShellFolder | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\ShellFolder\WantsParseDisplayName | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F} | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\System.ApplicationName = "Microsoft.PowerOptions" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\System.ControlPanel.Category = "2,5" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\System.ControlPanel.EnableInSafeMode = "3" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\Instance\CLSID = "{328B0346-7EAF-4BBE-A479-7CB88A095F5B}" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\Instance\InitPropertyBag\ResourceDLL = "%SystemRoot%\\SysWow64\\powercpl.dll" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\Instance\InitPropertyBag\ResourceID = "100" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\ShellFolder\Attributes = "2684354560" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\DefaultIcon\ = "%SystemRoot%\\SysWow64\\powercpl.dll,-1" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\Instance | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4B7AE1D-CEFB-4074-406B-300D0053955F}\Instance\InitPropertyBag | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe
"C:\Users\Admin\AppData\Local\Temp\2024-03-04_a5a6a0ec6594b012fdafd86bf6c5b4fb_mafia_magniber.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 0.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 213.143.182.52.in-addr.arpa | udp |
Files
memory/3320-1-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/3320-2-0x0000000003020000-0x0000000003220000-memory.dmp
memory/3320-8-0x0000000003020000-0x0000000003220000-memory.dmp
memory/3320-11-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/3320-12-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/3320-14-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/3320-15-0x0000000000400000-0x0000000000D6A000-memory.dmp
memory/3320-16-0x0000000000400000-0x0000000000D6A000-memory.dmp