Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2024 23:38

General

  • Target

    2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe

  • Size

    6.6MB

  • MD5

    91f0a3e77e57a05bf18edcaf747f096e

  • SHA1

    f0ca1fae63c790d622633854eff6a4cac4fdbf6d

  • SHA256

    f6531722562c5c9a76b1da477587106c0ef92f26643280b7c993150d6065cf92

  • SHA512

    82d3b038c6d2182b814730ed9d096370087d3c0082940116a81a94009d2147b1217fbf97c118dd44da901c25138a29824586c7c9f056ed6f27bca3f51f9828b1

  • SSDEEP

    196608:eRXpv54euJpb9mOtQqkaFj2Qbww54dkrX:eRXpv54eg95rCgwwWdkr

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/756-13-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/756-0-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/756-15-0x00000000034A0000-0x00000000046D3000-memory.dmp

    Filesize

    18.2MB

  • memory/756-7-0x00000000034A0000-0x00000000046D3000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-28-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/1704-31-0x00000000073A0000-0x00000000073A1000-memory.dmp

    Filesize

    4KB

  • memory/1704-14-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-3-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-16-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-17-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-19-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-21-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-22-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-23-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-24-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-25-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-26-0x0000000003380000-0x000000000355F000-memory.dmp

    Filesize

    1.9MB

  • memory/1704-27-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-1-0x0000000003380000-0x000000000355F000-memory.dmp

    Filesize

    1.9MB

  • memory/1704-30-0x0000000007130000-0x0000000007131000-memory.dmp

    Filesize

    4KB

  • memory/1704-29-0x0000000003380000-0x000000000355F000-memory.dmp

    Filesize

    1.9MB

  • memory/1704-10-0x0000000003380000-0x000000000355F000-memory.dmp

    Filesize

    1.9MB

  • memory/1704-32-0x0000000007550000-0x0000000007551000-memory.dmp

    Filesize

    4KB

  • memory/1704-33-0x0000000007610000-0x0000000007611000-memory.dmp

    Filesize

    4KB

  • memory/1704-34-0x0000000007780000-0x0000000007781000-memory.dmp

    Filesize

    4KB

  • memory/1704-35-0x00000000078A0000-0x00000000078A1000-memory.dmp

    Filesize

    4KB

  • memory/1704-36-0x0000000007C90000-0x0000000007C91000-memory.dmp

    Filesize

    4KB

  • memory/1704-39-0x0000000003380000-0x000000000355F000-memory.dmp

    Filesize

    1.9MB

  • memory/1704-40-0x0000000003380000-0x000000000355F000-memory.dmp

    Filesize

    1.9MB

  • memory/1704-41-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/1704-42-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/1704-43-0x0000000007130000-0x0000000007131000-memory.dmp

    Filesize

    4KB

  • memory/1704-44-0x00000000073A0000-0x00000000073A1000-memory.dmp

    Filesize

    4KB

  • memory/1704-45-0x0000000007550000-0x0000000007551000-memory.dmp

    Filesize

    4KB

  • memory/1704-46-0x0000000007610000-0x0000000007611000-memory.dmp

    Filesize

    4KB

  • memory/1704-48-0x0000000007780000-0x0000000007781000-memory.dmp

    Filesize

    4KB

  • memory/1704-49-0x00000000078A0000-0x00000000078A1000-memory.dmp

    Filesize

    4KB

  • memory/1704-50-0x0000000007C90000-0x0000000007C91000-memory.dmp

    Filesize

    4KB