Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-03-2024 23:38

General

  • Target

    2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe

  • Size

    6.6MB

  • MD5

    91f0a3e77e57a05bf18edcaf747f096e

  • SHA1

    f0ca1fae63c790d622633854eff6a4cac4fdbf6d

  • SHA256

    f6531722562c5c9a76b1da477587106c0ef92f26643280b7c993150d6065cf92

  • SHA512

    82d3b038c6d2182b814730ed9d096370087d3c0082940116a81a94009d2147b1217fbf97c118dd44da901c25138a29824586c7c9f056ed6f27bca3f51f9828b1

  • SSDEEP

    196608:eRXpv54euJpb9mOtQqkaFj2Qbww54dkrX:eRXpv54eg95rCgwwWdkr

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-03-22_91f0a3e77e57a05bf18edcaf747f096e_mafia.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/812-23-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-5-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-20-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-21-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-19-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-14-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-15-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-17-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-28-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-3-0x0000000003AF0000-0x0000000003CCF000-memory.dmp

    Filesize

    1.9MB

  • memory/812-10-0x0000000003AF0000-0x0000000003CCF000-memory.dmp

    Filesize

    1.9MB

  • memory/812-22-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-25-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/812-24-0x0000000003AF0000-0x0000000003CCF000-memory.dmp

    Filesize

    1.9MB

  • memory/812-26-0x0000000003AF0000-0x0000000003CCF000-memory.dmp

    Filesize

    1.9MB

  • memory/812-27-0x0000000003AF0000-0x0000000003CCF000-memory.dmp

    Filesize

    1.9MB

  • memory/3836-2-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB

  • memory/3836-13-0x0000000000400000-0x0000000001633000-memory.dmp

    Filesize

    18.2MB