Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe
Resource
win10v2004-20240319-en
General
-
Target
2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe
-
Size
6.4MB
-
MD5
58fe03e4e9588c729996fb6ef9f0e735
-
SHA1
3a42f70e5d3622bd7bc082357ce0f55e4b4997e4
-
SHA256
c04f8b2fab35789ddfb55b529a3daaa4e1ca51b9e9dbf2d41218c6ebdc27d8d9
-
SHA512
a873200901b67abf816a1fda89b81883e0c5ecc63ed9285bfc2ffea3627f322ff035b6501fc4bb25da0bdb87091c8981de6a75f8d1ba6d692d365ceec6d339a3
-
SSDEEP
196608:snTHNmqCPYtHdvf/aTn/9Ts6rb867IISw:snTHNmqCPUH1naTVTn3bkI
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B897E62-A993-89B4-2ABF-23B848BF7E76} 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B897E62-A993-89B4-2ABF-23B848BF7E76}\ = "Outlook Network Share Management Module" 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1368 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe Token: SeIncBasePriorityPrivilege 1368 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1368 2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_58fe03e4e9588c729996fb6ef9f0e735_mafia.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1368