Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 18:01

General

  • Target

    2024-05-03_60aeb282b4d569f26e42bbd74325dde7_mafia_magniber_revil.exe

  • Size

    9.6MB

  • MD5

    60aeb282b4d569f26e42bbd74325dde7

  • SHA1

    0057fb805d9bc925ae241679294175c13ae49bc7

  • SHA256

    2e5178321fa590277b0e9e607c78eeb30481abf8c367446f76a98a60c35ab867

  • SHA512

    715329d8d33e5aad0dc73138e79f3e288ac267fc2ed77f1d7a147dfb883951fa2e70ce2b7db07f07097bd52f331f76de0b270e5bd31f1b466693b8226d43be69

  • SSDEEP

    196608:S+SYrVq63pwLfqeopHrD0siLAKhiCH3Kaimdmr6HGvHTUBDFpg//Npp:S+SYrVq6ZwLfqhp/0TLAKJXfSr6HCHTd

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 64 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-03_60aeb282b4d569f26e42bbd74325dde7_mafia_magniber_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-03_60aeb282b4d569f26e42bbd74325dde7_mafia_magniber_revil.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\2024-05-03_60aeb282b4d569f26e42bbd74325dde7_mafia_magniber_revil.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-05-03_60aeb282b4d569f26e42bbd74325dde7_mafia_magniber_revil.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\AirMyPC\settings.txt

    Filesize

    1KB

    MD5

    e9df2a6dd956dbbf5f25c017bafdd566

    SHA1

    4aca7375853f62ed2bcbe62a7691bbce35552d9b

    SHA256

    c571d4b60148ba2cb6d4bc1967ba7ac688def40ddde6355f240bb65b89c380dc

    SHA512

    5cd5abfe2b9470d21409b19da30ed3719c17521ea1b082892159be8092743e20dfeee3438699ffb773d659fc0b2a847ec7b9c77689f255b221243958807755e1

  • memory/1248-25-0x0000000004530000-0x000000000473D000-memory.dmp

    Filesize

    2.1MB

  • memory/1248-82-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-183-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-9-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-12-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-11-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-14-0x00000000002F0000-0x0000000000310000-memory.dmp

    Filesize

    128KB

  • memory/1248-13-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-16-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-18-0x0000000004530000-0x000000000473D000-memory.dmp

    Filesize

    2.1MB

  • memory/1248-17-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-4-0x0000000004530000-0x000000000473D000-memory.dmp

    Filesize

    2.1MB

  • memory/1248-24-0x0000000004530000-0x000000000473D000-memory.dmp

    Filesize

    2.1MB

  • memory/1248-172-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-0-0x0000000004530000-0x000000000473D000-memory.dmp

    Filesize

    2.1MB

  • memory/1248-36-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-106-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-159-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-62-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-73-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-150-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-95-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-50-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-115-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-126-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/1248-139-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/2996-47-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/2996-55-0x0000000004340000-0x0000000006606000-memory.dmp

    Filesize

    34.8MB

  • memory/2996-5-0x0000000000400000-0x00000000026C6000-memory.dmp

    Filesize

    34.8MB

  • memory/2996-6-0x0000000004340000-0x0000000006606000-memory.dmp

    Filesize

    34.8MB