Analysis
-
max time kernel
136s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe
-
Size
2.9MB
-
MD5
85ba39600315e784d159e278d0d9088e
-
SHA1
4c5a7ec25c5de383a11ac963ce17c0b438e370d3
-
SHA256
a624ed5d8480d4a462ada28966364e8d3f58bca95a31827773aa3c79bb27ef65
-
SHA512
d3ce015755019ccfb5993fe6b947b39c86f36a846bf1b599bb2e4d1f2525b9fbca98ded3701e40834bdc5b486686c5d452f8d06d0973193b8855fe31c670ce3c
-
SSDEEP
49152:BArprNIIL2oT8we5x8qWNLrdrAoWH2mCK+/9z+KL0jhGGNKNA/QXHboxXXzs:BArFNywe52VphPmw5lHP0tXzs
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe -
Modifies registry class 5 IoCs
Processes:
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0635F9DA-10D5-26AA-5E4B-6923F77D3B8F}\InprocServer32\Assembly = "mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0635F9DA-10D5-26AA-5E4B-6923F77D3B8F}\InprocServer32\Class = "System.Text.DecoderReplacementFallback" 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0635F9DA-10D5-26AA-5E4B-6923F77D3B8F} 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0635F9DA-10D5-26AA-5E4B-6923F77D3B8F}\InprocServer32 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0635F9DA-10D5-26AA-5E4B-6923F77D3B8F}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mscoree.dll" 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exedescription pid Process Token: 33 1524 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe Token: SeIncBasePriorityPrivilege 1524 2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_85ba39600315e784d159e278d0d9088e_mafia.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1524