Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
DemostrativoExtrato.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
DemostrativoExtrato.exe
Resource
win10v2004-20240426-en
General
-
Target
DemostrativoExtrato.exe
-
Size
2.6MB
-
MD5
2341d1b53f57972ec2b804edcc4889fa
-
SHA1
9aa4e9be7146e74ff8373ce06fb0ef74800ceb84
-
SHA256
bae7127917ef103b10a4cc40338bf49b91e8aeb01271fd15a80c80be1f95adbf
-
SHA512
ed2a6bc2545a1b6a6335467d4129fe0cec6ad08594ca6783ce5eacdccd755ba02104ce3196ebd4e989434fcef774646c32e426a208f585bdde7844e0e8ea681a
-
SSDEEP
49152:SbYdOEn8rPSTXoUAhKkyYVyq9n0q5VWy7EeNUkRsC2iaKtF+JR:SbI+z3hKkyYVZZPtQAf32wzoR
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
DemostrativoExtrato.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DemostrativoExtrato.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DemostrativoExtrato.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DemostrativoExtrato.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate DemostrativoExtrato.exe -
Modifies registry class 4 IoCs
Processes:
DemostrativoExtrato.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\InprocServer32 DemostrativoExtrato.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mfc42u.dll" DemostrativoExtrato.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE} DemostrativoExtrato.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\ = "Color Property Page" DemostrativoExtrato.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
DemostrativoExtrato.exedescription pid Process Token: 33 2908 DemostrativoExtrato.exe Token: SeIncBasePriorityPrivilege 2908 DemostrativoExtrato.exe Token: 33 2908 DemostrativoExtrato.exe Token: SeIncBasePriorityPrivilege 2908 DemostrativoExtrato.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
DemostrativoExtrato.exedescription pid Process procid_target PID 2872 wrote to memory of 2908 2872 DemostrativoExtrato.exe 28 PID 2872 wrote to memory of 2908 2872 DemostrativoExtrato.exe 28 PID 2872 wrote to memory of 2908 2872 DemostrativoExtrato.exe 28 PID 2872 wrote to memory of 2908 2872 DemostrativoExtrato.exe 28 PID 2872 wrote to memory of 2908 2872 DemostrativoExtrato.exe 28 PID 2872 wrote to memory of 2908 2872 DemostrativoExtrato.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD56ea3e08ede7642cc7cfd6d3bdcd2d4de
SHA1df6999bc8757058379db9305c83a49d344adb932
SHA25691714ec23db1166f3f2085a7bf94327f48558419166fcbb82245103308430626
SHA512a45742831b5ece78a1ac3dda5bcbb3732eeb08f0077ea42f4f5d19782e944a48873c34e1d2f149b77db9c0e6068386cd9d7d7bc63a9777892bbfa51ffcbc44bb