Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe
-
Size
6.1MB
-
MD5
85dd349ee2ad2cb65416729605cad06c
-
SHA1
2334ea085a04b04ae194f06a8fa433a4da04a6b8
-
SHA256
7d0ea443878724166044e2218540ac0217dee6b6062a0dd0d93585d90a64bc2f
-
SHA512
2216fe7d8633b9f5e450574cd249d309e072df06f8204768521add97d08042a5f53dfa73856412e50965f6f5467fd7b19061a36d35e091cc216976dfb8626ca8
-
SSDEEP
196608:88GeyV5BPnsw72h7vK2Zyy6Qtd4FLOyomFHKnP:88GeyrnsQ2JvKbVF
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F8CBE48B-22BD-8D42-F538-CF0B2B34B568} 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F8CBE48B-22BD-8D42-F538-CF0B2B34B568}\ = "Microsoft Windows Remote Shell Host" 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F8CBE48B-22BD-8D42-F538-CF0B2B34B568}\AppId = "{3e5ca495-8d6a-4d1f-ad99-177b426c8b8e}" 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F8CBE48B-22BD-8D42-F538-CF0B2B34B568}\LocalServer32 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F8CBE48B-22BD-8D42-F538-CF0B2B34B568}\LocalServer32\ = "%systemroot%\\SysWow64\\WinrsHost.exe" 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F8CBE48B-22BD-8D42-F538-CF0B2B34B568}\LocalServer32\ServerExecutable = "%systemroot%\\SysWow64\\WinrsHost.exe" 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2904 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe Token: SeIncBasePriorityPrivilege 2904 2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_85dd349ee2ad2cb65416729605cad06c_mafia_magniber.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2904