Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe
Resource
win7-20240903-en
General
-
Target
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe
-
Size
8.3MB
-
MD5
aaa74715d5f3f0b8745b66f8b2ed1ef3
-
SHA1
45bb4f63e5428098c69f623fce0830e959ca3f65
-
SHA256
1e7d59c869e27073d03898b7ded8c597b55a2791c36af2ae29d8593751c72687
-
SHA512
3a5b730aabcf410edae7ee8926d3af5b076925c70ed0ec5ac8f8d2847ddce72cee42080849aba7e747a1a4ff3e0fc3c9c83f955fb3b50678ac45b7d976482eab
-
SSDEEP
196608:ZLweeSIYd2Qv8eqkhBZ1AcZ3D++Q00OISC5EvMyxQdATpKI:ZLwefBx5tjA0C5G9xQ8K
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Modifies registry class 5 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B} 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\ = "Microsoft DocProp Inplace Droplist Combo Control" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\InProcServer32 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\InProcServer32\ThreadingModel = "Apartment" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exepid Process 3068 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription pid Process procid_target PID 2080 wrote to memory of 3068 2080 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 28 PID 2080 wrote to memory of 3068 2080 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 28 PID 2080 wrote to memory of 3068 2080 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 28 PID 2080 wrote to memory of 3068 2080 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 28 PID 2080 wrote to memory of 3068 2080 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 28 PID 2080 wrote to memory of 3068 2080 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3068
-