Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe
Resource
win7-20240903-en
General
-
Target
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe
-
Size
8.3MB
-
MD5
aaa74715d5f3f0b8745b66f8b2ed1ef3
-
SHA1
45bb4f63e5428098c69f623fce0830e959ca3f65
-
SHA256
1e7d59c869e27073d03898b7ded8c597b55a2791c36af2ae29d8593751c72687
-
SHA512
3a5b730aabcf410edae7ee8926d3af5b076925c70ed0ec5ac8f8d2847ddce72cee42080849aba7e747a1a4ff3e0fc3c9c83f955fb3b50678ac45b7d976482eab
-
SSDEEP
196608:ZLweeSIYd2Qv8eqkhBZ1AcZ3D++Q00OISC5EvMyxQdATpKI:ZLwefBx5tjA0C5G9xQ8K
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Modifies registry class 14 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B} 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\InProcServer32\ = "C:\\Windows\\SysWOW64\\wshom.ocx" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\ProgID\ = "WScript.Network.1" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\Programmable 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\InProcServer32\ThreadingModel = "Apartment" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\TypeLib 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\TypeLib\ = "{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\VersionIndependentProgID 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\VersionIndependentProgID\ = "WScript.Network" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\ = "Windows Script Host Network Object" 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\Implemented Categories 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\InProcServer32 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63EE0A1C-773B-1064-B3AC-580E23497C1B}\ProgID 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exedescription pid Process procid_target PID 1400 wrote to memory of 936 1400 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 82 PID 1400 wrote to memory of 936 1400 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 82 PID 1400 wrote to memory of 936 1400 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 82 PID 1400 wrote to memory of 936 1400 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 82 PID 1400 wrote to memory of 936 1400 20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"C:\Users\Admin\AppData\Local\Temp\20240920aaa74715d5f3f0b8745b66f8b2ed1ef3mafia.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:936
-