Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 01:40

General

  • Target

    2024-10-19_d7910f09fa8fbaad2fb50ca38a22d2b7_hijackloader_mafia.exe

  • Size

    2.0MB

  • MD5

    d7910f09fa8fbaad2fb50ca38a22d2b7

  • SHA1

    8a68a3ba542d0fa581ee6e1554d06a331fa62f71

  • SHA256

    f4fa248d7a0db150875fc1334eacaedad0e58a02a311244ca7a7dd4882d14736

  • SHA512

    ffe4ce53e3be8eb8acebff57b83482c30c4f648a4a45fb7547abd009eda2e03d8a2e7ffaa9c47c61ec4bbe0f4ef782abcca2ae1b1fd4c0b0e1f229cbca6eaacb

  • SSDEEP

    49152:P7KjN8fXWTbVMHhzGwvJeXi30q5VWy7EeNpZy:P7KK68hzGyJeXaPtQAq

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-19_d7910f09fa8fbaad2fb50ca38a22d2b7_hijackloader_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-19_d7910f09fa8fbaad2fb50ca38a22d2b7_hijackloader_mafia.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3452-0-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/3452-2-0x0000000002990000-0x0000000002B9C000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-9-0x0000000002990000-0x0000000002B9C000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-12-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/3452-14-0x0000000002990000-0x0000000002B9C000-memory.dmp

    Filesize

    2.0MB

  • memory/3452-13-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB