Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows7_x64 -
resource
win7 -
submitted
14-07-2020 07:29
Static task
static1
Behavioral task
behavioral1
Sample
banbanban.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
banbanban.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
banbanban.exe
-
Size
261.7MB
-
MD5
99feba3a31e179dd70208186c8e7ef1e
-
SHA1
92edafe211d60ba771f1520890001a6da2709456
-
SHA256
4db84910fd2fb23d12a93f2171fc361049ec0d8e24074495def3d561396e6789
-
SHA512
3b42d1d882d153321c9f3b567043f9b1ce7272ffb55266c88c52d30b425f5401f0fe926c8725d1484126e7405ff651a6075920202b6f4863744b46b0d39fcb38
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe 1464 banbanban.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 banbanban.exe -
Loads dropped DLL 1 IoCs
pid Process 1464 banbanban.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AZDCKDDHIRWXHaaK.lnk banbanban.exe -
Enumerates connected drives 3 TTPs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io