Analysis
-
max time kernel
24s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:06
Static task
static1
Behavioral task
behavioral1
Sample
be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe
Resource
win10v2004-20221111-en
General
-
Target
be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe
-
Size
2.9MB
-
MD5
68cbf4a764bd3da616b6426f8ee2fd42
-
SHA1
69deb224d550f4589e10170005ad862748964b9a
-
SHA256
be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775
-
SHA512
0b511fb4cd3bf5df846f48faf062f1245dc79697429a64d7c4854554ef088bfc36fa6ce3328eadd468e52a3f90d4775796ede7506e361a9051b149a3170d9d71
-
SSDEEP
49152:zMtQqMq0Yya4SOHZ3+TFTdclL/4J8200q5VWy7EeNmpQ1qocB+t/5m/hN/cM/q7P:otQLLY73OH0dclL/4JoPtQAmpQ1qoc2V
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\InprocServer32 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\InprocServer32\ = "%ProgramFiles(x86)%\\Windows Photo Viewer\\PhotoAcq.dll" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\ProgID be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\Version be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\VersionIndependentProgID\ = "Microsoft.PhotoAcqDeviceSelectionDlg" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703} be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\ = "PhotoAcqDeviceSelectionDlg" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\InprocServer32\ThreadingModel = "Apartment" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\ProgID\ = "Microsoft.PhotoAcqDeviceSelectionDlg.1" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\TypeLib be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\TypeLib\ = "{00f25ae8-3625-4e34-92d4-f0918cf010ee}" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\Version\ = "1.0" be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D69C0703-D69C-0703-D69C-0703D69C0703}\VersionIndependentProgID be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Token: SeIncBasePriorityPrivilege 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Token: 33 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe Token: SeIncBasePriorityPrivilege 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 1724 wrote to memory of 2044 1724 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 28 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30 PID 2044 wrote to memory of 1516 2044 be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe"C:\Users\Admin\AppData\Local\Temp\be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe"C:\Users\Admin\AppData\Local\Temp\be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exeC:\Users\Admin\AppData\Local\Temp\be1363a19716c5e32da206ba6dcca80681152a91d67379128352655d0317b775.exe3⤵PID:1516
-
-