Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:43

General

  • Target

    3c5f24c50fa79992ff6a4c00a6317925f1fce059914c031e5f0642bc572aa2f7.exe

  • Size

    2.7MB

  • MD5

    f973642b2358732382584ec27bec2d00

  • SHA1

    c27050d9c709e2a5bbe88950f3040462896cc994

  • SHA256

    3c5f24c50fa79992ff6a4c00a6317925f1fce059914c031e5f0642bc572aa2f7

  • SHA512

    c0444354c001e4b13b847c972aa780613f3f83c258f80cdbdc8ad387dd17e753d105ee6646c3a84179a63db5961909799d87126f81025ce88494d2db7e86c98b

  • SSDEEP

    49152:vvgr7S8COnATBbOzeHNMmAtMyMpy76wR9KWnE83S78DN2HTbuXw:vv6gxvHN54PWG6wRgu3Ue2cw

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c5f24c50fa79992ff6a4c00a6317925f1fce059914c031e5f0642bc572aa2f7.exe
    "C:\Users\Admin\AppData\Local\Temp\3c5f24c50fa79992ff6a4c00a6317925f1fce059914c031e5f0642bc572aa2f7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops startup file
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 1008
      2⤵
      • Program crash
      PID:1764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 804 -ip 804
    1⤵
      PID:2092

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/804-132-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-134-0x0000000004B80000-0x0000000004D8C000-memory.dmp

      Filesize

      2.0MB

    • memory/804-140-0x0000000004B80000-0x0000000004D8C000-memory.dmp

      Filesize

      2.0MB

    • memory/804-141-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-142-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-144-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-143-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-145-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-147-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-146-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-148-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-149-0x0000000000400000-0x0000000000886000-memory.dmp

      Filesize

      4.5MB

    • memory/804-150-0x0000000004B80000-0x0000000004D8C000-memory.dmp

      Filesize

      2.0MB