Overview
overview
10Static
static
331AA8EC187...9B.exe
windows7-x64
731AA8EC187...9B.exe
windows10-2004-x64
74B356B88FB...64.exe
windows7-x64
74B356B88FB...64.exe
windows10-2004-x64
75F71BE645E...BE.exe
windows7-x64
105F71BE645E...BE.exe
windows10-2004-x64
10AFD4216E93...72.exe
windows7-x64
10AFD4216E93...72.exe
windows10-2004-x64
10B4362FCD75...77.exe
windows7-x64
7B4362FCD75...77.exe
windows10-2004-x64
7BA8909EEF5...56.exe
windows7-x64
7BA8909EEF5...56.exe
windows10-2004-x64
7DE7CED2745...59.exe
windows7-x64
7DE7CED2745...59.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/diversion.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/diversion.dll
Resource
win10v2004-20240319-en
General
-
Target
5F71BE645E8AC995555A891087B46ED357386DBE.exe
-
Size
2.2MB
-
MD5
7c9ee8c189f40e2f9ebd2660a2d2f65d
-
SHA1
5f71be645e8ac995555a891087b46ed357386dbe
-
SHA256
8d963d220e968362d66ebae80e2849dbfb184cc57b6dbb1200c61f217f232326
-
SHA512
7b120ed02236604a162d9a4b33a9d9607bc77dd0fd22b9da8491263a14ded73da4d2240338cda844bc0958aa08658e577034962b95ef1cf841b5004d2688d345
-
SSDEEP
49152:Up+iN+FctfFTJ1fHo7OnfPd5wydwRBLH0Uz+2X:Up+d01fI7AfPSlzlX
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5F71BE645E8AC995555A891087B46ED357386DBE.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5F71BE645E8AC995555A891087B46ED357386DBE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5F71BE645E8AC995555A891087B46ED357386DBE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5056 set thread context of 4972 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 4220 4972 WerFault.exe 99 -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3} 5F71BE645E8AC995555A891087B46ED357386DBE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3}\ = "UPnPAutomationProxy" 5F71BE645E8AC995555A891087B46ED357386DBE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3}\AppID = "{E495081B-BBA5-4b89-BA3C-3B86A686B87A}" 5F71BE645E8AC995555A891087B46ED357386DBE.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:43FE6B9B 5F71BE645E8AC995555A891087B46ED357386DBE.exe File opened for modification C:\ProgramData\TEMP:43FE6B9B 5F71BE645E8AC995555A891087B46ED357386DBE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe Token: SeIncBasePriorityPrivilege 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4972 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe 99 PID 5056 wrote to memory of 4972 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe 99 PID 5056 wrote to memory of 4972 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe 99 PID 5056 wrote to memory of 4972 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe 99 PID 5056 wrote to memory of 4972 5056 5F71BE645E8AC995555A891087B46ED357386DBE.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"2⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 123⤵
- Program crash
PID:4220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4972 -ip 49721⤵PID:680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:4216