Overview
overview
10Static
static
331AA8EC187...9B.exe
windows7-x64
731AA8EC187...9B.exe
windows10-2004-x64
74B356B88FB...64.exe
windows7-x64
74B356B88FB...64.exe
windows10-2004-x64
75F71BE645E...BE.exe
windows7-x64
105F71BE645E...BE.exe
windows10-2004-x64
10AFD4216E93...72.exe
windows7-x64
10AFD4216E93...72.exe
windows10-2004-x64
10B4362FCD75...77.exe
windows7-x64
7B4362FCD75...77.exe
windows10-2004-x64
7BA8909EEF5...56.exe
windows7-x64
7BA8909EEF5...56.exe
windows10-2004-x64
7DE7CED2745...59.exe
windows7-x64
7DE7CED2745...59.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/diversion.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/diversion.dll
Resource
win10v2004-20240319-en
General
-
Target
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
-
Size
3.6MB
-
MD5
8ac04f77862e7778b0950e2beb397b79
-
SHA1
afd4216e93a82feebafd3a68e9308ca4b0b54372
-
SHA256
09d9b2d16b2ca0fe53edf26d1f22496d0205951a0be56c08625c9ffce365a35a
-
SHA512
61b386403ca5399d790c3cfed2f9983d553f14ebf375f505f5db20240d5c4b34be72cb87c847c36f522b36af7aa95a8bfa04d56183eb059372b8748fc1543a40
-
SSDEEP
49152:vi1yfyR535FTZJjPprVaHSVYdCdme3iN5l67MV4FeWaQgjJlwTnUkcNVuV9zwu:vi17RJJFKCdmeSN5lp6gtl
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3A703FD7-12E3-A6C8-134F-8AD4E8B8C7DE} AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3A703FD7-12E3-A6C8-134F-8AD4E8B8C7DE}\InprocServer32 AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3A703FD7-12E3-A6C8-134F-8AD4E8B8C7DE}\InprocServer32\ = "%SystemRoot%\\SysWow64\\NaturalLanguage6.dll" AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3A703FD7-12E3-A6C8-134F-8AD4E8B8C7DE}\InprocServer32\ThreadingModel = "Both" AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\ProgramData\TEMP:581C1FF6 AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2376 AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe Token: SeIncBasePriorityPrivilege 2376 AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe"C:\Users\Admin\AppData\Local\Temp\AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2376