Overview
overview
10Static
static
3Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10acdbase.dll
windows7-x64
1acdbase.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1libmmd.dll
windows7-x64
1libmmd.dll
windows10-2004-x64
1rinderpest.odp
windows7-x64
1rinderpest.odp
windows10-2004-x64
1updater.exe
windows7-x64
1updater.exe
windows10-2004-x64
1vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1x64/AzureK...ib.dll
windows7-x64
1x64/AzureK...ib.dll
windows10-2004-x64
1x64/BugReporter.exe
windows7-x64
1x64/BugReporter.exe
windows10-2004-x64
1x64/ComExtractor.exe
windows7-x64
1x64/ComExtractor.exe
windows10-2004-x64
1x64/Micros...st.dll
windows7-x64
1x64/Micros...st.dll
windows10-2004-x64
1x64/Micros...ml.dll
windows7-x64
1x64/Micros...ml.dll
windows10-2004-x64
1x64/WinUiB...er.dll
windows7-x64
1x64/WinUiB...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
acdbase.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
acdbase.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
api-ms-win-crt-time-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
api-ms-win-crt-utility-l1-1-0.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
libmmd.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
libmmd.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
rinderpest.odp
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
rinderpest.odp
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
updater.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
updater.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
vcruntime140.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
vcruntime140.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
x64/AzureKeyVaultDgssLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
x64/AzureKeyVaultDgssLib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
x64/BugReporter.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
x64/BugReporter.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
x64/ComExtractor.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
x64/ComExtractor.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
x64/Microsoft.UI.Xaml.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
x64/Microsoft.UI.Xaml.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
x64/WinUiBootstrapper.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
x64/WinUiBootstrapper.dll
Resource
win10v2004-20240412-en
General
-
Target
Setup.exe
-
Size
8.5MB
-
MD5
98169506fec94c2b12ba9930ad704515
-
SHA1
bce662a9fb94551f648ba2d7e29659957fd6a428
-
SHA256
9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363
-
SHA512
7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30
-
SSDEEP
196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 2080 set thread context of 2572 2080 Setup.exe netsh.exe -
Loads dropped DLL 2 IoCs
Processes:
netsh.exetracewpp.exepid process 2572 netsh.exe 2528 tracewpp.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
Setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Apartment" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "C:\\Windows\\system32\\scrobj.dll" Setup.exe -
Modifies registry class 10 IoCs
Processes:
Setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}\ Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3} Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\Implemented Categories Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "C:\\Windows\\system32\\scrobj.dll" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Apartment" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ProgID Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ProgID\ = "ScriptletHandler.Event" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ = "Constructor for Scriptlet Event Handler" Setup.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exenetsh.exepid process 2080 Setup.exe 2080 Setup.exe 2572 netsh.exe 2572 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exenetsh.exepid process 2080 Setup.exe 2572 netsh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Setup.exenetsh.exedescription pid process target process PID 2080 wrote to memory of 2572 2080 Setup.exe netsh.exe PID 2080 wrote to memory of 2572 2080 Setup.exe netsh.exe PID 2080 wrote to memory of 2572 2080 Setup.exe netsh.exe PID 2080 wrote to memory of 2572 2080 Setup.exe netsh.exe PID 2080 wrote to memory of 2572 2080 Setup.exe netsh.exe PID 2572 wrote to memory of 2528 2572 netsh.exe tracewpp.exe PID 2572 wrote to memory of 2528 2572 netsh.exe tracewpp.exe PID 2572 wrote to memory of 2528 2572 netsh.exe tracewpp.exe PID 2572 wrote to memory of 2528 2572 netsh.exe tracewpp.exe PID 2572 wrote to memory of 2528 2572 netsh.exe tracewpp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\tracewpp.exeC:\Users\Admin\AppData\Local\Temp\tracewpp.exe3⤵
- Loads dropped DLL
PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58ca236d2710518340837d3862d768c6b
SHA16bdb9c6e62903e22034978ac48b226814b833eb2
SHA25641ad98ad6caaddeaddbdd05807f390c0dfe3a16021c963d881e426fa410a987c
SHA512a9e0566b752275ea096d596e531127692785f58223e159c10480973470ebd05e3c89141b6f901711ac12d166b77e96a26ffb3ebc83d91c961696c5eecd02ef97
-
Filesize
207KB
MD50930890f83efad2a3091d1e3f0b82707
SHA1e0dcdefdde9dddd482e0b72504b35e96b795b27e
SHA256e8be7f038dd98179a1a27d5b176d23a60ad44426442699a3b9b714f9778c5cf2
SHA512608e2a169a9eb3c1b8e4459704e87123e5d04de57937175811a3f67559f0ead77b09e48562c1df732552a6aca7a8089528f43cda83bcdad1644a089b11a0e9f6