Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 11:05

General

  • Target

    Setup.exe

  • Size

    8.5MB

  • MD5

    98169506fec94c2b12ba9930ad704515

  • SHA1

    bce662a9fb94551f648ba2d7e29659957fd6a428

  • SHA256

    9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363

  • SHA512

    7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30

  • SSDEEP

    196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Suspicious use of SetThreadContext
    • Registers COM server for autorun
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\SysWOW64\netsh.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\tracewpp.exe
        C:\Users\Admin\AppData\Local\Temp\tracewpp.exe
        3⤵
        • Loads dropped DLL
        PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a69c9c66

    Filesize

    1.2MB

    MD5

    8ca236d2710518340837d3862d768c6b

    SHA1

    6bdb9c6e62903e22034978ac48b226814b833eb2

    SHA256

    41ad98ad6caaddeaddbdd05807f390c0dfe3a16021c963d881e426fa410a987c

    SHA512

    a9e0566b752275ea096d596e531127692785f58223e159c10480973470ebd05e3c89141b6f901711ac12d166b77e96a26ffb3ebc83d91c961696c5eecd02ef97

  • \Users\Admin\AppData\Local\Temp\tracewpp.exe

    Filesize

    207KB

    MD5

    0930890f83efad2a3091d1e3f0b82707

    SHA1

    e0dcdefdde9dddd482e0b72504b35e96b795b27e

    SHA256

    e8be7f038dd98179a1a27d5b176d23a60ad44426442699a3b9b714f9778c5cf2

    SHA512

    608e2a169a9eb3c1b8e4459704e87123e5d04de57937175811a3f67559f0ead77b09e48562c1df732552a6aca7a8089528f43cda83bcdad1644a089b11a0e9f6

  • memory/2080-36-0x000007FEF5D20000-0x000007FEF5E78000-memory.dmp

    Filesize

    1.3MB

  • memory/2080-37-0x000007FEF5D20000-0x000007FEF5E78000-memory.dmp

    Filesize

    1.3MB

  • memory/2080-15-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2080-16-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2080-17-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2080-19-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2080-20-0x00000000049C0000-0x0000000004DBA000-memory.dmp

    Filesize

    4.0MB

  • memory/2080-22-0x000007FEF5D20000-0x000007FEF5E78000-memory.dmp

    Filesize

    1.3MB

  • memory/2080-0-0x0000000003D90000-0x0000000003F78000-memory.dmp

    Filesize

    1.9MB

  • memory/2080-14-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2080-12-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2080-10-0x0000000000400000-0x0000000001CF7000-memory.dmp

    Filesize

    25.0MB

  • memory/2528-50-0x00000000770C0000-0x0000000077269000-memory.dmp

    Filesize

    1.7MB

  • memory/2528-51-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2528-52-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2528-53-0x0000000001180000-0x0000000001204000-memory.dmp

    Filesize

    528KB

  • memory/2572-42-0x00000000733C0000-0x0000000073534000-memory.dmp

    Filesize

    1.5MB

  • memory/2572-43-0x00000000733C0000-0x0000000073534000-memory.dmp

    Filesize

    1.5MB

  • memory/2572-40-0x00000000770C0000-0x0000000077269000-memory.dmp

    Filesize

    1.7MB

  • memory/2572-48-0x00000000733C0000-0x0000000073534000-memory.dmp

    Filesize

    1.5MB