Overview
overview
10Static
static
3#!NewFiile...up.exe
windows7-x64
10#!NewFiile...up.exe
windows10-2004-x64
10#!NewFiile...se.dll
windows7-x64
1#!NewFiile...se.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...md.dll
windows7-x64
1#!NewFiile...md.dll
windows10-2004-x64
1#!NewFiile...h.pptx
windows7-x64
1#!NewFiile...h.pptx
windows10-2004-x64
1#!NewFiile...er.exe
windows7-x64
1#!NewFiile...er.exe
windows10-2004-x64
1#!NewFiile...40.dll
windows7-x64
1#!NewFiile...40.dll
windows10-2004-x64
1#!NewFiile...ib.dll
windows7-x64
1#!NewFiile...ib.dll
windows10-2004-x64
1#!NewFiile...er.exe
windows7-x64
1#!NewFiile...er.exe
windows10-2004-x64
1#!NewFiile...or.exe
windows7-x64
1#!NewFiile...or.exe
windows10-2004-x64
1#!NewFiile...st.dll
windows7-x64
1#!NewFiile...st.dll
windows10-2004-x64
1#!NewFiile...er.dll
windows7-x64
1#!NewFiile...er.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1#!NewFiile...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/Setup.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/Setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/acdbase.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/acdbase.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral6
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral8
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral10
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-time-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/api-ms-win-crt-utility-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/libmmd.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/libmmd.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/stich.pptx
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/stich.pptx
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/updater.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/updater.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/vcruntime140.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/vcruntime140.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/AzureKeyVaultDgssLib.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/AzureKeyVaultDgssLib.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/BugReporter.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/BugReporter.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/ComExtractor.exe
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/ComExtractor.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral27
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/WinUiBootstrapper.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/WinUiBootstrapper.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral32
Sample
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/x64/api-ms-win-core-console-l1-2-0.dll
Resource
win10v2004-20240419-en
General
-
Target
#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s/Setup.exe
-
Size
8.5MB
-
MD5
98169506fec94c2b12ba9930ad704515
-
SHA1
bce662a9fb94551f648ba2d7e29659957fd6a428
-
SHA256
9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363
-
SHA512
7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30
-
SSDEEP
196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Detect Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2696-88-0x0000000000400000-0x0000000000B4B000-memory.dmp family_vidar_v7 behavioral1/memory/2696-93-0x0000000000400000-0x0000000000B4B000-memory.dmp family_vidar_v7 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 2320 set thread context of 2680 2320 Setup.exe 28 -
Loads dropped DLL 6 IoCs
Processes:
netsh.exeBvInputDiag.exeWerFault.exepid Process 2680 netsh.exe 2696 BvInputDiag.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe 1332 WerFault.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
Setup.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "C:\\Windows\\System32\\MSDvbNP.ax" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Both" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1332 2696 WerFault.exe 30 -
Modifies registry class 5 IoCs
Processes:
Setup.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3} Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ = "Microsoft ATSC Network Provider" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "C:\\Windows\\System32\\MSDvbNP.ax" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Both" Setup.exe -
Processes:
BvInputDiag.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 BvInputDiag.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 BvInputDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C BvInputDiag.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 BvInputDiag.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exenetsh.exepid Process 2320 Setup.exe 2320 Setup.exe 2680 netsh.exe 2680 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exenetsh.exepid Process 2320 Setup.exe 2680 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Setup.exenetsh.exeBvInputDiag.exedescription pid Process procid_target PID 2320 wrote to memory of 2680 2320 Setup.exe 28 PID 2320 wrote to memory of 2680 2320 Setup.exe 28 PID 2320 wrote to memory of 2680 2320 Setup.exe 28 PID 2320 wrote to memory of 2680 2320 Setup.exe 28 PID 2320 wrote to memory of 2680 2320 Setup.exe 28 PID 2680 wrote to memory of 2696 2680 netsh.exe 30 PID 2680 wrote to memory of 2696 2680 netsh.exe 30 PID 2680 wrote to memory of 2696 2680 netsh.exe 30 PID 2680 wrote to memory of 2696 2680 netsh.exe 30 PID 2680 wrote to memory of 2696 2680 netsh.exe 30 PID 2680 wrote to memory of 2696 2680 netsh.exe 30 PID 2696 wrote to memory of 1332 2696 BvInputDiag.exe 34 PID 2696 wrote to memory of 1332 2696 BvInputDiag.exe 34 PID 2696 wrote to memory of 1332 2696 BvInputDiag.exe 34 PID 2696 wrote to memory of 1332 2696 BvInputDiag.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s\Setup.exe"C:\Users\Admin\AppData\Local\Temp\#!NewFiile_7474_ṔḁṨṨCṏḌḙ$s\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\BvInputDiag.exeC:\Users\Admin\AppData\Local\Temp\BvInputDiag.exe3⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 14884⤵
- Loads dropped DLL
- Program crash
PID:1332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
6.0MB
MD564bef270cf97e346271038abe98560b8
SHA1688ebdf3ef83e79923253c8fcef81dec2833c83c
SHA256c69a8752c24f88c8783fcc105da2d977dc2abda8968a090d9cbde9cfbe9e9121
SHA512024d20ee1a58c8a641440d3d24e0bfd205aa952b62c0e1d34865f880b4df36b5808552d39fedbc8e20f355836b5acd99bec8d5a978cdf8197d27f95ae988eea9
-
Filesize
136KB
MD53d754cfa4a5b2a3f19720550acf6d3cf
SHA1e5c78edbd54e14a42258a6c223d2cf128530e1b6
SHA2568e5e627881c8182bfbb64601c6f4f7b30ba950dfd10f638f404479406b2c03b8
SHA51218db06443a718b8233ac9724e7f96310bf5841d2c980cd1d02e6fb6743e23acc13bd67fcd214b4c0650ac933f6f081759d699c73e14baf26ffc324c2b30f153b