Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe
Resource
win10v2004-20240508-en
General
-
Target
cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe
-
Size
1.8MB
-
MD5
4cf68b5153ef9fef0913eaac33835ff6
-
SHA1
ca9f7248c04ac4720735a387a56e474ab08dc438
-
SHA256
cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51
-
SHA512
616e9ff51db040627157eca8bda77842c9ae3d675014f24b0ab5f25aab6877b0fcfb56aec09d6545c7fc175b420234e95f27b48b109665273aa3fd9185b3b3d0
-
SSDEEP
49152:VvMW2NU1HlwuKfJTkYQknzTAixG00q5VWy7EeNpZ:V0hNOFwu4QknzTAixBPtQAz
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32\ = "mscoree.dll" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32\Class = "STSUpld.UploadCtl" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32\Assembly = "stsupld, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32\CodeBase = "C:\\PROGRA~2\\MICROS~1\\Office14\\STSUPLD.DLL" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ImplementedCategories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ImplementedCategories cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ProgId cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32\RuntimeVersion = "v2.0.50727" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ = "STSUpld.UploadCtl" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ImplementedCategories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32\ThreadingModel = "Both" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ImplementedCategories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\InprocServer32 cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\ProgId\ = "STSUpld.UploadCtl" cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\Implemented Categories cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B09BD816-0A41-4E09-35FE-23A31DC931D0}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 772 cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe Token: SeIncBasePriorityPrivilege 772 cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe"C:\Users\Admin\AppData\Local\Temp\cae70eaf4f15e4c111a6d6c015f86633bc5836dc6efff28298a5745852c52a51.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:772