Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
124676a8ff5837f90554b6e553c6fe00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
124676a8ff5837f90554b6e553c6fe00N.exe
Resource
win10v2004-20240709-en
General
-
Target
124676a8ff5837f90554b6e553c6fe00N.exe
-
Size
3.2MB
-
MD5
124676a8ff5837f90554b6e553c6fe00
-
SHA1
6ce1ca71de7c0de936f9f0e563d8511871cf20e6
-
SHA256
46dc13b671ce2e69c4200516aabd8d1934b704f95adf781894164cef987b3b60
-
SHA512
1ca0cd7ff8db317e027f559d897abd1e8a6a1f6817f3c5455d55aaab5c47574fac065ac8b8b5eadcf4a39e22a56830a2b3d0a57340fcd6e6e77002a5ead087c0
-
SSDEEP
49152:vwn0POwNGMWCLpaTlplciGxPjjY0zUw3GdSaSqsS2l9Btr21qezQed/FbNYTOhV:vwn0PHAMopzGxrjY3EVaSdUdxNGOhV
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 124676a8ff5837f90554b6e553c6fe00N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 124676a8ff5837f90554b6e553c6fe00N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 124676a8ff5837f90554b6e553c6fe00N.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43} 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\ = "Media Clip" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\TreatAs 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\TreatAs\ = "{F20DA720-C02F-11CE-927B-0800095AE340}" 124676a8ff5837f90554b6e553c6fe00N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2648 124676a8ff5837f90554b6e553c6fe00N.exe Token: SeIncBasePriorityPrivilege 2648 124676a8ff5837f90554b6e553c6fe00N.exe Token: 33 2648 124676a8ff5837f90554b6e553c6fe00N.exe Token: SeIncBasePriorityPrivilege 2648 124676a8ff5837f90554b6e553c6fe00N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2648 2436 124676a8ff5837f90554b6e553c6fe00N.exe 31 PID 2436 wrote to memory of 2648 2436 124676a8ff5837f90554b6e553c6fe00N.exe 31 PID 2436 wrote to memory of 2648 2436 124676a8ff5837f90554b6e553c6fe00N.exe 31 PID 2436 wrote to memory of 2648 2436 124676a8ff5837f90554b6e553c6fe00N.exe 31 PID 2436 wrote to memory of 2648 2436 124676a8ff5837f90554b6e553c6fe00N.exe 31 PID 2436 wrote to memory of 2648 2436 124676a8ff5837f90554b6e553c6fe00N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2648
-