Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
124676a8ff5837f90554b6e553c6fe00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
124676a8ff5837f90554b6e553c6fe00N.exe
Resource
win10v2004-20240709-en
General
-
Target
124676a8ff5837f90554b6e553c6fe00N.exe
-
Size
3.2MB
-
MD5
124676a8ff5837f90554b6e553c6fe00
-
SHA1
6ce1ca71de7c0de936f9f0e563d8511871cf20e6
-
SHA256
46dc13b671ce2e69c4200516aabd8d1934b704f95adf781894164cef987b3b60
-
SHA512
1ca0cd7ff8db317e027f559d897abd1e8a6a1f6817f3c5455d55aaab5c47574fac065ac8b8b5eadcf4a39e22a56830a2b3d0a57340fcd6e6e77002a5ead087c0
-
SSDEEP
49152:vwn0POwNGMWCLpaTlplciGxPjjY0zUw3GdSaSqsS2l9Btr21qezQed/FbNYTOhV:vwn0PHAMopzGxrjY3EVaSdUdxNGOhV
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 124676a8ff5837f90554b6e553c6fe00N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 124676a8ff5837f90554b6e553c6fe00N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 124676a8ff5837f90554b6e553c6fe00N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4008 792 WerFault.exe 84 -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43} 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Implemented Categories 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\VersionIndependentProgID\ = "MSScriptControl.ScriptControl" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\InprocServer32 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\ProgID\ = "MSScriptControl.ScriptControl.1" 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\ = "ScriptControl Object" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\ToolboxBitmap32 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Version 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\MiscStatus\ = "0" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Programmable 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\ToolboxBitmap32\ = "\"C:\\Windows\\SysWOW64\\msscript.ocx\",102" 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\TypeLib\ = "{0E59F1D2-1FBE-11D0-8FF2-00A0D10038BC}" 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Version\ = "1.0" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Control 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msscript.ocx" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\MiscStatus 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\MiscStatus\1 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\ProgID 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\VersionIndependentProgID 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\InprocServer32\ThreadingModel = "Apartment" 124676a8ff5837f90554b6e553c6fe00N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\MiscStatus\1\ = "132499" 124676a8ff5837f90554b6e553c6fe00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DEA9FA47-8BBC-497E-33C8-D157A9D89C43}\TypeLib 124676a8ff5837f90554b6e553c6fe00N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 792 124676a8ff5837f90554b6e553c6fe00N.exe Token: SeIncBasePriorityPrivilege 792 124676a8ff5837f90554b6e553c6fe00N.exe Token: 33 792 124676a8ff5837f90554b6e553c6fe00N.exe Token: SeIncBasePriorityPrivilege 792 124676a8ff5837f90554b6e553c6fe00N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3248 wrote to memory of 792 3248 124676a8ff5837f90554b6e553c6fe00N.exe 84 PID 3248 wrote to memory of 792 3248 124676a8ff5837f90554b6e553c6fe00N.exe 84 PID 3248 wrote to memory of 792 3248 124676a8ff5837f90554b6e553c6fe00N.exe 84 PID 3248 wrote to memory of 792 3248 124676a8ff5837f90554b6e553c6fe00N.exe 84 PID 3248 wrote to memory of 792 3248 124676a8ff5837f90554b6e553c6fe00N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"C:\Users\Admin\AppData\Local\Temp\124676a8ff5837f90554b6e553c6fe00N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 13883⤵
- Program crash
PID:4008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 792 -ip 7921⤵PID:2432