Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 19:51

General

  • Target

    4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa.exe

  • Size

    4.6MB

  • MD5

    c0a5f0a0ea95ae5d6b1a3dc36151dfc2

  • SHA1

    b57e795d9f3fe1e61d5f171cda6b411b6d67f21e

  • SHA256

    4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa

  • SHA512

    adc02b226ad781b27bff2bc04c4c6e1121b6bd322673eba22bbf7de76d47af6a0d2c8f2d485cee70337ee84d03a7be0678b0bdabc64f5c7204d0dcc6466a6ead

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvSdsc0B18YhT8qX/WqDb:RFQWEPnPBnEKd50P8YhT825b

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (196) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa.exe
    "C:\Users\Admin\AppData\Local\Temp\4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    4.7MB

    MD5

    1675a5fd76721edc864694bad70f716f

    SHA1

    28bfc27c269c7829016ecf7f5945c2fdb33ee15c

    SHA256

    c8f7d99b45ef8743ebc8585ccd797e96ef7049907df60cdd1b740f4625d13e1d

    SHA512

    2b5726f7740f35a621870a552cd8ed4e571665ceecd114bded9e8feac1f82b84cce0cfbbce7839d9e7d270cbf29be802c6085321e7a7461dd872de5d3a7c5815

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    4.8MB

    MD5

    d2b61ef7a6ae42f08aa2517d8549aebf

    SHA1

    79bbc1ff48faf47c3035d81ae83629ce7abf593f

    SHA256

    04aff2439414aba6a70bc2c4e6ae720764ba3a6a5375db8f395373fd63eef2ee

    SHA512

    1e3e419715fb45c035eda0a5ac5f486a4b5f1acaa5c637f1c256aa0d03d01c2745e3a35c210b0c3d04351df3d3c6368a15d845d804deee674617879538a74559

  • memory/2508-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2508-8-0x00000000032C0000-0x00000000034CC000-memory.dmp

    Filesize

    2.0MB

  • memory/2508-1-0x00000000032C0000-0x00000000034CC000-memory.dmp

    Filesize

    2.0MB

  • memory/2508-11-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2508-13-0x00000000032C0000-0x00000000034CC000-memory.dmp

    Filesize

    2.0MB

  • memory/2508-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2508-25-0x00000000032C0000-0x00000000034CC000-memory.dmp

    Filesize

    2.0MB

  • memory/2508-37-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2508-43-0x00000000032C0000-0x00000000034CC000-memory.dmp

    Filesize

    2.0MB