Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 19:57

General

  • Target

    4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa.exe

  • Size

    4.6MB

  • MD5

    c0a5f0a0ea95ae5d6b1a3dc36151dfc2

  • SHA1

    b57e795d9f3fe1e61d5f171cda6b411b6d67f21e

  • SHA256

    4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa

  • SHA512

    adc02b226ad781b27bff2bc04c4c6e1121b6bd322673eba22bbf7de76d47af6a0d2c8f2d485cee70337ee84d03a7be0678b0bdabc64f5c7204d0dcc6466a6ead

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvSdsc0B18YhT8qX/WqDb:RFQWEPnPBnEKd50P8YhT825b

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (420) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa.exe
    "C:\Users\Admin\AppData\Local\Temp\4c69fe8b2029203c70aac3215209f73a96e059fb567df7dd70e298c974c152aa.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    4.7MB

    MD5

    e98e9a14b62f3d80f13d084454642a2d

    SHA1

    e6b0aa6aaea4f3c533d5ec044264f251db47bba9

    SHA256

    425167c05cf6210e0fbd18b3ebc6761b86dc00c1307ba1c8f0743c9a582b1c2a

    SHA512

    572ae75a11e5bbd3a6a021d0002c23dec92f1f6fc4d2f220795a8de193c61f71de218132e9b4b8deaccd46fb9a0dd58256939102cbeeeaf20010dc4fc666a8e0

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    4.8MB

    MD5

    c7edda9b9cc607d17b5b14235f0c4548

    SHA1

    3b20e448c6907477b9981013797ea3bb531cd6bc

    SHA256

    62ea38f74a98fb7e2600d350a754fc1c84880505802fcaa3133d297bc31c1efb

    SHA512

    82d59ef6e2f9a369cc2f85a5885ddf780b59309f718f953af2c50e99e007ba3b244d49ff637fe32967377cc0e90a780bb134a3de0f9e69ffac8f83811ccefe0f

  • memory/2620-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2620-2-0x00000000049C0000-0x0000000004BCC000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-8-0x00000000049C0000-0x0000000004BCC000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-11-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2620-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2620-13-0x00000000049C0000-0x0000000004BCC000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-40-0x00000000049C0000-0x0000000004BCC000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-39-0x00000000049C0000-0x0000000004BCC000-memory.dmp

    Filesize

    2.0MB

  • memory/2620-95-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2620-107-0x00000000049C0000-0x0000000004BCC000-memory.dmp

    Filesize

    2.0MB