Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 03:36

General

  • Target

    a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe

  • Size

    5.1MB

  • MD5

    6c3d768ee3cbb766bd3ca1b75f1073e0

  • SHA1

    fce8b55e77e82a4469dbad053e822283a90123ee

  • SHA256

    a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4

  • SHA512

    c47e19d3794db5f476aa48f13fbfe6766e69abc910f9ac876c24284e41cb797ad64a7d3148505f97a3cd7527b56b9ee374cffc777d98b2faa58c4934ee5e0bef

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StB:RFQWEPnPBnEXP7

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini.tmp

    Filesize

    5.2MB

    MD5

    a0c1df7bd73abaac0163543b18637c80

    SHA1

    d07d4cd12c1435c64ea4c2e9ea4b463ad6ef380c

    SHA256

    9722544c3ea8de09ba860843315a13125dd82a8449548c9ec89a8e026ad736f4

    SHA512

    f1b1ad75fe2de5e242f08d6ac79b73bd5ef9848885414cf03a0fb115111b49ea440f953244b10b4cee3f3ab37256f950e0903e620c723ba3c1436cfd85372813

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    5.2MB

    MD5

    a0517046b1202f12521c66edbd4de850

    SHA1

    e922b11cebc3a34ee53a40f374a8e4b347cfa55c

    SHA256

    feb73cd2d67ecbd6659e16898c5999dee60325ed28c1a5202ef3a99abcfba18f

    SHA512

    ce7d58f4fb15180c0f46bd6297a091975b90ccc29220699c159555d67123e72094c00980122cc16114bd3f9ef2eea0ebebd0ae492107a8cb25562c606c0d57d4

  • memory/2224-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2224-1-0x0000000003250000-0x000000000345C000-memory.dmp

    Filesize

    2.0MB

  • memory/2224-8-0x0000000003250000-0x000000000345C000-memory.dmp

    Filesize

    2.0MB

  • memory/2224-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2224-11-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2224-13-0x0000000003250000-0x000000000345C000-memory.dmp

    Filesize

    2.0MB

  • memory/2224-23-0x0000000003250000-0x000000000345C000-memory.dmp

    Filesize

    2.0MB

  • memory/2224-35-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2224-41-0x0000000003250000-0x000000000345C000-memory.dmp

    Filesize

    2.0MB