Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe
Resource
win10v2004-20241007-en
General
-
Target
a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe
-
Size
5.1MB
-
MD5
6c3d768ee3cbb766bd3ca1b75f1073e0
-
SHA1
fce8b55e77e82a4469dbad053e822283a90123ee
-
SHA256
a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4
-
SHA512
c47e19d3794db5f476aa48f13fbfe6766e69abc910f9ac876c24284e41cb797ad64a7d3148505f97a3cd7527b56b9ee374cffc777d98b2faa58c4934ee5e0bef
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StB:RFQWEPnPBnEXP7
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe -
Renames multiple (222) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabIpsps.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\tabskb.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hr-hr.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\eo.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\InkObj.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.bg-bg.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\tiptsf.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tabskb.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIntegration.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\InputPersonalization.exe.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwresplm.dat.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\TipRes.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\7z.sfx.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InputPersonalization.exe.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\fa.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InputPersonalization.exe.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\mshwLatin.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\7z.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\el.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\mshwjpn.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml.tmp a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Server\ = "diasymreader.dll" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\2.0.50727\ = "2.0.50727" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\2.0.50727\ImplementedInThisVersion a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Server a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\4.0.30319\ = "4.0.30319" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "CorSymWriter_SxS" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mscoree.dll" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\2.0.50727 a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\4.0.30319 a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\4.0.30319\ImplementedInThisVersion a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "NDP SymWriter" a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4460 a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe Token: SeIncBasePriorityPrivilege 4460 a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe"C:\Users\Admin\AppData\Local\Temp\a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD591afe7f51f04d5a4798affa3a9bec71b
SHA12a351e1c98aead507f6b887756feba23c25aff5e
SHA25668bf12abe1e3e38bb3ad5f4ca8473eaf1dc758a4412e227e6ddf3d48bd210348
SHA512389005574f36b444b7eb1061ee63004d2cc034c38a1c08ab8d23823c0142056f9855d04ca63f9aed6a3d0751f002404605fd654159b667c2e268752959893ccf
-
Filesize
5.3MB
MD58afc9215f979ba0f2b4190e9ad83235b
SHA128bd20407aeee44ded305ada9522c1fcbe8a480d
SHA25608fdb7cb0a2e8a1d66a1201253476cbfaa8b074125ad8935c99b1fa8e51573e1
SHA512fa6ccf29d1eb961c458fe329adab301c9f0a511b649520fb280ed9889186c5da957b5895543a8109b488f91e317822555f06fbe0e5af2fdd82ead3f5a1cc611e