Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 03:36

General

  • Target

    a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe

  • Size

    5.1MB

  • MD5

    6c3d768ee3cbb766bd3ca1b75f1073e0

  • SHA1

    fce8b55e77e82a4469dbad053e822283a90123ee

  • SHA256

    a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4

  • SHA512

    c47e19d3794db5f476aa48f13fbfe6766e69abc910f9ac876c24284e41cb797ad64a7d3148505f97a3cd7527b56b9ee374cffc777d98b2faa58c4934ee5e0bef

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2StB:RFQWEPnPBnEXP7

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (222) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5512c5026d772810f72a56f716aef2425360216f042707090ccfc4e26e15ab4N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    5.2MB

    MD5

    91afe7f51f04d5a4798affa3a9bec71b

    SHA1

    2a351e1c98aead507f6b887756feba23c25aff5e

    SHA256

    68bf12abe1e3e38bb3ad5f4ca8473eaf1dc758a4412e227e6ddf3d48bd210348

    SHA512

    389005574f36b444b7eb1061ee63004d2cc034c38a1c08ab8d23823c0142056f9855d04ca63f9aed6a3d0751f002404605fd654159b667c2e268752959893ccf

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    5.3MB

    MD5

    8afc9215f979ba0f2b4190e9ad83235b

    SHA1

    28bd20407aeee44ded305ada9522c1fcbe8a480d

    SHA256

    08fdb7cb0a2e8a1d66a1201253476cbfaa8b074125ad8935c99b1fa8e51573e1

    SHA512

    fa6ccf29d1eb961c458fe329adab301c9f0a511b649520fb280ed9889186c5da957b5895543a8109b488f91e317822555f06fbe0e5af2fdd82ead3f5a1cc611e

  • memory/4460-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4460-2-0x00000000045B0000-0x00000000047BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4460-9-0x00000000045B0000-0x00000000047BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4460-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4460-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4460-14-0x00000000045B0000-0x00000000047BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4460-30-0x00000000045B0000-0x00000000047BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4460-31-0x00000000045B0000-0x00000000047BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4460-68-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4460-78-0x00000000045B0000-0x00000000047BC000-memory.dmp

    Filesize

    2.0MB