Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 18:41

General

  • Target

    92eba36eb3d071e979bbe62623b4850677f96a83bc2b0a7256d6a6dd5a930c87.exe

  • Size

    5.8MB

  • MD5

    cd283f0aa38cce333ec378422d7a5ae1

  • SHA1

    9ea20227f72e6886de00530f2b262c3ab22c7df1

  • SHA256

    92eba36eb3d071e979bbe62623b4850677f96a83bc2b0a7256d6a6dd5a930c87

  • SHA512

    c43a4f1299074703c5aed239e0daeb982b79220ab5d4607f1656b5b917b78248f6e52bde7f4504e6da78849df09d33f5acb7c5e8e444e63e696530c67ba2bd12

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrpHv/kAZIlnHyLF06Sud19nEntkKoM5:RFQWEPnPBnEmOKIbGpPMAZcy3qyKB5

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92eba36eb3d071e979bbe62623b4850677f96a83bc2b0a7256d6a6dd5a930c87.exe
    "C:\Users\Admin\AppData\Local\Temp\92eba36eb3d071e979bbe62623b4850677f96a83bc2b0a7256d6a6dd5a930c87.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    5.9MB

    MD5

    0ce48f3f6bb212d66888f41f274f3293

    SHA1

    b1b8d8f02feaa1584745def9511c7bb9d612b465

    SHA256

    c33fdb15571aaa1722d543cf46fc32824834ffa28bf461d25b469944f070b9c0

    SHA512

    2805101e943375bde5e96576422e1c2d7f60f44d06b5653bff9a1b823e07206700f4f70929e331935ed90e0c338c4898dd2da1a309b4416586b7a5dbb95341db

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    6.0MB

    MD5

    42811ef5d4f01ba2640c69fd05baa01b

    SHA1

    206475dc3f095892998f472b9af00f0626c02fb7

    SHA256

    cf321aeff4fd68e812ec496bdc55926a23c41170569e19b0eafc9c0a42b34b55

    SHA512

    3963f4bf6f93255ad84d5478109af4276939fa3ad1daf33be6d77381ee8c81d7a89465ee276f2d5c6ddb2062d079cf74de4ab5522a4e2477a08a08b59c4b0085

  • memory/3408-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3408-2-0x00000000049B0000-0x0000000004BBC000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-9-0x00000000049B0000-0x0000000004BBC000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3408-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3408-14-0x00000000049B0000-0x0000000004BBC000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-31-0x00000000049B0000-0x0000000004BBC000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-30-0x00000000049B0000-0x0000000004BBC000-memory.dmp

    Filesize

    2.0MB

  • memory/3408-74-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3408-84-0x00000000049B0000-0x0000000004BBC000-memory.dmp

    Filesize

    2.0MB