Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 13:38

General

  • Target

    f3c7c3cba051c85937daa2cad72f59bf6b47b5b9c14cdb42057dbc8fda99e1a8.exe

  • Size

    3.0MB

  • MD5

    299d5f94d35d28ae98e5454a0bdca9a3

  • SHA1

    db7c8111fe03133f118507f4beefcaedc058ae25

  • SHA256

    f3c7c3cba051c85937daa2cad72f59bf6b47b5b9c14cdb42057dbc8fda99e1a8

  • SHA512

    224681a0028f25656dbc6c49feb564000f332da5bab64b65c6e1835698daff1c866b3d9aed3244fa784f91a2734e7aeeda878b7bf3869a2212a56597aba8319f

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvV47RIgiBul:RF8QUitE4iLqaPWGnEvK7RZ

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (726) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3c7c3cba051c85937daa2cad72f59bf6b47b5b9c14cdb42057dbc8fda99e1a8.exe
    "C:\Users\Admin\AppData\Local\Temp\f3c7c3cba051c85937daa2cad72f59bf6b47b5b9c14cdb42057dbc8fda99e1a8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

    Filesize

    3.1MB

    MD5

    38eaba0b1e911e207f6df44e7403d410

    SHA1

    61112f70d4ae3a0731cb7907cad64390a8b196af

    SHA256

    16695f3518e61621918c0a02317b5245167880940d857da1817eb13da85581a5

    SHA512

    7d58a9b76c4def07dcdd70fff178f4e87517d777a0628693db27d83aaf92c2848bbfa538e39ba3d047305fc6fc8fcc2dd305a59408ddd47b61a12b832f343702

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    3.2MB

    MD5

    2b3d40875c65783683ba819a4afbce21

    SHA1

    75e9fc673d455eeb75e70a70d9212e8854ceb98c

    SHA256

    ad7d3ba7de248fcb5edc49bb17b0b2ae7841cb0823f7fb5bbd6b58ce492e7741

    SHA512

    48d3def6009c925c90c3c40a88f1e0a8901121e0428e2c6641e390a1ea1e754fcc1a9bec5b232ba67f84218b4f79013b81099773b1e1e8bc45b6c74d39464644

  • memory/1008-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1008-2-0x0000000004970000-0x0000000004B7C000-memory.dmp

    Filesize

    2.0MB

  • memory/1008-9-0x0000000004970000-0x0000000004B7C000-memory.dmp

    Filesize

    2.0MB

  • memory/1008-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1008-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1008-14-0x0000000004970000-0x0000000004B7C000-memory.dmp

    Filesize

    2.0MB

  • memory/1008-50-0x0000000004970000-0x0000000004B7C000-memory.dmp

    Filesize

    2.0MB

  • memory/1008-51-0x0000000004970000-0x0000000004B7C000-memory.dmp

    Filesize

    2.0MB

  • memory/1008-136-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1008-154-0x0000000004970000-0x0000000004B7C000-memory.dmp

    Filesize

    2.0MB