Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe
Resource
win10v2004-20241007-en
General
-
Target
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe
-
Size
5.5MB
-
MD5
067f0062ade5531bf653ab04736a0c5a
-
SHA1
e6ca5944b55f206caa4e04f363b943aa6eea08ee
-
SHA256
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e
-
SHA512
99960ce040d603eb8dc3124da974d0c9175bd120cf9a18e1412a1f804f83858b7218a6626ce77528145a8eec78f4b64e507b896b7c67d54b72aba4d2ffa4fd2d
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2Stw:RFQWEPnPBnEXPW
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe -
Renames multiple (198) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exedescription ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tabskb.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\IpsPlugin.dll.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkObj.dll.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresslm.dat.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InputPersonalization.exe.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\id.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\sk.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\tt.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\ug.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatlm.dat.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\pl.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatsh.dat.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\sw.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IPSEventLogMsg.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\mng.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\odffilt.dll.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresmlm.dat.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\7zFM.exe.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mip.exe.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\ne.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipTsf.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\tg.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\fa.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\ShapeCollector.exe.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipBand.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\ClearGet.vbs.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\FlickLearningWizard.exe.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\rtscom.dll.mui.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml.tmp 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe -
Modifies registry class 25 IoCs
Processes:
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID\ = "Outlook.OlkSenderPhoto" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Control 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Outlook.OlkSenderPhotoClass" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ToolboxBitmap32 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Typelib 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\RuntimeVersion = "v2.0.50727" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\14.0.0.0 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Outlook, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "Outlook.OlkSenderPhoto.1" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ToolboxBitmap32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLOOK.EXE,5517" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Typelib\ = "{00062FFF-0000-0000-C000-000000000046}" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Assembly = "Microsoft.Office.Interop.Outlook, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\OUTLOOK.EXE\"" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version\ = "9.4" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "Microsoft Outlook Sender Photo Control" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocHandler32 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocHandler32\ = "ole32.dll" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Class = "Microsoft.Office.Interop.Outlook.OlkSenderPhotoClass" 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exedescription pid Process Token: 33 2464 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe Token: SeIncBasePriorityPrivilege 2464 5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe"C:\Users\Admin\AppData\Local\Temp\5f20bcf65bc80712585d8680faeb5b5a9919d77340762c41e5f3f86a75fd210e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5933bca93d052cfe5499e1bd52f02b76d
SHA196ab0e80cc7a0514a2b04feaea082c37755835ee
SHA256c38c6f4082a3ff66bad7800a9bee3c1744d51ce263d69e1afc607c71d8d8aac7
SHA512a960d5fd6667fa1dc0e3264e53a0fe9e697d8bdb425abaf2199877505398a2659b252cf5c6b82daf78e1478e6c73be2b5f79d2997c2c692b8d5545ddb2f2d863
-
Filesize
5.6MB
MD54e08a31fe0521ea8854cfdca793f8898
SHA16ba82db05b6264a3cb12eba9f4d87335629a523c
SHA25688be274bd786de96d8f2b90dc5c5a9760cc93cf18172a69b7caf3fa411449284
SHA51203a573790cbcf8e2d0b128f461b9e8b5669a03bcec2f39948031406798bb780a7b465d86809ff1c137fbf84ce0984755caac3533553d006e210c607f36fe9957