Analysis
-
max time kernel
60s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe
Resource
win10v2004-20241007-en
General
-
Target
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe
-
Size
2.9MB
-
MD5
a5455d571dfe2fb417ae9b31441627a6
-
SHA1
37960f0f3365387995493ea9ac8588480880fd50
-
SHA256
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5
-
SHA512
bc60ab8b0afee20e9d9b67f340a6b85a717d3241517340a63a8211e3140f45adfc1a6aec987e06284babb2e241c0ddccea477c502beb7b32c9a9d96ea116f38c
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiK2XARrP/WH5g:RF8QUitE4iLqaPWGnEv6WHm
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe -
Renames multiple (219) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe -
Drops file in Program Files directory 64 IoCs
Processes:
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exedescription ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tabskb.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrdeulm.dat.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvVirtualization.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrfralm.dat.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\InkDiv.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\lv.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nl-nl.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\StreamServer.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\TabTip.exe.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\7z.exe.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\nb.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\descript.ion.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-xstate-l2-1-0.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVScripting.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\uk.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-process-l1-1-0.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.uk-ua.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\cs.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-br.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\gl.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\ko.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hu-hu.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrenUSlm.dat.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\be.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InputPersonalization.exe.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\ta.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\7-Zip\Lang\ro.txt.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\imjplm.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\TipTsf.dll.mui.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml.tmp 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe -
Modifies registry class 4 IoCs
Processes:
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "%SystemRoot%\\SysWow64\\NaturalLanguage6.dll" 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exedescription pid Process Token: 33 3028 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe Token: SeIncBasePriorityPrivilege 3028 318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe"C:\Users\Admin\AppData\Local\Temp\318704f2842db93eeec2ec6a4803a1d03f16ff4303131b935dd2c3270afa56d5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5e0661b5083f5c06faeae772ebe7309f4
SHA1a652f096e3f6049ab6168acbfb626b53eb13b74f
SHA256f80f0f698246b7a840b8747bae69ff5751ac3be2f2939be2958a9f6868b69ad0
SHA512a5e29d176ee5ce8aec76e6f55e518237160e40120193455a1970dbe47dbdb4f94ab4e04088cd083e9606916c118a239b506089a9fdfe5412ffda54543e3fb3d7
-
Filesize
3.1MB
MD5c6257fa43859b947abce3082002588d1
SHA18aab135751b4c3087b976460529095f743030011
SHA2565d0e7ab96f543db2211fb0cfd66baa42e77b70d5ee64adf7dbb35bc901f7474d
SHA512bf9a2f1b78477ca25def5edb3af92e280570c1850d3ea3c6d0ab0b6876fc02421d118ddcd4799fbd3a3693c426741f0d4859083161bd2de2a5445ec786080a9a