Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe
Resource
win10v2004-20241007-en
General
-
Target
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe
-
Size
5.6MB
-
MD5
ede164ba1f5919702cccdf73b3df131f
-
SHA1
b0385072d97ee6a851d078235f436b6ed6d8366b
-
SHA256
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c
-
SHA512
d3a40c70a10bfa6ce04005a44119cdcf29ec21e31fe6b7300833374677ded37bd812e7f530c206bd7e6c9affa9bb4881d838030811a2333b934f065b0b4db0b1
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrpHv/kAZIlnHyLF06Sud19nEntkKt:RFQWEPnPBnEmOKIbGpPMAZcy3qyKt
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe -
Renames multiple (200) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exedescription ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\7z.dll.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\History.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\ShapeCollector.exe.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\ClearSend.contact.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\ru.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\tg.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\tt.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\readme.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tabskb.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkObj.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipRes.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\7z.sfx.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\bg.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\ky.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\mn.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\rtscom.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\ko.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\zh-cn.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\az.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\fa.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\gl.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\hr.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkWatson.exe.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\fy.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IPSEventLogMsg.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IpsMigrationPlugin.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\micaut.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\yo.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipBand.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\sq.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\FlickLearningWizard.exe.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\7z.exe.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\uk.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\BlockExpand.ogg.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\odffilt.dll.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\rtscom.dll.mui.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\ba.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\ja.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\tr.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\ug.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe File created C:\Program Files\7-Zip\Lang\lij.txt.tmp 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe -
Modifies registry class 49 IoCs
Processes:
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet\2 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet\3 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet\3\ = "1,32,1" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32\LocalServer32 = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0047005200410050004800460069006c00650073003e0050004e006b004f002900500077006b002500410078003d003300720045007000580049007300330000000000 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "MSGraph.Chart.8" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\AuxUserType\2\ = "Chart" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DefaultIcon 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DefaultIcon\ = "C:\\Windows\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\graph.ico,0" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Verb 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Verb\0\ = "&Edit,0,2" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\MiscStatus 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Verb\1\ = "&Open,0,2" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version\ = "1.3" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\AuxUserType 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\AuxUserType\3 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\AuxUserType\3\ = "Microsoft Graph Chart" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Implemented Categories\{000C0118-0000-0000-C000-000000000046} 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet\2\ = "1,16,1" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GRAPH.EXE" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocHandler32 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Insertable 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Typelib 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\MiscStatus\ = "1" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Typelib\ = "{00020802-0000-0000-C000-000000000046}" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\AuxUserType\2 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion\Readwritable\Main 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\DefaultFile 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet\1 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\GetSet\1\ = "1,1,1" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Implemented Categories 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "Microsoft Graph Chart" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion\Readable\Main 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion\Readable\Main\ = "GBiff5,MSGraph" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion\Readwritable 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Verb\1 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID\ = "MSGraph.Chart" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion\Readable 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Conversion\Readwritable\Main\ = "GBiff5" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\DataFormats\DefaultFile\ = "GBiff5" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocHandler32\ = "ole32.dll" 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Verb\0 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exedescription pid Process Token: 33 2904 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe Token: SeIncBasePriorityPrivilege 2904 32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe"C:\Users\Admin\AppData\Local\Temp\32caaae8a86016f7243ec2944460057d5bd5cfbb78b3ba93e25a798ff8a7198c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5457743cb4c42e014a835a0c40d021aa5
SHA17a0dc2924bc837eb06338233e2e8dfd42ff676a7
SHA256f751940751a8bebcc52f408908425784d36fda0b3e839f8d9818565a629b0622
SHA51251679c980b792f5a47fd57349bb503ad5e90bb97ed560bb13267e13f827241eeb5b01be1527c33f625e211a22b8b541a769b0113abf1d2348d8272fd277e7ce4
-
Filesize
5.7MB
MD5716af9d36928f24d10876bb1339c326e
SHA13cf69e0574a9a446311422d33ac96a4215cd9b67
SHA25668042a4156bfd07f0517d9bf2cd84ae31c479de67c943e9429628bd4e9761d0c
SHA512d05e0b64b6c1e0a911b4679140c3df950a7d05382643ddc5a8434bc543ddd11c74cedf33e7ef6b3d1ad488c69ae00faf78f4f38a8f0de53add66b55198ad308c