Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
Resource
win10v2004-20241007-en
General
-
Target
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
-
Size
3.3MB
-
MD5
5f2fbdca7682a3bbdcf63cb856224ee0
-
SHA1
c26bf2b9c1686228ee7c27e03e4f4f068fa458d9
-
SHA256
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748
-
SHA512
6d70c0853a3cf2487d85ae31a09e918fe6700d3777ff8672e6a2747113120dd132679ea912026f5fe61af4953fd05baf3f586ef0c8732db7c5bfd051479bd521
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvSdsc0B18YhT8qM:RFQWEPnPBnEKd50P8YhT8t
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Renames multiple (212) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Drops file in Program Files directory 64 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkWatson.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tabskb.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\sk.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mip.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\FlickLearningWizard.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\pl.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\ro.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InkWatson.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\el.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\sl.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\rtscom.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\micaut.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresplm.dat.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IPSEventLogMsg.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\bg.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\ca.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkObj.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\ka.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InputPersonalization.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrusash.dat.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\rtscom.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\7zFM.exe.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\ko.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\ku.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXEV.DLL.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\descript.ion.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\th.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\ShapeCollector.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\IPSEventLogMsg.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\an.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\yo.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Modifies registry class 4 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "%SystemRoot%\\SysWow64\\NaturalLanguage6.dll" f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription pid Process Token: 33 2688 f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Token: SeIncBasePriorityPrivilege 2688 f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe"C:\Users\Admin\AppData\Local\Temp\f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD56e86b3b181c2bc1340cfba6f6bc26297
SHA12749157f15cdee266a847f7fa76de7c8c68a27a6
SHA256e8e91b343d384a062c79fa266d860fe95ddd7f96a81a97821d59d37da228a648
SHA512b2ec3dc6a3dd07ce08b188be41bffe642356b18f33bc79fc2ad5d1a44cba2ae021422f829a4812e61af10bbaa8be1061105290f4c2319ec9845f555e54823264
-
Filesize
3.4MB
MD5a6d5bbf4ae957fe6f7e5a2d65f56b597
SHA1cfdaf6a51d1bf1f5a5df582d82d8518a8a6c0012
SHA256d5f017b9de88d91d75c882962b36cc80412d2c2d1156936a0787edfbeebbf620
SHA512105c9d7df4fe15087e998be6131de0cd0eac39e1ae73166fd32dab7d62e5bf33993a1530f15ea5a40d3fed4a5f94791821b9bdf3a784439d02efd975cb600ac3