Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
Resource
win10v2004-20241007-en
General
-
Target
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
-
Size
3.3MB
-
MD5
5f2fbdca7682a3bbdcf63cb856224ee0
-
SHA1
c26bf2b9c1686228ee7c27e03e4f4f068fa458d9
-
SHA256
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748
-
SHA512
6d70c0853a3cf2487d85ae31a09e918fe6700d3777ff8672e6a2747113120dd132679ea912026f5fe61af4953fd05baf3f586ef0c8732db7c5bfd051479bd521
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvSdsc0B18YhT8qM:RFQWEPnPBnEKd50P8YhT8t
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Renames multiple (498) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Drops file in Program Files directory 64 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\ado\msado25.tlb.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\TabTip.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-string-l1-1-0.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-utility-l1-1-0.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.Tracing.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.NetworkInformation.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ServiceProcess.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.Metadata.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\it-IT\InkObj.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\clrjit.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.FileVersionInfo.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Sockets.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\ShapeCollector.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msaddsr.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.Specialized.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Quic.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\ado\msado28.tlb.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\it-IT\wab32res.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-environment-l1-1-0.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\fr.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Linq.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\hostpolicy.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\ja-JP\wab32res.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\msadc\msdaprsr.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\.version.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-private-l1-1-0.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\TipRes.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\mshwLatin.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\msadc\msadcor.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\Ole DB\it-IT\oledb32r.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\BlockJoin.rle.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\offreg.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InputPersonalization.exe.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\micaut.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\7-Zip\Lang\fur.txt.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscorrc.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe File created C:\Program Files\Common Files\microsoft shared\ink\Content.xml.tmp f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Modifies registry class 5 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "%systemroot%\\SysWow64\\comuid.dll" f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "PSFactoryBuffer" f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exedescription pid Process Token: 33 1964 f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe Token: SeIncBasePriorityPrivilege 1964 f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe"C:\Users\Admin\AppData\Local\Temp\f8c41a4e42a7f702cdc141e401ec34fc6c56ac3df11fcdc588a6ed3bef2ca748N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5a485096c19d859e4f2a85af366082579
SHA10f83b9aee6fd1bc833176305753fd2380573a6cc
SHA256c2439ffe7efcd6a62d103273b82d5f76bb3b5210ca8a8d63f3fa35adedc039c8
SHA512aa28e77b59f7c1d535996645998df05c80dbc4e30d2d603ea8b96c18e524d33e67f92892c4d1ddabdebe7be47b801213edfcbd623648073ad8dda194a80b6186
-
Filesize
3.5MB
MD55423de43c0c2a5ed8a2e9e6e0a2c6cff
SHA1229fc01233a39a551327bacc18c5cb164790cca9
SHA2564523fd552baf0cfad2f65bd5865e054b34d3ddc1b79d052222814f90b336ff91
SHA51262d9264bafee47e0037f83c6340a1b4a1fb67a3b41537f915b1d718750f860040ad9ccdc7fff74453d37fdbb983ed785fdba20bb079917a778e7ce86077f0df2