Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 22:33

General

  • Target

    b710286449c217ebd23fc7b0c0ba0030bf7184054dee48f3bf15b58bf41512a4.exe

  • Size

    2.8MB

  • MD5

    2e62f8f6fc5d5305441cfe2222c57186

  • SHA1

    3291193940a4b14acbc24a7d243b3ab802fd5120

  • SHA256

    b710286449c217ebd23fc7b0c0ba0030bf7184054dee48f3bf15b58bf41512a4

  • SHA512

    a9bf9fa3315f4fc2407726b674b89f8e08a2111ec1d39851ffbb7260fde4064dccba5c64870ad0fc51cec0cdadab878d4266a2feaa4dfd6ba90698073f14f15f

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiKjUOlk0u:RF8QUitE4iLqaPWGnEvSu

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (225) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b710286449c217ebd23fc7b0c0ba0030bf7184054dee48f3bf15b58bf41512a4.exe
    "C:\Users\Admin\AppData\Local\Temp\b710286449c217ebd23fc7b0c0ba0030bf7184054dee48f3bf15b58bf41512a4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    3.0MB

    MD5

    a6b740f22a2bf2dfd722035d082a8a80

    SHA1

    e3232158bf4690648178d49e4a544af3a8020011

    SHA256

    6b6aa9c4602b4ad43bc810292b048c06cbe1a426b8b6eb8b59ac6fca4ca62c1e

    SHA512

    b2d26a380dadcaa1a2c2616775db1b2081effccbd1c0ba40947bbf3916bd4c6d06f329b5999389cd2dd3170c8f7fea077fa21ca57cf2e0a6a18f137f70c55741

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    3.0MB

    MD5

    4aa57d4441beecd7c1819d7a182880f9

    SHA1

    d365abeb289b48922bb59408709cf747b24068b2

    SHA256

    84b95cdbf8cc1e05fd7322239cc8032fc151261c0f0903decacc019c181e7f5e

    SHA512

    ffa0e581bc34c0334cce54693366fb5385f1147e5f14198a634b17e16f64790ebb7db300c6d0b167aadeb1e12684b78e2d6a267f3c39ad90e7513f41467693a0

  • memory/2464-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2464-1-0x00000000030F0000-0x00000000032FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2464-8-0x00000000030F0000-0x00000000032FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2464-7-0x00000000030F0000-0x00000000032FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2464-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2464-11-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2464-13-0x00000000030F0000-0x00000000032FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2464-25-0x00000000030F0000-0x00000000032FC000-memory.dmp

    Filesize

    2.0MB

  • memory/2464-43-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2464-53-0x00000000030F0000-0x00000000032FC000-memory.dmp

    Filesize

    2.0MB