Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe
Resource
win10v2004-20241007-en
General
-
Target
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe
-
Size
8.3MB
-
MD5
11cfa26bba79670eea316ba55f0b1043
-
SHA1
8c513befaa66ee2aa762a7b26dac39cacbe1aeac
-
SHA256
8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69
-
SHA512
52f351552912e64188891725f515433630016f2275c553cbba5c98f7b1968d2aca0aaf1d5feb3e154b820cfb5159cf7d8c4052c0e7172beb1ade0217243cc605
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEg1:RFQWEPnPBnEXPEL
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe -
Renames multiple (231) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\is.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\nl.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\ShapeCollector.exe.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\fa.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\eu.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\TabTip.exe.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\readme.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\rtscom.dll.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\tabskb.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\ta.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\7z.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\fr.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvStreamingManager.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\tipresx.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\dicjp.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\sa.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\ext.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\rtscom.dll.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.el-gr.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\lij.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIntegration.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVPolicy.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\TipRes.dll.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\msinfo32.exe.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\de.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\fur.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\uz-cyrl.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\msinfo32.exe.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig.companion.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\hu.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\ja.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabIpsps.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\7-Zip\Lang\id.txt.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\InputPersonalization.exe.mui.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll.tmp 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalizedString = "@%systemroot%\\system32\\appwiz.cpl,-184" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Elevation 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Elevation\IconReference = "@%SystemRoot%\\system32\\appwiz.cpl,-1507" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InProcServer32 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InProcServer32\ = "%SystemRoot%\\SysWow64\\appwiz.cpl" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "ARP CBS Uninstaller Proxy" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\AppID = "{0da7bfdf-c0a0-44eb-be82-b7a82c4721de}" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Elevation\Enabled = "1" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InProcServer32\ThreadingModel = "Apartment" 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4016 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe Token: SeIncBasePriorityPrivilege 4016 8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe"C:\Users\Admin\AppData\Local\Temp\8b438c4ea785667b546774f545acdb3b45a0bb1f97ea28aaeb65c832b6af1a69.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD510a8c03de70345104b2777e81e9990d3
SHA14a479b93368905524e67967de2b3f326bd9925f6
SHA2561dd175971a80c3f8f674e0371d9ce16c8b66a1c580e3a94b77e1b73de24968e6
SHA512bdd866c3fb23d0cdce5656593187ea4d100524d83e078d85ea09bba4766b94f2dfe6559cbac231e94766d119cdebe18f3ad0e3ec4b93045a0d39504db7d18986
-
Filesize
8.5MB
MD5f8a5724e6b8de6414778295dec5b3b06
SHA1d76f390096d68ab4573de951888fa61b28d41fc5
SHA256f893db16f9eb625ef46cdf63aca6ec9d0d6a0ca7134c58ae8598283b897983ef
SHA512a232fe88272456d80a7c4bb5561cbb1a678b05d76eccb229203473e79b21e4da2ba53820116faee1ac82989c9e0fddbc32d83b75050c589154153bd2e547e2c7