Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
Resource
win10v2004-20241007-en
General
-
Target
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
-
Size
3.0MB
-
MD5
a0603251331725cbcbde1f6189d22190
-
SHA1
0708b11c6c53a3a43260665436af65b313aa0a11
-
SHA256
de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13b
-
SHA512
8386a093a92bbb515b217c940e3e296150fae35aaa8a8e2869fcb3249d42b1a0eb55b02f6a65f46fdd5bc43646e83f4fc332fe97618bd793a6370cf6c5cfdf14
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVWiK+:RF8QUitE4iLqaPWGnEvN
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe -
Renames multiple (555) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\pl.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Xml.Linq.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-xstate-l2-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabIpsps.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Transactions.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\fa.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\msadc\msadcer.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\msquic.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\msadc\msadce.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-br.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\RepoMan.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\tipresx.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-profile-l1-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.FileSystem.DriveInfo.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\vstoee100.tlb.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\LICENSE.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\hostpolicy.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Primitives.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVPolicy.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-time-l1-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrdeusymnn.dat.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.FileSystem.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Xml.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tabskb.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-2-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.IsolatedStorage.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp140.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.EventBasedAsync.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Ping.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\netstandard.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Console.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-localization-l1-2-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrdeulm.dat.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\7-Zip\7zFM.exe.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\ado\msadox28.tlb.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe File created C:\Program Files\Common Files\System\Ole DB\msdasql.dll.tmp de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\4.0.30319\ = "4.0.30319" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "CorSymReader_SxS" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Server de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\2.0.50727 de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\2.0.50727\ = "2.0.50727" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Server\ = "diasymreader.dll" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\4.0.30319 de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\2.0.50727\ImplementedInThisVersion de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\4.0.30319\ImplementedInThisVersion de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "NDP SymReader" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mscoree.dll" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 728 de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe Token: SeIncBasePriorityPrivilege 728 de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe"C:\Users\Admin\AppData\Local\Temp\de15232955fd62ad0131e5480164f6d62e3569f041cbbc6d2adf6bf013aef13bN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55a4ab19acf1ca04545cf4c231e4b33ae
SHA128b47f3eee7790e03c1174ab910123ce9e09c44c
SHA2567b7834e28e4a24fe2d475e0261abe2070f87804a4ea94b8c28b5f7c6f840e577
SHA5125f4ddec3e5a035716d4b9aa30cb6f46ec09f3c6cea1f7433bbac52394b46914bb0b5fce065fac3a53d177f3797c878ac151aac358c02ff41266d49a061965fab
-
Filesize
3.2MB
MD54128b1644307a06e60cceac7149d4c1a
SHA1822e52695140be34e851d5bb0c7e4fe29c53a092
SHA256635d85c040ea3b7fc243ab9ea3a6297389041ad374e50bb9b7d367a385401ded
SHA512c261ea2b43a71e9b9f9ff1f8ba20154a1bca0095e17061ee5c838335215313a01a8b326f8f294e0f31cbdfbaeb0f856204d07c2feca64aa742aa96ee598572bb