Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe
Resource
win10v2004-20241007-en
General
-
Target
70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe
-
Size
4.8MB
-
MD5
04e697d5f0b44950d238fe8cbdef64e0
-
SHA1
f55e91c748b9acd02d9c10d775c2e8cca1b8c6a0
-
SHA256
70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094d
-
SHA512
a6a840b4cf63fc7e23b74358aac4a4ff59d6f67d011a79ecf51be8640af43cc2efa3cb8e1bbb13853f1c401950334353c826b90b7c00b53b109b6628cb5e9c95
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2d:RFQWEPnPBnEXE
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe -
Renames multiple (294) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOLoaderUI.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwritalm.dat.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\sv-SE\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\mshwjpnr.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\id.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\sa.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\nn.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystemController.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrfralm.dat.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\7z.sfx.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\tt.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\msadco.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.tr-tr.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\ado\msado27.tlb.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\uz-cyrl.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwritash.dat.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\ca.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\ClearPop.cmd.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\CheckpointBackup.tiff.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msadcer.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msadcor.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\msadc\msdaprst.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\kab.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\7z.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\msinfo32.exe.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\sqlxmlx.rll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVCatalog.dll.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\TipRes.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\mshwLatin.dll.mui.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe File created C:\Program Files\Common Files\System\ado\msado25.tlb.tmp 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "html persistent handler for mapi email" 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\PersistentHandler 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\PersistentHandler\ = "{9694E38A-E081-46ac-99A0-8743C909ACB6}" 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2696 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe Token: SeIncBasePriorityPrivilege 2696 70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe"C:\Users\Admin\AppData\Local\Temp\70959e24889326fecdd66e6c15a47c61869e04562c5e4e82af8cec7b1e0c094dN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD542df17c04e193edff9de2dab5f5a3886
SHA1abe48090d86b4428f2125dd78feeb5a1b0df16c3
SHA2568228ae18f47e921a9e5941eb8ff105e5414af37022fdab42c20eefcacc541a10
SHA51238293f1707792bf3cecf80c2743b5de95a67486acdd4c3eb81953f8a9f52e00171d5a67364a776426a594ab126f56c9d5f7ae24356fa1b4f48b0ce234938c48c
-
Filesize
5.0MB
MD567aa16605171b4438c9f7fad9bb998e3
SHA1615fe3f0a33f1cf1e80a3edf2f4dbd0f97404c3a
SHA2569da58dfd541df1bb971b6fe3f1a6ed24a7ac628e1b831ce1ebd1343ac5116f43
SHA5124eeefc839a81733da06b2d2cd8f8f1b80685739a641953728871c03436bf5ad98b78aefeeef1ec38ab05b59e64883ea5e4e4b9fe7081ef085a3c132d364f8079