Resubmissions

19/12/2024, 22:13

241219-1472hs1nds 10

19/12/2024, 21:43

241219-1kzwss1maj 10

Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2024, 21:43

General

  • Target

    481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734dN.exe

  • Size

    2.4MB

  • MD5

    0850fb73ac5cf974c11c0a78f2cc0a80

  • SHA1

    f05cc0495fe2a239c76625e6be51f3d52fdcdea2

  • SHA256

    481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734d

  • SHA512

    30dae41f217a94117d67a4a8c782386cd8cb892ce4d0f05e4d9afcab1b9427d3ce3675e411fda2b032d74a38c1fa50f7659b2a8c0580fc78e3945292a3215fa9

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEv3olj3:RF8QUitE4iLqaPWGnEvY

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (664) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734dN.exe
    "C:\Users\Admin\AppData\Local\Temp\481f49f44f47d75a777518e1c5b0523e28ee7b1eae03ad284f9d68ad7164734dN.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

    Filesize

    2.6MB

    MD5

    22112b6de0ccf7af06861b8bee456a28

    SHA1

    35d251401f7439dfe4b3dc325c4bea45fa79fdeb

    SHA256

    346a5b7468ddf544da9f78bb36b4c6627147b6028d0c50889443feee9c21eee6

    SHA512

    1d8f704db213177f6e799592751a105a01bd0e9312293a6bbe584ac08fb90fa3a84f3f35d18d13b8ac9edb8cabea10f721260873991f1d376964009742c316bf

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    2.7MB

    MD5

    4fb6ed4ccc025b6b438efc04d82a7593

    SHA1

    02f5a2126d9a8dd11812019dd468e958196a8695

    SHA256

    aa1aa4420c16bdb4f7894d20b9c1ad6cd62f4f6d109430d7b4679aec38e4ef1a

    SHA512

    989b3cdf1455ebe736be9c776db0a141d3c0387a49e379f907d9d408f351e4e6265a0d0fe7de8d3cd865afe727aaae7621957c7ce1fdb592f831062e77924846

  • memory/2144-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2144-2-0x0000000004850000-0x0000000004A5C000-memory.dmp

    Filesize

    2.0MB

  • memory/2144-9-0x0000000004850000-0x0000000004A5C000-memory.dmp

    Filesize

    2.0MB

  • memory/2144-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2144-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2144-14-0x0000000004850000-0x0000000004A5C000-memory.dmp

    Filesize

    2.0MB

  • memory/2144-50-0x0000000004850000-0x0000000004A5C000-memory.dmp

    Filesize

    2.0MB

  • memory/2144-51-0x0000000004850000-0x0000000004A5C000-memory.dmp

    Filesize

    2.0MB

  • memory/2144-142-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2144-161-0x0000000004850000-0x0000000004A5C000-memory.dmp

    Filesize

    2.0MB