Analysis

  • max time kernel
    60s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 19:26

General

  • Target

    8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96.exe

  • Size

    6.2MB

  • MD5

    04b19b217d78181c8951c1a097cee7aa

  • SHA1

    b4839f938fb95e3ab97bf1872efdf0018ed4a7e3

  • SHA256

    8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96

  • SHA512

    aa2b710d1993b6f50e76ec5af5573592870d8f7caf4d338bf8797c6dc134436693d23d305e2b60a5863e66f2e2b858fa7503b996e427785e4b14958571cf83c8

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEv7/IJsiC5sop7cTe:RFQWEPnPBnEQsiC592Te

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96.exe
    "C:\Users\Admin\AppData\Local\Temp\8b1366a7c04bd00cb75d51c4d944005b7c63eb985f9d9a94f83bcc6494b25c96.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    6.3MB

    MD5

    d0d5021e8c0ddd6152df79213e2b6ac8

    SHA1

    125cf6e04654443704852d9f07061c01251f3488

    SHA256

    48cbc8c870e4e9c061bf523140bbfda9d62bf0f9e9bda1a10df1f2d50f57c0f4

    SHA512

    449c6ceb1c84bb149952e8133f4919b368340a0a3f15ac14d123447c01595f6101918c7de61fb2928b561ce1f78cc7d430ac8fb14a20a8693f136a88a580d22e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    6.4MB

    MD5

    6f2c4c976410a60b9bb7e64eef55e359

    SHA1

    5facfb3e7b30ea0e2b6dd46dbb0b8ec5403efda7

    SHA256

    a7c604bff5371cd15c7d85a40984f538dc08c93cedd6bd0b9bbc0cbb6a25a39e

    SHA512

    b34f97dbcec4640292d293ca6dc2b35bf8f80e184bbd04a486f9cd6aadb38eef6dfa9c1a6e4e7e6db7daab7b612fb2e7135dd602f2ba4d26640d59f87a59e23e

  • memory/4648-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4648-2-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4648-9-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4648-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4648-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4648-14-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4648-32-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4648-33-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4648-74-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4648-86-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB