Analysis
-
max time kernel
60s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe
Resource
win10v2004-20241007-en
General
-
Target
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe
-
Size
3.9MB
-
MD5
caa97c9ce1ac5507dd9386041cec5398
-
SHA1
2f95d85d31c8f02ca88c9e9f9bcb4fdcc9d6c03d
-
SHA256
88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d
-
SHA512
76bff010013bbeaf6a6fc8787b8e1ae2a078c802ab0c1f9edd4daf36fe3608e1f8b9560df0be4daad2529ebd66518c669b697bb170fe2d234de0209276d3892e
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RByF8QUitE45:RFQWEPnPBnEgyFQWEs
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe -
Renames multiple (221) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\mshwLatin.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\CloseSubmit.jpeg.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIntegration.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\be.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\he.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-private-l1-1-0.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\de.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\ps.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\es.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVScripting.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-xstate-l2-1-0.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vccorlib140.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\dicjp.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nb-no.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\TabTip.exe.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\sl.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\7z.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\uk.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\zh-cn.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVPolicy.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrdeslm.dat.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\Lang\ms.txt.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvVirtualization.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.el-gr.dll.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\7-Zip\descript.ion.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tabskb.dll.mui.tmp 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\Windows\\SysWOW64\\AppIdPolicyEngineApi.dll" 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Apartment" 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Programmable 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\TypeLib 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\TypeLib\ = "{85C3F8F7-CFCE-4259-87FF-CAB1F4521F6E}" 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version\ = "1.0" 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "AppIdPolicyHelper Class" 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3536 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe Token: SeIncBasePriorityPrivilege 3536 88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe"C:\Users\Admin\AppData\Local\Temp\88ab60f348ee27779d55610c7574dc8a7dba0322ea20a9863f6097c9a016cd0d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5e018c0b33926271a5895b834e64f6221
SHA171fc4e712dfd25f491e3de5c9296e690b014a506
SHA256abf60df18f0dbb93698fff6dec79b2de339df201271916884e176443e265f340
SHA512fe8285ab8706380678da51c48778b5c85c8f26ad48ff7ee045fbd91d12db16b4848739dc9de1c5ff7e4dcfdd1b21bab44a7e981276f7a3a99f123a2b0520f5a6
-
Filesize
4.1MB
MD52890a6501b41c25376f399e20f099874
SHA1c332d27de3c22d72450a84011cb4508c90716a0d
SHA256d6ba1b4c54d66bab55d61453a2ca1c47b4cf785f821ae97f98727946fe5153c5
SHA512f5495fa95a141d29efee0f3b9c394eaf2bb05a28be09f5ba575670b14a1348eea7a6dc1c333434321757e459b87581424643a7343b28cfe6fc33264a0af46df3