Analysis

  • max time kernel
    60s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 19:32

General

  • Target

    887f0528dca25cf05bcbb854c1ddda8534c64291512f40a17b03ec8faedf6043.exe

  • Size

    2.7MB

  • MD5

    c294f1ac5ea51f14e316b83fa02310aa

  • SHA1

    c5dc47f6b58abad884276e286e408623d1cc18f9

  • SHA256

    887f0528dca25cf05bcbb854c1ddda8534c64291512f40a17b03ec8faedf6043

  • SHA512

    fa869468a8f05efc072e529ec0402298fffac601637ad54aaa4733b8646b43b902a29c27b07a0e97fc9cd0e67f4e977e7d0c83dfe22bebb37acd490c14fc2ec0

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVSTXARrP/WH5/:RF8QUitE4iLqaPWGnEvfWHp

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\887f0528dca25cf05bcbb854c1ddda8534c64291512f40a17b03ec8faedf6043.exe
    "C:\Users\Admin\AppData\Local\Temp\887f0528dca25cf05bcbb854c1ddda8534c64291512f40a17b03ec8faedf6043.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

    Filesize

    2.8MB

    MD5

    022c0f640cd59295540c4739f394f762

    SHA1

    3edc2e28273b3e330e17bbd02a29aeaa48020933

    SHA256

    a6d458b763c1f923eda01165a7c5fec22204ba322cdddc2f2bb92ffed4e56b5b

    SHA512

    6ad6261ac21c28550382d919f4c0992fa3a82a25ebe0836ec6e7da57345325fcd8cd08e4333237e4ac5849e0bdb3aaddffd1aa49558870fd70c62392b5db1782

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    2.9MB

    MD5

    ce01e1d86c8b489067f08c3091a68ca4

    SHA1

    0d30d4a7a1b77c86aa12f7e89c49d174ee8f79a3

    SHA256

    bf81713329da24611a9dccedcc9ea0f466728bf8b509d8f1c3abb293d9320b9e

    SHA512

    7f64bcf4d76404a8de54014d924d7fac86de43344c5c6c3c4d00139961e2d223fe2a83ec6f8835dd182963467606475140cf3ceaed7f18968e74910d47d8e5e3

  • memory/3580-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3580-2-0x0000000004880000-0x0000000004A8C000-memory.dmp

    Filesize

    2.0MB

  • memory/3580-9-0x0000000004880000-0x0000000004A8C000-memory.dmp

    Filesize

    2.0MB

  • memory/3580-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3580-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3580-14-0x0000000004880000-0x0000000004A8C000-memory.dmp

    Filesize

    2.0MB

  • memory/3580-54-0x0000000004880000-0x0000000004A8C000-memory.dmp

    Filesize

    2.0MB

  • memory/3580-55-0x0000000004880000-0x0000000004A8C000-memory.dmp

    Filesize

    2.0MB

  • memory/3580-146-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/3580-168-0x0000000004880000-0x0000000004A8C000-memory.dmp

    Filesize

    2.0MB