Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe
Resource
win10v2004-20241007-en
General
-
Target
91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe
-
Size
2.9MB
-
MD5
75ec6462a567274bbd09a6c1bb9cd870
-
SHA1
309ac40f9f4fe6b8dfe6db1288f82ed8ada0b281
-
SHA256
91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca
-
SHA512
6b7ff62f3b1dbfccedd2a81d61ac881a1f969b12e8c863c14f861a488f046900f6cbf633c1c8c4a44a741a4cfd8c256f822a67d6d0b138c8247ada58f56a30ad
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCMu7iMm8uE:RF8QUitE4iLqaPWGnEvgM7Mn
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe -
Renames multiple (225) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkObj.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed.xrm-ms.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\msadc\msdarem.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\7-zip32.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\az.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InkWatson.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\it-IT\wab32res.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\msdaps.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\eu.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\fy.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\tipresx.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\msadc\msadcer.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresplm.dat.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\ca.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\ne.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\ro.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSFrontendENU.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\mshwLatin.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\rtscom.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\tipresx.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\msadc\adcjavas.inc.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\ShapeCollector.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\mip.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrespsh.dat.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\DVD Maker\de-DE\DVDMaker.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOLoader.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\DVD Maker\de-DE\OmdProject.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\mip.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_PreComp_MATTE_PAL.wmv.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\msdatl3.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwritalm.dat.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\micaut.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\tipresx.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\System\Ole DB\msdasqlr.dll.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrfralm.dat.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IPSEventLogMsg.dll.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\ShapeCollector.exe.mui.tmp 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID\ = "InternetExplorer.Application" 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\TypeLib 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\TypeLib\ = "{EAB22AC0-30C1-11CF-A7EB-0000C05BAE0B}" 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "Internet Explorer(Ver 1.0)" 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32\ = "\"%ProgramFiles(x86)%\\Internet Explorer\\ielowutil.exe\" -CLSID:{0002DF01-0000-0000-C000-000000000046}" 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "InternetExplorer.Application.1" 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Programmable 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2692 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe Token: SeIncBasePriorityPrivilege 2692 91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe"C:\Users\Admin\AppData\Local\Temp\91c57e78c58fe8d4600e8963a262ee1433f79cf09c751991846feeb4449629ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD53249cb235bb4e059417bd8a26238fbe2
SHA18585e019a5f0ce120ae3d829871f5107726fe07a
SHA2565ec95fb62c38dc92a4f5412b20e182c9bedaf96824aa553edf33a22f2557cd88
SHA5121689766f54772e6d05ee5928307ee626f7c4557321fe6c7eb50531217dd6b8cdf208f48439caecb6d73d0ae69566b978e804ae153e943a80852a49cbf50e1c41
-
Filesize
3.0MB
MD527555c3a92e4f6582593fd77527764aa
SHA1f00312fe6504a36a9c81b451a1983f5593fff11e
SHA256db2d9bf4d03c3336c7baea512dc8f46196bc7016778f11b034a1acdedc6a9019
SHA51270fc60fdef2963b66a6bcd351880b1cb56a2613e3be253ba7c1e84e64f887e41c31786422df6c9c47c11694ea9b29c3cee1bebd964f48ec4b407c6a7afba3bf4