Malware Analysis Report

2025-01-22 23:08

Sample ID 241227-yd5scsymfj
Target 7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925
SHA256 7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925
Tags
banload discovery downloader dropper evasion trojan ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925

Threat Level: Known bad

The file 7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925 was found to be: Known bad.

Malicious Activity Summary

banload discovery downloader dropper evasion trojan ransomware

Banload family

Banload

Renames multiple (220) files with added filename extension

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Checks BIOS information in registry

Drops file in Program Files directory

System Location Discovery: System Language Discovery

Unsigned PE

Modifies registry class

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-27 19:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-27 19:41

Reported

2024-12-27 19:42

Platform

win7-20241010-en

Max time kernel

60s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe"

Signatures

Banload

trojan dropper downloader banload

Banload family

banload

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "OutlookAttachMoniker" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLRPC.DLL" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe

"C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe"

Network

N/A

Files

memory/2384-0-0x0000000000400000-0x0000000000616000-memory.dmp

memory/2384-1-0x0000000003180000-0x000000000338C000-memory.dmp

memory/2384-8-0x0000000003180000-0x000000000338C000-memory.dmp

memory/2384-11-0x0000000000400000-0x0000000000616000-memory.dmp

memory/2384-12-0x0000000000400000-0x0000000000616000-memory.dmp

memory/2384-13-0x0000000003180000-0x000000000338C000-memory.dmp

C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

MD5 1dcd73f5dbeedb19b737b22bedf61bf9
SHA1 38a8f49f3b7978980b8bf7b36de65f2e0d86d810
SHA256 61187afb26b85f8e59692c86d2032a5f36f272e9986b401c0a17ba160e59bbbc
SHA512 41ac5a4c4ab0ad435c2c045fbfb4ada4550038a2f935bc0138a3031581c132b4cff576a4b43198c2e8e11ab19fc9224374df6ac0cbef0f3d54573916d2c2c1e8

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

MD5 6c0a27e7639eff75a7e3532ef9787cc2
SHA1 cccb3d219a1522d59c3b4bec6b882d26350f2192
SHA256 a7f83305043b41ceb1c958018c41bab151c6b2ce7ee3e37276101e0366f40af3
SHA512 3637f24d274a0b5ed09ce8e5f0f808126504ef18848432f641940a30cabbfb834487cb0f6969ef0bcdceef16faa290406a2c6c2b1d9c812ddc05d34fba0d6ff6

memory/2384-23-0x0000000003180000-0x000000000338C000-memory.dmp

memory/2384-29-0x0000000000400000-0x0000000000616000-memory.dmp

memory/2384-31-0x0000000003180000-0x000000000338C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-27 19:41

Reported

2024-12-27 19:42

Platform

win10v2004-20241007-en

Max time kernel

60s

Max time network

34s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe"

Signatures

Banload

trojan dropper downloader banload

Banload family

banload

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Renames multiple (220) files with added filename extension

ransomware

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\is.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVPolicy.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\dicjp.bin.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\ne.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\hr.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVCatalog.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\ca.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\rtscom.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\RepoMan.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\rtscom.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\hwresplm.dat.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\hwrespsh.dat.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\el.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\readme.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.id-id.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\StreamServer.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\hwritalm.dat.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\ku.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\tt.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-runtime-l1-1-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\ta.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\7zG.exe.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\ar.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\da.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\InkObj.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\fur.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\fy.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.bg-bg.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\hwrenUSlm.dat.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\ba.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-process-l1-1-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\hwrfralm.dat.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
File created C:\Program Files\7-Zip\Lang\bn.txt.tmp C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\RuntimeVersion = "v2.0.50727" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0\Class = "Microsoft.Office.Interop.Word.FontClass" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32 C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\LocalServer32\ = "\"C:\\Program Files\\Microsoft Office\\Root\\Office16\\WINWORD.EXE\" /automation" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "FontClass" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Assembly = "Microsoft.Office.Interop.Word, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Class = "Microsoft.Office.Interop.Word.FontClass" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0 C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0\Assembly = "Microsoft.Office.Interop.Word, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0\RuntimeVersion = "v2.0.50727" C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe

"C:\Users\Admin\AppData\Local\Temp\7ca90f5cbbf80467e139724166c97137e23e8a90b95db8ad217d042cecf0e925.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp

Files

memory/4980-0-0x0000000000400000-0x0000000000616000-memory.dmp

memory/4980-2-0x0000000004860000-0x0000000004A6C000-memory.dmp

memory/4980-9-0x0000000004860000-0x0000000004A6C000-memory.dmp

memory/4980-12-0x0000000000400000-0x0000000000616000-memory.dmp

memory/4980-13-0x0000000000400000-0x0000000000616000-memory.dmp

memory/4980-14-0x0000000004860000-0x0000000004A6C000-memory.dmp

C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

MD5 392766b3f103b8b716e80d529dad3a0f
SHA1 fecb1557b2b214567bd2936475e960dc76d77d9f
SHA256 1ed63b77002eb4036ee13c000c4fb987bce089a97305d46d58c71b955a594117
SHA512 cd1769cb28c905f5f52647c7d407f7c89a14079ca1a0260d9b65e0c5a28184a23dd8c9cded7301e98e6605581366f984136c69530586eb24dc9691abee97cce9

C:\Program Files\7-Zip\7-zip.dll.tmp

MD5 7cf5257a220445bc7e9891b8224af6a2
SHA1 fd0ac5b01f06d32f9f33ce94751cf3c2f4249732
SHA256 4fb6320fbcbcda1bc3ddee3f851bfc87c597bc87a75dad3262541b07d82165e1
SHA512 edf3104e48ee05190f66535f32b21bb15477e3299bcfb9f8d7fc6fe5b4cef2ed395642b8e03dcd3ce3e6c54ed031355b003391e2c63feac5b1b75ca11a1f2d78

memory/4980-42-0x0000000004860000-0x0000000004A6C000-memory.dmp

memory/4980-43-0x0000000004860000-0x0000000004A6C000-memory.dmp

memory/4980-116-0x0000000000400000-0x0000000000616000-memory.dmp

memory/4980-132-0x0000000004860000-0x0000000004A6C000-memory.dmp