Analysis
-
max time kernel
60s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe
Resource
win10v2004-20241007-en
General
-
Target
7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe
-
Size
3.2MB
-
MD5
aee6538b49f6df458d082a04208d46c4
-
SHA1
a98bdbc68cf2e9e2baaea4f69298b48f89bf7ab2
-
SHA256
7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648
-
SHA512
a9860d21abd2bb7289cc7af0b0b577fa19eeb41016dcf26d855d7475e78d1e8fc315a96d03f1bb69261a7ee20ecf76721ee0a474948a5aa5556c44e6b6399c79
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVPYOKQrgCGMxu3fFne4j4ZO:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrt
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe -
Renames multiple (195) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\sa.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\th.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\VISFILT.DLL.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\pl.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\cs.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\id.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\mng.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\sw.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\readme.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\be.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\sv.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\tg.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\nn.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\an.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ky.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\msgfilt.dll.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\de.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\sl.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\odffilt.dll.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\fur.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\uz-cyrl.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\eu.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\sq.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ar.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\tt.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\uk.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\AssertUninstall.pptx.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ba.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ka.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\nl.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\descript.ion.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\History.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ug.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\hr.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ga.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\pt.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\7z.dll.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\7z.exe.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\el.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ext.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ku.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ja.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\License.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\ca.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe File created C:\Program Files\7-Zip\Lang\gl.txt.tmp 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "%CommonProgramFiles(x86)%\\Microsoft Shared\\DAO\\dao360.dll" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Apartment" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "DAO.User.36" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "DAO.User.36" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Assembly = "dao, Version=10.0.4504.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Class = "dao.UserClass" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\RuntimeVersion = "v1.0.3705" 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2700 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe Token: SeIncBasePriorityPrivilege 2700 7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe"C:\Users\Admin\AppData\Local\Temp\7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD564dbdd38bbd70082dec944ed0c41a82e
SHA18ecb418032971789b445740a26e3000886a989a7
SHA256bd5b7432713d0178e7add174fac6d3b625d7d39649006fae5dd398b691a96d65
SHA512e38a5c5408991b69a39311dea0551878472a5bbe8be4d01fd13aa8bca33f355a112d263768e2c2fab8d050cccfdebd3697ae38cd3bdf6df845ec9c12b8ef54a5
-
Filesize
3.3MB
MD5dbef5e2b1df943e7f431803a1b24f03b
SHA1f61771c9b4f0f66172074c8c5637e50c583f680d
SHA256175808745e81f5533820d3cbd78d542221dc135af4e47817dbf74253cc48fc08
SHA5122859d0cf6c4c15dcdff5cf29c566a88768f300a9211374e1f7645a099a28910b65704b4c04d43e60c11add00814e6ef432b60520898f4a601c3df2ab9e3319ba