Analysis

  • max time kernel
    60s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 19:44

General

  • Target

    7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe

  • Size

    3.2MB

  • MD5

    aee6538b49f6df458d082a04208d46c4

  • SHA1

    a98bdbc68cf2e9e2baaea4f69298b48f89bf7ab2

  • SHA256

    7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648

  • SHA512

    a9860d21abd2bb7289cc7af0b0b577fa19eeb41016dcf26d855d7475e78d1e8fc315a96d03f1bb69261a7ee20ecf76721ee0a474948a5aa5556c44e6b6399c79

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVPYOKQrgCGMxu3fFne4j4ZO:RF8QUitE4iLqaPWGnEv+OKQr8MAvFrt

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe
    "C:\Users\Admin\AppData\Local\Temp\7afad58b919f5fa0b7c937744b09f3013d30c8dd538f35d07e83ff62574cf648.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp

    Filesize

    3.3MB

    MD5

    798946f88be2d7f0434c539a52b2bc9e

    SHA1

    47d01e5dcb5ac6ffa341d965b07d923cb96c65c4

    SHA256

    0565f5794da70243716a7ab3fee53d63f4d08159d56da845d482018f37b55629

    SHA512

    7a52944e1ae9727611949f896eebb3f9b09cd60cd942166c5077022930b3d8fc2bc855e5e05e7f0683b3cf6ff22743b20749eaa6fabe8eaf5430e5770539e89f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    3.4MB

    MD5

    ef3f826a5c3b4877495cdd9ce8687f7f

    SHA1

    d0c221fb1ac8e9087aa94331fdfd37ff57be721b

    SHA256

    9f8904d76d38cb9f064824f79464ee0bbd3d9917bdcaedd1ee8e703cfdd27c45

    SHA512

    380b483ea98efd57711c558c12db98400f735a3c2fb6e1f5f2e62e846e36f54e082a0ac648b0799dd305ade32e59f4f3458f9eaf8ac3fcc5edd38c2da85b5068

  • memory/4876-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4876-2-0x00000000047B0000-0x00000000049BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4876-9-0x00000000047B0000-0x00000000049BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4876-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4876-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4876-14-0x00000000047B0000-0x00000000049BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4876-46-0x00000000047B0000-0x00000000049BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4876-47-0x00000000047B0000-0x00000000049BC000-memory.dmp

    Filesize

    2.0MB

  • memory/4876-132-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4876-146-0x00000000047B0000-0x00000000049BC000-memory.dmp

    Filesize

    2.0MB