Analysis

  • max time kernel
    59s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 19:47

General

  • Target

    0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe

  • Size

    6.9MB

  • MD5

    cdd29877b9558072f98482fa8b4debb9

  • SHA1

    2bc64d0bfcff2573210440b8959774b32f2fdd09

  • SHA256

    0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0

  • SHA512

    297a90929cf740f54ef8446ffa7b84d22310c0f60e80c4053677805038fe7411c8d74dc93b76a02be8f0667e8a24ddf3adfbafec190a7329222e7f43bcdf03ae

  • SSDEEP

    196608:RFQWEPnPBnEmOKIbGFFQWEPnPBnEmOKIbGt:PEPnPBnbOejEPnPBnbOet

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (205) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
    "C:\Users\Admin\AppData\Local\Temp\0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

    Filesize

    7.1MB

    MD5

    873285c87fe8d382b431ac3a86f5276b

    SHA1

    9d7df6333c938c76496a7cbb69fc0a69322ab67c

    SHA256

    e568aa53cdc62917da3800c7d8c607426458a19da601b41696bc93023a360ca9

    SHA512

    5aca9ccfc3bc2b420614852fc58da5f952868cae9d61e7bec07ceecbaaa67c65cd737ca43ef58b3020984f91e9dba09328e526317c2804f068ce1a0565e837bd

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    7.2MB

    MD5

    f48f2c7df95c7230c189f1894ec15fa2

    SHA1

    7612c8b065b45d5e51c936dca56149d78bcefc34

    SHA256

    4d15b3c0a1a157b3a03878346451ea7e49dc56909d0391ef6f832965b2b00d9e

    SHA512

    7124d3e6225994d6d65acf34d2d6acb801cfce13ff4f568d6bf7b89f51aa58d296b0f97f2b312d4319a5b9d55e245186f27b9751e946ce67d891e6bf7352a7ee

  • memory/4688-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4688-2-0x00000000043A0000-0x00000000045AC000-memory.dmp

    Filesize

    2.0MB

  • memory/4688-9-0x00000000043A0000-0x00000000045AC000-memory.dmp

    Filesize

    2.0MB

  • memory/4688-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4688-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4688-14-0x00000000043A0000-0x00000000045AC000-memory.dmp

    Filesize

    2.0MB

  • memory/4688-32-0x00000000043A0000-0x00000000045AC000-memory.dmp

    Filesize

    2.0MB

  • memory/4688-33-0x00000000043A0000-0x00000000045AC000-memory.dmp

    Filesize

    2.0MB

  • memory/4688-72-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4688-82-0x00000000043A0000-0x00000000045AC000-memory.dmp

    Filesize

    2.0MB