Analysis
-
max time kernel
59s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
Resource
win10v2004-20241007-en
General
-
Target
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
-
Size
6.9MB
-
MD5
cdd29877b9558072f98482fa8b4debb9
-
SHA1
2bc64d0bfcff2573210440b8959774b32f2fdd09
-
SHA256
0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0
-
SHA512
297a90929cf740f54ef8446ffa7b84d22310c0f60e80c4053677805038fe7411c8d74dc93b76a02be8f0667e8a24ddf3adfbafec190a7329222e7f43bcdf03ae
-
SSDEEP
196608:RFQWEPnPBnEmOKIbGFFQWEPnPBnEmOKIbGt:PEPnPBnbOejEPnPBnbOet
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe -
Renames multiple (205) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\ms.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\th.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\va.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\7-zip32.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\7zG.exe.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\ro.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\tr.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.it-it.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\fr.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\lv.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\ta.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\descript.ion.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\ru.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.kk-kz.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\nn.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\sl.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\ga.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\he.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sl-si.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Uninstall.exe.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ko-kr.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\de.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\ext.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVCatalog.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.bg-bg.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msix.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\License.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-conio-l1-1-0.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\7z.exe.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\7zFM.exe.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\pl.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\7-Zip\Lang\pt.txt.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.tr-tr.dll.tmp 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "PBDA DTFilter" 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\Windows\\SysWOW64\\CPFilters.dll" 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4688 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe Token: SeIncBasePriorityPrivilege 4688 0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe"C:\Users\Admin\AppData\Local\Temp\0c8e206afac9f49721dcf36c596087a37462ee5be33de925ee8377f7fc5d6fe0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.1MB
MD5873285c87fe8d382b431ac3a86f5276b
SHA19d7df6333c938c76496a7cbb69fc0a69322ab67c
SHA256e568aa53cdc62917da3800c7d8c607426458a19da601b41696bc93023a360ca9
SHA5125aca9ccfc3bc2b420614852fc58da5f952868cae9d61e7bec07ceecbaaa67c65cd737ca43ef58b3020984f91e9dba09328e526317c2804f068ce1a0565e837bd
-
Filesize
7.2MB
MD5f48f2c7df95c7230c189f1894ec15fa2
SHA17612c8b065b45d5e51c936dca56149d78bcefc34
SHA2564d15b3c0a1a157b3a03878346451ea7e49dc56909d0391ef6f832965b2b00d9e
SHA5127124d3e6225994d6d65acf34d2d6acb801cfce13ff4f568d6bf7b89f51aa58d296b0f97f2b312d4319a5b9d55e245186f27b9751e946ce67d891e6bf7352a7ee