Analysis
-
max time kernel
60s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe
Resource
win10v2004-20241007-en
General
-
Target
7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe
-
Size
3.8MB
-
MD5
0b4ddc7001a82f402b7f8077b2bbfa2e
-
SHA1
c34fbd79bda7787e6b490bb025eb12f08730a897
-
SHA256
7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512
-
SHA512
dd8c69f345e31b68ace8ad6b3ce89748dd2e1549e45ab5f0478d44b43df22c61e41d7eb2021670c1a8d9ea8a90d1d40d08ba521c32c749604bb8adceebcce54e
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOkp:RFQWEPnPBnEXQ
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe -
Renames multiple (187) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ps.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\tt.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ug.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\fi.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\fr.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\yo.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\id.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\lv.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\nl.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\pt.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\eu.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\sk.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ku.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\th.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\7z.exe.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\el.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ast.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\hu.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ta.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\af.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ar.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ja.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ka.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\mng.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\nb.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\7-zip32.dll.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\mk.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\tg.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ru.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\fy.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\he.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\7z.dll.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\az.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\an.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ca.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ko.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\sv.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\History.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\sw.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\vi.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\ms.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\sl.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.tmp 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "DAO.Index.36" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "%CommonProgramFiles(x86)%\\Microsoft Shared\\DAO\\dao360.dll" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Class = "dao.IndexClass" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\RuntimeVersion = "v1.0.3705" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "DAO.Index.36" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Assembly = "dao, Version=10.0.4504.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Apartment" 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2308 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe Token: SeIncBasePriorityPrivilege 2308 7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe"C:\Users\Admin\AppData\Local\Temp\7a864df50615c0db2bf24cc59f14fe1c4702d930af6e5db496ef5c5263d5f512.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD50522d72ec2be1aaa14fb44bc916901b8
SHA1f59a94206d98ca19545f1098415d77b3cc43fc67
SHA2568d8e6bf970ed8f43b3fad8e40d44405a10026c8e52ed897d13c628c203f11eea
SHA51219477b4b0d6426c681ae58b9972eb0dc2111519b13239d43aa4597a4ebcc999198c3dde8e93bc024e33d42fae302a890934ea606563a40fb774d541b0a5590de
-
Filesize
4.0MB
MD52cbb1ed8693fc5b5e24f04d2736a64f5
SHA13f48e6e0833265bd53e833d7220147c40eb26a21
SHA2567ec23c8055e598213e75427bb9149210d99453b32fd260d16eca07e4622e25ca
SHA512636ca849a8bd1fe057985d01e2a23251bfe68234e14efd13d1b4311967c3d9aba9517887615f0ad5d5e26e6b282ec3d71c9fe793f54eb2e8fe805d3e82343b81