Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 21:54

General

  • Target

    39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe

  • Size

    3.3MB

  • MD5

    04c990dd821659ae674224822402f3f5

  • SHA1

    1ac8c862e30cfacce344e00ef21ee6c4517c215f

  • SHA256

    39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64

  • SHA512

    c3002405e1c360e4b7e11d31cdffe8a8bdfffe0f53a8ab431ee669aa509e1b210414c1d36ab4277959fdcbd27479cb59e980cb11547ea7684ae5fe4d267a24f0

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvZuV:RF8QUitE4iLqaPWGnEvcUkUt0

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (226) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe
    "C:\Users\Admin\AppData\Local\Temp\39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    3.4MB

    MD5

    efe5aad2122b6edb01195567f699be7a

    SHA1

    04c806e9eea25792067ec7d342aea1842d036118

    SHA256

    d39fe2c0f8b660c99199dd6fa7e7526dcd454478f4ff9e80a2c35d7084bc220b

    SHA512

    69870bc86678aad8aea4e847d059074b3666827ea349d9a1ba3e96a7c404bb788cc30c850b42398368a66ad56f6af2ce26730194d9e2096d49d16dae7932aa27

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    3.4MB

    MD5

    b715838d638f5eb1073399ae977dc902

    SHA1

    4b24b3c110f6edd8060e7f73b1a8d4d3f1932c15

    SHA256

    56176aecd4cc965f2daba035c351c55f4f34bd61c3cfdf99c9a57bfa7e2fb2fb

    SHA512

    da5ccae4098261e46bed781c937313b9da58b9bcd66ef6e19dcc955af6ba27d5cbc8973055032e178824ffbc45a4bb0428f21ff45ef0c0c7fc41a4a769974ad8

  • memory/1416-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1416-1-0x0000000003340000-0x000000000354C000-memory.dmp

    Filesize

    2.0MB

  • memory/1416-8-0x0000000003340000-0x000000000354C000-memory.dmp

    Filesize

    2.0MB

  • memory/1416-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1416-13-0x0000000003340000-0x000000000354C000-memory.dmp

    Filesize

    2.0MB

  • memory/1416-11-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1416-25-0x0000000003340000-0x000000000354C000-memory.dmp

    Filesize

    2.0MB

  • memory/1416-41-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1416-47-0x0000000003340000-0x000000000354C000-memory.dmp

    Filesize

    2.0MB