Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 21:56

General

  • Target

    39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe

  • Size

    3.3MB

  • MD5

    04c990dd821659ae674224822402f3f5

  • SHA1

    1ac8c862e30cfacce344e00ef21ee6c4517c215f

  • SHA256

    39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64

  • SHA512

    c3002405e1c360e4b7e11d31cdffe8a8bdfffe0f53a8ab431ee669aa509e1b210414c1d36ab4277959fdcbd27479cb59e980cb11547ea7684ae5fe4d267a24f0

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvZuV:RF8QUitE4iLqaPWGnEvcUkUt0

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (712) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe
    "C:\Users\Admin\AppData\Local\Temp\39bf73b1594faf0026dc6ef1db21d0c5270a796c8e9c4064f4d0b5576dddec64.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    3.4MB

    MD5

    14811b17edb277911824654fb5d490ea

    SHA1

    a6b0db0745158ee8f1c5a54c5f8d4be29c9e82cd

    SHA256

    eaf8c5cb9a1bd8677648e523ebd50361920e05762c429033fab774d03625307d

    SHA512

    27eceb3ba43aba72edaf6dc6f9c92e6b9a120a1cb56227fc9f68c2a7c351acce55594fd6d9fd2f15ba13b716097ab465f2acc2d91aefb73c03613fd9eb40672a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    3.5MB

    MD5

    ee457b7d465bb8b2e262c2c47267504d

    SHA1

    49f8342a6991fd69a58eb1151284f49eb4e6c096

    SHA256

    9c51dc9863788168ca29d48def554d5760fb91c5378e40410fb3db2693c52463

    SHA512

    4fa8f576bf92f9206fe3e7a96aea7a7a58ac4e854f1f1b5b8376fbaa0f9333a06c6ea668d314c49740ae95acea2970636f4fd67ba76fce8de17bc6aef5527e73

  • memory/4404-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4404-2-0x0000000004830000-0x0000000004A3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4404-9-0x0000000004830000-0x0000000004A3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4404-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4404-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4404-14-0x0000000004830000-0x0000000004A3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4404-44-0x0000000004830000-0x0000000004A3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4404-45-0x0000000004830000-0x0000000004A3C000-memory.dmp

    Filesize

    2.0MB

  • memory/4404-126-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/4404-144-0x0000000004830000-0x0000000004A3C000-memory.dmp

    Filesize

    2.0MB