Resubmissions

02-01-2025 22:09

250102-124ajs1jdk 10

02-01-2025 19:03

250102-xqek9s1qd1 10

Analysis

  • max time kernel
    53s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 22:09

General

  • Target

    b66429cf4aef8350c484fdab30a29a0a800ec9e32812725e0fcb26790edcbf06.exe

  • Size

    15.7MB

  • MD5

    21d88dc3265c802a0c214a5946bdd88a

  • SHA1

    3a304f2e5c5d86092d92a438d2ad2179a6dee349

  • SHA256

    b66429cf4aef8350c484fdab30a29a0a800ec9e32812725e0fcb26790edcbf06

  • SHA512

    56a0dedf2620c1c9f093f33de3db828c08f1caf5ec373ce4cf48af0a6e5dde5f76e1093c767a983e2c5ea0322979953b465fba1f6aeb6be1559f1c0e1d2761a3

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEuF8QUitE4i1:RFQWEPnPBnEXPEtFQWEPnPBnEXPE8Q

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b66429cf4aef8350c484fdab30a29a0a800ec9e32812725e0fcb26790edcbf06.exe
    "C:\Users\Admin\AppData\Local\Temp\b66429cf4aef8350c484fdab30a29a0a800ec9e32812725e0fcb26790edcbf06.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

    Filesize

    15.8MB

    MD5

    39d167c9237e627f504f55791ae463e4

    SHA1

    be3036b46f9cd7b067d18dd83f9960b7e03d24fb

    SHA256

    80d642e6dea48714cf1898ec2b6923fe558724faeea4e0d161a70468ff9360dd

    SHA512

    672d4e13a47443f3237697319850f5de908120ce6f81d90c03653555b370c6b23b01ab16239bb5b0f6a9db6da48cfcc651aed9c28ad4aa145a008855818f8c12

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    15.8MB

    MD5

    b0ddfacdcdbc87869e29b7a8270f27d2

    SHA1

    562c0055b27a12df69b9e805653d102b3d82ac9d

    SHA256

    6b0c41d137460aa4b6ad307dd2ae8ee3a88f4b6165cadd85a81b6c867823cf79

    SHA512

    237f135060c23566c1e57ef2b9e59cbb8cb89705a3ebbafcabcb731e0383c3d2cba68c03675c11c2d5eef2eace2aebd801b96d31ee89001335bd892b9e81623e

  • memory/2380-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2380-8-0x0000000003020000-0x000000000322C000-memory.dmp

    Filesize

    2.0MB

  • memory/2380-1-0x0000000003020000-0x000000000322C000-memory.dmp

    Filesize

    2.0MB

  • memory/2380-11-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2380-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2380-13-0x0000000003020000-0x000000000322C000-memory.dmp

    Filesize

    2.0MB

  • memory/2380-17-0x0000000003020000-0x000000000322C000-memory.dmp

    Filesize

    2.0MB

  • memory/2380-18-0x0000000003020000-0x000000000322C000-memory.dmp

    Filesize

    2.0MB

  • memory/2380-23-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/2380-25-0x0000000003020000-0x000000000322C000-memory.dmp

    Filesize

    2.0MB