Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 14:38
Static task
static1
Behavioral task
behavioral1
Sample
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
Resource
win10v2004-20241007-en
General
-
Target
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
-
Size
3.1MB
-
MD5
428e0d6ee146e85a0b84c02390932cf0
-
SHA1
ce4b98957be9996c0f39dcf9ee576dce4d763d6a
-
SHA256
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79
-
SHA512
6a01d8d61e8e27f7ff611cbcfdc7971a01cab383c8a88ac3b0dbdff3ff4fb1210ca9b41c9a67c9cf83eb8c7680c66199e23c30cc7e626fc3cbec546150851431
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvp:RF8QUitE4iLqaPWGnEvcUkUtx
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Renames multiple (180) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\ca.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\fy.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ja.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ms.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\nb.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\pl.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\sl.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ar.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ba.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\cs.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\id.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\mk.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ne.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\nn.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\sk.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\sq.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\tt.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ky.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\an.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\fur.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\tr.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\be.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\el.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\eu.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\lv.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\sa.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\si.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\af.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\gl.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\hu.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\uk.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\7zG.exe.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ext.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\fa.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\de.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\fr.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\kk.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\lt.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\es.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ku.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ro.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\tg.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\az.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\hr.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ka.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\sv.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\7z.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "Constructor that allows hosts better control creating scriptlets" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\Windows\\SysWOW64\\scrobj.dll" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Apartment" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "Scriptlet.Constructor" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2596 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Token: SeIncBasePriorityPrivilege 2596 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe"C:\Users\Admin\AppData\Local\Temp\01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD559782440f6974931ca413a86c2695b38
SHA14b991a55278170cfc2dde057d0a968f022fbbf33
SHA256cf09c04345061856bbc1285e5124296b2ad513172c9ef20a0223a1152acc6409
SHA5124421425f0da411e7cdbd50d9eddb48e40a4a7ffe4cb0afac1ee0d8b52a7e34b2084bec4f7ef6429461c07a70aea3a20ff5ad9aafea8a4c7af873a6b20371be45
-
Filesize
3.2MB
MD5e6c3df9337c533bfc745cf78f76d2982
SHA11b55d34accd17c27f39de660f5bb12e78036d7b9
SHA2564b4c5a15dd9186d7b475493028b23f4e03b10ec69c463449937e99fbea3d4e8c
SHA512ba9c59730243d7cba5ab43927c6372325d3887b4ca3fa4d12cccdd3d0f5cbba900d39783ec7a756ee6ab9b19552d97a57bb68d083dc7be6397fddf5e1fc67cf2