Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 14:38

General

  • Target

    01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe

  • Size

    3.1MB

  • MD5

    428e0d6ee146e85a0b84c02390932cf0

  • SHA1

    ce4b98957be9996c0f39dcf9ee576dce4d763d6a

  • SHA256

    01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79

  • SHA512

    6a01d8d61e8e27f7ff611cbcfdc7971a01cab383c8a88ac3b0dbdff3ff4fb1210ca9b41c9a67c9cf83eb8c7680c66199e23c30cc7e626fc3cbec546150851431

  • SSDEEP

    49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvp:RF8QUitE4iLqaPWGnEvcUkUtx

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Renames multiple (534) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
    "C:\Users\Admin\AppData\Local\Temp\01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    3.2MB

    MD5

    49751b4a36698f1d4a741e4ad677993b

    SHA1

    a5e1e494dc7d20fec623be59e85b63da7521fcf7

    SHA256

    c81bed34e18ade02951e953f8121ddfb219529591a2785bf297712ac36235460

    SHA512

    0e5b7ef764d8213631ac6e3a5d47cdb84cafe85913d3c7ee88cc6861722166fe2f920a7f2541ad663e72eb1d13175c78a92389ba6506c5605c2a071acada1eec

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    3.3MB

    MD5

    a339971b8b54c3949fc4d9c93ea4759a

    SHA1

    4c13848134e8bf15d78640e55d19a34a391d00b8

    SHA256

    4bfb72f9cb37eb2a019f823270c640b047816bb4debf0392a3c8f6ccc60ce5d6

    SHA512

    c830a80bc7fe0955ad1d28bea087b141ecb364ab47d46f6e8bb2a5c3d64b5083bdec9f94fc302b151dcf7fe4e0663b005db39c33abe78240c1fdc70c291f62b3

  • memory/1648-0-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1648-3-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-9-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-12-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1648-13-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1648-14-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-44-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-45-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-122-0x0000000000400000-0x0000000000616000-memory.dmp

    Filesize

    2.1MB

  • memory/1648-138-0x0000000004A30000-0x0000000004C3C000-memory.dmp

    Filesize

    2.0MB