Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 14:38
Static task
static1
Behavioral task
behavioral1
Sample
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
Resource
win10v2004-20241007-en
General
-
Target
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
-
Size
3.1MB
-
MD5
428e0d6ee146e85a0b84c02390932cf0
-
SHA1
ce4b98957be9996c0f39dcf9ee576dce4d763d6a
-
SHA256
01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79
-
SHA512
6a01d8d61e8e27f7ff611cbcfdc7971a01cab383c8a88ac3b0dbdff3ff4fb1210ca9b41c9a67c9cf83eb8c7680c66199e23c30cc7e626fc3cbec546150851431
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVCUkULRvp:RF8QUitE4iLqaPWGnEvcUkUtx
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Renames multiple (534) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\offreg.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOInstallerUI.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\ext.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.kk-kz.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-rtlsupport-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\ado\de-DE\msader15.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\uk-UA\wab32res.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-interlocked-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-environment-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.Win32.Registry.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Writer.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\7-zip32.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\TabTip.exe.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\it-IT\TipTsf.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig.companion.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\hostfxr.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Handles.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\en-US\wab32res.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\WindowsBase.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tipresx.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\sqloledb.rll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-datetime-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\nn.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.Contracts.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\desktop.ini.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\clretwrc.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InkObj.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwresplm.dat.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscordaccore.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.FileVersionInfo.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\ado\it-IT\msader15.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\msadc\msdaprsr.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-convert-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\7-Zip\Lang\cs.txt.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-runtime-l1-1-0.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Globalization.Extensions.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Cryptography.Primitives.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\ado\msado26.tlb.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\hostpolicy.dll.tmp 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "PSDispatch" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\Windows\\SysWOW64\\oleaut32.dll" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1648 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe Token: SeIncBasePriorityPrivilege 1648 01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe"C:\Users\Admin\AppData\Local\Temp\01e2b85bb4bdb685155af06dcbe13f168aab9668d449cbdc1c1de8c40098cf79N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD549751b4a36698f1d4a741e4ad677993b
SHA1a5e1e494dc7d20fec623be59e85b63da7521fcf7
SHA256c81bed34e18ade02951e953f8121ddfb219529591a2785bf297712ac36235460
SHA5120e5b7ef764d8213631ac6e3a5d47cdb84cafe85913d3c7ee88cc6861722166fe2f920a7f2541ad663e72eb1d13175c78a92389ba6506c5605c2a071acada1eec
-
Filesize
3.3MB
MD5a339971b8b54c3949fc4d9c93ea4759a
SHA14c13848134e8bf15d78640e55d19a34a391d00b8
SHA2564bfb72f9cb37eb2a019f823270c640b047816bb4debf0392a3c8f6ccc60ce5d6
SHA512c830a80bc7fe0955ad1d28bea087b141ecb364ab47d46f6e8bb2a5c3d64b5083bdec9f94fc302b151dcf7fe4e0663b005db39c33abe78240c1fdc70c291f62b3