Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 07:07
Static task
static1
Behavioral task
behavioral1
Sample
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
Resource
win10v2004-20241007-en
General
-
Target
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
-
Size
2.8MB
-
MD5
bee59f0c7a37f46356664b993b29c700
-
SHA1
eb702c3a42915c691652f115683a5fb2ff3981b9
-
SHA256
f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3
-
SHA512
6df706ddccea6c35e7b91c57e632dc84cd91cceb8efde2baa7813576305088026459209ebcf0a5c999b731ccf9a14ec520e6a425c43d5e75ab60eb6ba0391174
-
SSDEEP
49152:RVvn8Q5CHCtE4jPTTm4uBLq9gtMyMpy7nEvVzY+UOlk0l:RF8QUitE4iLqaPWGnEv3l
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe -
Renames multiple (602) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\System\Ole DB\oledb32r.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\mscorrc.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\Lang\is.txt.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\TipRes.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.Immutable.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Formats.Asn1.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.FileSystem.AccessControl.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\LICENSE.txt.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\it-IT\wab32res.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Globalization.Calendars.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrdeulm.dat.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Cryptography.Cng.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\Lang\es.txt.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tipresx.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\mshwLatin.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\en-US\wab32res.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.NetworkInformation.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\7zFM.exe.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Intrinsics.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\TipRes.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hr-hr.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cpprestsdk.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tabskb.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\uk-UA\TabTip.exe.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\msadc\msdfmap.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-tw.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msaddsr.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Buffers.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Web.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\Lang\af.txt.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\TipTsf.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-string-l1-1-0.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InkObj.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-console-l1-1-0.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Principal.Windows.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\7z.sfx.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-private-l1-1-0.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\ado\adovbs.inc.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\7-Zip\Lang\nb.txt.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOInstallerUI.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml.tmp f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "Msxml2.SAXXMLReader" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\TypeLib f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version\ = "3.0" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "SAX XML Reader" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msxml3.dll" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InProcServer32\ThreadingModel = "Both" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InProcServer32 f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\TypeLib\ = "{F5078F18-C551-11D3-89B9-0000F81FE221}" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Version f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\VersionIndependentProgID\ = "Msxml2.SAXXMLReader" f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1368 f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe Token: SeIncBasePriorityPrivilege 1368 f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe"C:\Users\Admin\AppData\Local\Temp\f9b433ba318ab698060d5fd501954b03413e148ec24b046ea78de3a22774d6f3N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5b1261ba1d2e62838d10a866a4c66fa10
SHA1a1c064d053d103cc56477c081f9e806bf77eb0bf
SHA256da77ff5b44bd851696da9292636308b7a0a2ce71d1b72dc51579a8d57d13b39f
SHA512348aefdf46461883d1e5085b9f87ca3ec72675da392de2478b3737f9367b110a77eb6f1375ce547161a5f36f9f6a888dbac6310fc4488748525e1d23d64ada23
-
Filesize
3.0MB
MD595515c3015a8ee7634c5511d809592ae
SHA1197c85c2360879e533bae130c80322b10985740d
SHA25624ef758777dee03b44b3f73c66d4db9785d0dbebafc59f24c1673896c78cf77f
SHA51277668639b67575f848659627253bee4d102340448e18e5d3780bf25567e539416bb395866e464f45951fe2c4a948311dbccd0eae44794b9c161337bf039f9d8f