Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/12/2022, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe
Resource
win10v2004-20221111-en
General
-
Target
827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe
-
Size
3.4MB
-
MD5
fab0306db512bde42d979dcbbe160b56
-
SHA1
e5033e09dc76aa2492e1f07618a278780e4c3644
-
SHA256
827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8
-
SHA512
29b4def18e0a02d3e58101d9417c5c36a9c6f1dc856fa9156f30a2c606a2279639d4604a7d710b975b1780beed75c59566650453360c6d9e8f1cad08df6b9e71
-
SSDEEP
98304:/3bq3iN5gerF2He3tDjDxH81vBN07O7EZN1op7xL+:/3b95gerF26uNJ+
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAB9CA5E-6EBA-28EE-0384-99E75FF4A722} 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAB9CA5E-6EBA-28EE-0384-99E75FF4A722}\ = "ItemMoniker" 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAB9CA5E-6EBA-28EE-0384-99E75FF4A722}\InprocServer32 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EAB9CA5E-6EBA-28EE-0384-99E75FF4A722}\InprocServer32\ = "ole32.dll" 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1092 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe Token: SeIncBasePriorityPrivilege 1092 827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe"C:\Users\Admin\AppData\Local\Temp\827fd2a5e1da22aaac8b1825653abc12625938a26745f107f300c50158fca5c8.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1092