Analysis Overview
SHA256
2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750
Threat Level: Known bad
The file 2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750 was found to be: Known bad.
Malicious Activity Summary
Banload
Checks BIOS information in registry
Unsigned PE
Modifies registry class
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-11-01 05:27
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2023-11-01 05:27
Reported
2023-11-01 05:30
Platform
win10v2004-20231023-en
Max time kernel
137s
Max time network
147s
Command Line
Signatures
Banload
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\InProcServer32\ThreadingModel = "Apartment" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\ProgID\ = "SSPWorkspace.1" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\TypeLib\ = "{94A67BDD-80F7-4E36-A15D-E8B08806A7AD}" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\VersionIndependentProgID\ = "SSPWorkspace" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2} | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\InProcServer32 | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\ProgID | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\TypeLib | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\VersionIndependentProgID | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\ = "SSPWorkspace Class" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\InProcServer32\ = "C:\\Windows\\SysWOW64\\tsworkspace.dll" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe
"C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 39.142.81.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.71.105.51.in-addr.arpa | udp |
Files
memory/412-0-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-2-0x0000000002A70000-0x0000000002C71000-memory.dmp
memory/412-8-0x0000000002A70000-0x0000000002C71000-memory.dmp
memory/412-13-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-14-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-15-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-16-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-17-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-18-0x0000000002A70000-0x0000000002C71000-memory.dmp
memory/412-20-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-21-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/412-22-0x0000000002A70000-0x0000000002C71000-memory.dmp
memory/412-24-0x0000000000400000-0x00000000008AA000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-11-01 05:27
Reported
2023-11-01 05:30
Platform
win7-20231023-en
Max time kernel
118s
Max time network
138s
Command Line
Signatures
Banload
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\Elevation\IconReference = "@%SystemRoot%\\system32\\fontext.dll,-10" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\InProcServer32 | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\InProcServer32\ = "%SystemRoot%\\SysWow64\\fontext.dll" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\InProcServer32\ThreadingModel = "Apartment" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2} | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\LocalizedString = "@%SystemRoot%\\system32\\fontext.dll,-200" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\AppID = "{642ef9d6-48a5-476b-919a-a507cfd02c0f}" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\Elevation | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A6DF0E1-9BDE-5C22-E830-370D178B66F2}\Elevation\Enabled = "1" | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe
"C:\Users\Admin\AppData\Local\Temp\2c995b66ea51e2be03bceb99f90649f0598ee29f9d12f72ec4511d6e8b366750.exe"
Network
Files
memory/2944-0-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/2944-1-0x0000000002640000-0x0000000002841000-memory.dmp
memory/2944-7-0x0000000002640000-0x0000000002841000-memory.dmp
memory/2944-12-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/2944-13-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/2944-14-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/2944-15-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/2944-16-0x0000000000400000-0x00000000008AA000-memory.dmp
memory/2944-17-0x0000000002640000-0x0000000002841000-memory.dmp
memory/2944-19-0x0000000002B50000-0x0000000002B51000-memory.dmp
memory/2944-21-0x0000000002640000-0x0000000002841000-memory.dmp
memory/2944-22-0x0000000000400000-0x00000000008AA000-memory.dmp