Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 10:58
Static task
static1
Behavioral task
behavioral1
Sample
8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe
Resource
win10v2004-20231025-en
General
-
Target
8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe
-
Size
2.2MB
-
MD5
64a8ab996f581254fa277a4d2d9d3026
-
SHA1
f1b1d91ed42fe6a69e938c748343a95936a72b62
-
SHA256
8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34
-
SHA512
5c9975a4b46360c97d34d7c6150215fd55342319b2f2d3fdf658c4ef185854259cde4ad98eea7f855a4cf19dbb7487367e6eabc21a92ab651c4611e51c98ffb0
-
SSDEEP
49152:+pbRm4GPK/MNeGTEuTwcD2Lv8iiNoVDn99c1/0VXwywhhmPAmZea+:e1GS/Mw7EiEuDnu0VXwmAmZeR
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\InprocServer32 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\InprocServer32\ = "%systemroot%\\system32\\ttlsext.dll" 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\InprocServer32\ThreadingModel = "Apartment" 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2} 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\ = "TTLS Interactive UI class" 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\InprocServer32 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\InprocServer32\ = "%systemroot%\\system32\\ttlsext.dll" 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7437-8789-28A2-AFD5-5B21A6CC4FB2}\InprocServer32\ThreadingModel = "Apartment" 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3532 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe Token: SeIncBasePriorityPrivilege 3532 8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe"C:\Users\Admin\AppData\Local\Temp\8587ecc9540547e6ef69bd72b8d68c7a703c0b4635c53a8910410517c8019a34.exe"1⤵
- Checks BIOS information in registry
- Registers COM server for autorun
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3532