Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2023 10:06

General

  • Target

    4414a29b53735ce974cef0d9e1d78a98b41d7760034e1e59a531581892df884e.exe

  • Size

    2.2MB

  • MD5

    387ae75db5d4673707817975ca557ed5

  • SHA1

    1fb23863d2fec4f4668f1e73256a2fb6e948f3bd

  • SHA256

    4414a29b53735ce974cef0d9e1d78a98b41d7760034e1e59a531581892df884e

  • SHA512

    1df81a5e21c6e0af2e77727a6303a606c1d10c48d9cd24f63a164b36916759fc0a6fa16980b9a838941f8fec4d6849c1b4ae51e4690b433619f2636f24b9f47e

  • SSDEEP

    49152:m2gYP6qkytWWTEuPONL/xLiYkv68B1ECYJgkpbEB+:m2fP6DykoeLJLiYW68B+5JsE

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4414a29b53735ce974cef0d9e1d78a98b41d7760034e1e59a531581892df884e.exe
    "C:\Users\Admin\AppData\Local\Temp\4414a29b53735ce974cef0d9e1d78a98b41d7760034e1e59a531581892df884e.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2768-0-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB

  • memory/2768-2-0x0000000002940000-0x0000000002B41000-memory.dmp

    Filesize

    2.0MB

  • memory/2768-8-0x0000000002940000-0x0000000002B41000-memory.dmp

    Filesize

    2.0MB

  • memory/2768-14-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB

  • memory/2768-15-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB

  • memory/2768-13-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB

  • memory/2768-16-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB

  • memory/2768-17-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB

  • memory/2768-18-0x0000000002940000-0x0000000002B41000-memory.dmp

    Filesize

    2.0MB

  • memory/2768-20-0x0000000002940000-0x0000000002B41000-memory.dmp

    Filesize

    2.0MB

  • memory/2768-22-0x0000000000400000-0x00000000006D2000-memory.dmp

    Filesize

    2.8MB