Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:29
Static task
static1
Behavioral task
behavioral1
Sample
2a0b9861da892ac55eef2a5907a435d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a0b9861da892ac55eef2a5907a435d4.exe
Resource
win10v2004-20231215-en
General
-
Target
2a0b9861da892ac55eef2a5907a435d4.exe
-
Size
4.7MB
-
MD5
2a0b9861da892ac55eef2a5907a435d4
-
SHA1
838a12c7a91f522b8218cf8f07727aeb59e03227
-
SHA256
38024494351a1c9cd5e37b82a6c8b05b1d3872b9bfd827f190e3fc80f033e845
-
SHA512
be36cc0fe5920a3620adc6c43fd2327d9910380d92c92b8f923dbb85cb21d8663ac307ccf7678698e296e46b5253c11c1b8bf05baee6bc4061a8a246b239647c
-
SSDEEP
98304:BiJejSaboQp9FUYu4wunyev6cYu5NsbTkQF0OP7LY50HTii0JqcH:BicjjoN8Hy2qu5q8Q3Dzii0J
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a0b9861da892ac55eef2a5907a435d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2a0b9861da892ac55eef2a5907a435d4.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{78C71FEC-9C1E-4F23-DFDA-9D0FA541BD42} 2a0b9861da892ac55eef2a5907a435d4.exe