Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe
Resource
win10v2004-20240226-en
General
-
Target
6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe
-
Size
7.2MB
-
MD5
1f07c6382f947a70c8f87480ebf10a82
-
SHA1
17900fdec9d5c3ca3011234bb99902b0774321fd
-
SHA256
6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50
-
SHA512
5620c2d221de0ac6de0a69efe60247d0cf4d90228306a7b5202d1e95d1caadc4ecb97f75a2617f5c896ecdb9f43e22a103d36c1718714e74fd7253f601119d5d
-
SSDEEP
196608:JVV69WJGjbavkSEXjF/f4E/7KgfBaQh7dF/d:JVV68JU+x+FH+gZaq5X
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\ProgID 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\ProgID\ = "MSPowerPointSho" 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39} 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\AutoConvertTo 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\AutoConvertTo\ = "{64818D11-4F9B-11CF-86EA-00AA00B929E8}" 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\NotInsertable 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\Ole1Class 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\Ole1Class\ = "MSPowerPointSho" 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1548 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe Token: SeIncBasePriorityPrivilege 1548 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1548 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe 1548 6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe"C:\Users\Admin\AppData\Local\Temp\6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1548