Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 13:31

General

  • Target

    6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe

  • Size

    7.2MB

  • MD5

    1f07c6382f947a70c8f87480ebf10a82

  • SHA1

    17900fdec9d5c3ca3011234bb99902b0774321fd

  • SHA256

    6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50

  • SHA512

    5620c2d221de0ac6de0a69efe60247d0cf4d90228306a7b5202d1e95d1caadc4ecb97f75a2617f5c896ecdb9f43e22a103d36c1718714e74fd7253f601119d5d

  • SSDEEP

    196608:JVV69WJGjbavkSEXjF/f4E/7KgfBaQh7dF/d:JVV68JU+x+FH+gZaq5X

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe
    "C:\Users\Admin\AppData\Local\Temp\6d52424ffe9949314bc287200d4239c1adf5a11b548867a9a878da006d5e0f50.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1548-0-0x0000000003890000-0x0000000003A81000-memory.dmp

    Filesize

    1.9MB

  • memory/1548-2-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-7-0x0000000003890000-0x0000000003A81000-memory.dmp

    Filesize

    1.9MB

  • memory/1548-12-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-13-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-15-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-17-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-18-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-19-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-20-0x0000000001BA0000-0x0000000001BC0000-memory.dmp

    Filesize

    128KB

  • memory/1548-21-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-23-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB

  • memory/1548-24-0x0000000003890000-0x0000000003A81000-memory.dmp

    Filesize

    1.9MB

  • memory/1548-26-0x0000000001B70000-0x0000000001B71000-memory.dmp

    Filesize

    4KB

  • memory/1548-27-0x0000000003890000-0x0000000003A81000-memory.dmp

    Filesize

    1.9MB

  • memory/1548-28-0x0000000000400000-0x0000000001791000-memory.dmp

    Filesize

    19.6MB