Overview
overview
10Static
static
331AA8EC187...9B.exe
windows7-x64
731AA8EC187...9B.exe
windows10-2004-x64
74B356B88FB...64.exe
windows7-x64
74B356B88FB...64.exe
windows10-2004-x64
75F71BE645E...BE.exe
windows7-x64
105F71BE645E...BE.exe
windows10-2004-x64
10AFD4216E93...72.exe
windows7-x64
10AFD4216E93...72.exe
windows10-2004-x64
10B4362FCD75...77.exe
windows7-x64
7B4362FCD75...77.exe
windows10-2004-x64
7BA8909EEF5...56.exe
windows7-x64
7BA8909EEF5...56.exe
windows10-2004-x64
7DE7CED2745...59.exe
windows7-x64
7DE7CED2745...59.exe
windows10-2004-x64
7$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3Analysis
-
max time kernel
2s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31AA8EC187E1241A94127336996F9CB38719EB9B.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
4B356B88FB3A3DCE1F009E4E92CD4A59383E0764.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
5F71BE645E8AC995555A891087B46ED357386DBE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AFD4216E93A82FEEBAFD3A68E9308CA4B0B54372.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
B4362FCD75FD071FC8237C543C56DF5736B8E177.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
BA8909EEF5EE280AE43B935CF4AE38CCF21BDE56.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/diversion.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/diversion.dll
Resource
win10v2004-20240319-en
General
-
Target
5F71BE645E8AC995555A891087B46ED357386DBE.exe
-
Size
2.2MB
-
MD5
7c9ee8c189f40e2f9ebd2660a2d2f65d
-
SHA1
5f71be645e8ac995555a891087b46ed357386dbe
-
SHA256
8d963d220e968362d66ebae80e2849dbfb184cc57b6dbb1200c61f217f232326
-
SHA512
7b120ed02236604a162d9a4b33a9d9607bc77dd0fd22b9da8491263a14ded73da4d2240338cda844bc0958aa08658e577034962b95ef1cf841b5004d2688d345
-
SSDEEP
49152:Up+iN+FctfFTJ1fHo7OnfPd5wydwRBLH0Uz+2X:Up+d01fI7AfPSlzlX
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5F71BE645E8AC995555A891087B46ED357386DBE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5F71BE645E8AC995555A891087B46ED357386DBE.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3} 5F71BE645E8AC995555A891087B46ED357386DBE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"C:\Users\Admin\AppData\Local\Temp\5F71BE645E8AC995555A891087B46ED357386DBE.exe"2⤵PID:2504
-