Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 02:10

General

  • Target

    IMG_20170109_111125_540.exe

  • Size

    6.1MB

  • MD5

    2892289af9751f47f719cb6a67051127

  • SHA1

    c891dbc7be62fb454c34287a95fa9dff3fde8253

  • SHA256

    a8ded67687cdd8dc39e93b7c26624c7d06d8f5aae9c90028fad5f7fc6437f1e3

  • SHA512

    2c62420f3c8bf4a0d3c760d802fe7e5c8b324aa66d63e6b2c922c4f4dc3f7ddd042252e5432631b9bbf9bc42ce0c07aa3bf442abdcf8af47394513de608ef4bd

  • SSDEEP

    98304:7cgTt/wKjmf6ysiHSzRmz1bOL+PnXcwMoZ/qTJSyvxEKVbv6Mz+JMfwkjbUGMcc4:7cgCYmfdPnswjSTJS2EK56dyfxoGMcf

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG_20170109_111125_540.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG_20170109_111125_540.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2844-0-0x0000000002BE0000-0x0000000002DE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2844-6-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-7-0x0000000002BE0000-0x0000000002DE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2844-11-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-10-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-12-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-13-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-16-0x0000000002BE0000-0x0000000002DE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2844-15-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-14-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-17-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/2844-18-0x0000000002BE0000-0x0000000002DE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2844-20-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-22-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/2844-26-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB

  • memory/2844-28-0x0000000002BE0000-0x0000000002DE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2844-30-0x0000000000400000-0x0000000000D64000-memory.dmp

    Filesize

    9.4MB