Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 14:13

General

  • Target

    ea5528aea2e54d6721ed0f33cf6a7cb5c4e55ddc6ff6401ae0ec1dfb96156195.exe

  • Size

    7.1MB

  • MD5

    57490eb9a715f68ea6f52182b3e639cf

  • SHA1

    2a24774e517008a6d6c38ec5ae6f056fe2fb058b

  • SHA256

    ea5528aea2e54d6721ed0f33cf6a7cb5c4e55ddc6ff6401ae0ec1dfb96156195

  • SHA512

    9f863c51dbb2402912952b2788ea51f78cf86b4d9befc467875542696560a401594c1fbdaa0a64d5b2df065eabc9c4838443ca6d5ac7261f069865f3626ca08c

  • SSDEEP

    196608:wqI5M3JN+tVrtF8ETq8RUzPGtPIyZRA54lzU:wqI5+JNEVrtFQ8yzPGtPIyZA4VU

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea5528aea2e54d6721ed0f33cf6a7cb5c4e55ddc6ff6401ae0ec1dfb96156195.exe
    "C:\Users\Admin\AppData\Local\Temp\ea5528aea2e54d6721ed0f33cf6a7cb5c4e55ddc6ff6401ae0ec1dfb96156195.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2660-1-0x0000000003D20000-0x0000000003F11000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-7-0x0000000003D20000-0x0000000003F11000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-8-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-13-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-14-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-16-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-18-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-21-0x0000000003CE0000-0x0000000003D00000-memory.dmp

    Filesize

    128KB

  • memory/2660-19-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-20-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-22-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-25-0x0000000003D20000-0x0000000003F11000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-24-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-27-0x0000000003D20000-0x0000000003F11000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-28-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB

  • memory/2660-30-0x0000000000400000-0x0000000001773000-memory.dmp

    Filesize

    19.4MB