Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe
Resource
win10v2004-20241007-en
General
-
Target
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe
-
Size
3.0MB
-
MD5
4bdf6d48ebeb40819d707d196da6a848
-
SHA1
863cd486488480e776eae6d9e1117b2cd36f97dc
-
SHA256
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57
-
SHA512
1ce292b9e6d62aa909f3cf91cc93c2e116a2fa8392058cccc5529b8d17554a88c07d1012629c677b0973728699c799374573c58a757bd98b4119e16d5c5cd862
-
SSDEEP
49152:QpbRm4GPK/M/2wTTMPJ+RGJLsxC2RoVDn99c1/0VXHbxUnUma2sxU5tL:01GS/o8+qOCMuDnu0VXlrmAxytL
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 4 IoCs
Processes:
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ThreadingModel = "Both" 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC} 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ = "%SystemRoot%\\System32\\NaturalLanguage6.dll" 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exedescription pid process Token: 33 2488 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe Token: SeIncBasePriorityPrivilege 2488 0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe"C:\Users\Admin\AppData\Local\Temp\0aeedaf4d880e1c0b298bf913645ca588271b41e6687e73243ec4c9cdbbfaa57.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2488