Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe
Resource
win10v2004-20250217-en
General
-
Target
240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe
-
Size
2.2MB
-
MD5
45c03c328c61248fb11afb746fcb7040
-
SHA1
4b524964af0cd43613adaca4e7a6be8d23a39a70
-
SHA256
240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618
-
SHA512
e7498fad8403e74e05e97509b584a37c25662f0405fd6299675229929375c1c7499933d6cc74e28f3c44fc15ff638e86a8d43ac3bbbaaa2d4495a81b99e804c7
-
SSDEEP
49152:npbRm4GPK/MveGTEtmBI5GEIZiGwoVDn99c1/0VXkjjAmZea+:p1GS/GByqi1uDnu0VXkHAmZeR
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E260979C-35E2-E3FE-5CDD-11BC4DD03144} 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E260979C-35E2-E3FE-5CDD-11BC4DD03144}\ = "Wininet Cache task object" 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E260979C-35E2-E3FE-5CDD-11BC4DD03144}\AppID = "{3eb3c877-1f16-487c-9050-104dbcd66683}" 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E260979C-35E2-E3FE-5CDD-11BC4DD03144}\InProcServer32 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E260979C-35E2-E3FE-5CDD-11BC4DD03144}\InProcServer32\ = "%systemroot%\\system32\\wininet.dll" 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E260979C-35E2-E3FE-5CDD-11BC4DD03144}\InProcServer32\ThreadingModel = "Both" 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2268 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe Token: SeIncBasePriorityPrivilege 2268 240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe"C:\Users\Admin\AppData\Local\Temp\240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2268