Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 12:13

General

  • Target

    240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe

  • Size

    2.2MB

  • MD5

    45c03c328c61248fb11afb746fcb7040

  • SHA1

    4b524964af0cd43613adaca4e7a6be8d23a39a70

  • SHA256

    240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618

  • SHA512

    e7498fad8403e74e05e97509b584a37c25662f0405fd6299675229929375c1c7499933d6cc74e28f3c44fc15ff638e86a8d43ac3bbbaaa2d4495a81b99e804c7

  • SSDEEP

    49152:npbRm4GPK/MveGTEtmBI5GEIZiGwoVDn99c1/0VXkjjAmZea+:p1GS/GByqi1uDnu0VXkHAmZeR

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe
    "C:\Users\Admin\AppData\Local\Temp\240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2268-0-0x00000000023C0000-0x00000000025AA000-memory.dmp

    Filesize

    1.9MB

  • memory/2268-7-0x00000000023C0000-0x00000000025AA000-memory.dmp

    Filesize

    1.9MB

  • memory/2268-12-0x0000000140000000-0x00000001402C8000-memory.dmp

    Filesize

    2.8MB

  • memory/2268-14-0x00000000023C0000-0x00000000025AA000-memory.dmp

    Filesize

    1.9MB

  • memory/2268-13-0x0000000140000000-0x00000001402C8000-memory.dmp

    Filesize

    2.8MB

  • memory/2268-16-0x0000000002120000-0x0000000002121000-memory.dmp

    Filesize

    4KB

  • memory/2268-17-0x00000000023C0000-0x00000000025AA000-memory.dmp

    Filesize

    1.9MB

  • memory/2268-19-0x0000000140000000-0x00000001402C8000-memory.dmp

    Filesize

    2.8MB