Analysis

  • max time kernel
    91s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 12:13

General

  • Target

    240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe

  • Size

    2.2MB

  • MD5

    45c03c328c61248fb11afb746fcb7040

  • SHA1

    4b524964af0cd43613adaca4e7a6be8d23a39a70

  • SHA256

    240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618

  • SHA512

    e7498fad8403e74e05e97509b584a37c25662f0405fd6299675229929375c1c7499933d6cc74e28f3c44fc15ff638e86a8d43ac3bbbaaa2d4495a81b99e804c7

  • SSDEEP

    49152:npbRm4GPK/MveGTEtmBI5GEIZiGwoVDn99c1/0VXkjjAmZea+:p1GS/GByqi1uDnu0VXkHAmZeR

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe
    "C:\Users\Admin\AppData\Local\Temp\240c4228708c43ee4a011f0c3c31516226f40fba77c29fa218e8d19337d1c618.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4776-1-0x0000000002770000-0x000000000295A000-memory.dmp

    Filesize

    1.9MB

  • memory/4776-7-0x0000000002770000-0x000000000295A000-memory.dmp

    Filesize

    1.9MB

  • memory/4776-12-0x0000000140000000-0x00000001402C8000-memory.dmp

    Filesize

    2.8MB

  • memory/4776-14-0x0000000002770000-0x000000000295A000-memory.dmp

    Filesize

    1.9MB

  • memory/4776-13-0x0000000140000000-0x00000001402C8000-memory.dmp

    Filesize

    2.8MB

  • memory/4776-16-0x0000000002590000-0x0000000002591000-memory.dmp

    Filesize

    4KB

  • memory/4776-17-0x0000000002770000-0x000000000295A000-memory.dmp

    Filesize

    1.9MB

  • memory/4776-19-0x0000000140000000-0x00000001402C8000-memory.dmp

    Filesize

    2.8MB