Analysis

  • max time kernel
    103s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 19:39

General

  • Target

    5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839.dll

  • Size

    3.5MB

  • MD5

    68cca8274a53918321b220e3b48251fe

  • SHA1

    2e4a0dcd41818d5e63dbeeebca62458f0cf79342

  • SHA256

    5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839

  • SHA512

    7f61bcd2aefd932b51db2996120e54ca7812f6041f27f73221565011f703550ae3936fe67ce6b3f54bcbe2612cf1e9d16cfc87e331ea5d5e97a58ea5da19a398

  • SSDEEP

    49152:ZgoRTtP4NngsOcwTwKZYqcPEFLVZtmoVDn99c1/0VX69Ux4CO3OnepMIAmZea+:SOA+wq3hZkuDnu0VX69UeCOq8AmZeR

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5c920ce32149daf7ff105958394356d2e65e59408ba662ed12a27607c623f839.dll
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2872-0-0x0000000002F00000-0x00000000030EA000-memory.dmp

    Filesize

    1.9MB

  • memory/2872-10-0x0000000180000000-0x000000018061C000-memory.dmp

    Filesize

    6.1MB

  • memory/2872-12-0x0000000180000000-0x000000018061C000-memory.dmp

    Filesize

    6.1MB

  • memory/2872-13-0x0000000180000000-0x000000018061C000-memory.dmp

    Filesize

    6.1MB

  • memory/2872-15-0x0000000180000000-0x000000018061C000-memory.dmp

    Filesize

    6.1MB