Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2025, 20:04 UTC

General

  • Target

    68f39e13fccbfa295fd1dca6f9e613e92e15d3039f41d776f2eaa88fbc592016.exe

  • Size

    2.3MB

  • MD5

    de4b490c5dcb39aebf233e127ebe4756

  • SHA1

    b096e88a2d8617547c750b73fc6a1daca9dd4f0e

  • SHA256

    68f39e13fccbfa295fd1dca6f9e613e92e15d3039f41d776f2eaa88fbc592016

  • SHA512

    ac602163d3b12747cd90aa1e8ca74875ddb7bdd50b1d350e71c7f89ce6f5d06f60db959e8120d1757ea283ee41fb942d56472f2a218b7a619d99f3bf56d2700e

  • SSDEEP

    49152:mOIq2/OmOiBTnUsvFVvjuu168B1ECYJgkoreAmZea+:mOh22mJUCFVvju268B+5J2SAmZeR

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68f39e13fccbfa295fd1dca6f9e613e92e15d3039f41d776f2eaa88fbc592016.exe
    "C:\Users\Admin\AppData\Local\Temp\68f39e13fccbfa295fd1dca6f9e613e92e15d3039f41d776f2eaa88fbc592016.exe"
    1⤵
    • Checks BIOS information in registry
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2084-0-0x00000000025B0000-0x00000000027B1000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-7-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-6-0x00000000025B0000-0x00000000027B1000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-14-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-17-0x00000000025B0000-0x00000000027B1000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-19-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2084-15-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-13-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-12-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-16-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-20-0x00000000025B0000-0x00000000027B1000-memory.dmp

    Filesize

    2.0MB

  • memory/2084-22-0x0000000000400000-0x00000000006F2000-memory.dmp

    Filesize

    2.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.