Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/04/2025, 16:23

General

  • Target

    55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe

  • Size

    3.0MB

  • MD5

    9dfb2cc63a4f7bfe344c992d7cfaedf0

  • SHA1

    fdbfb02be0624e25c1b55d6b715558fa317f5c2f

  • SHA256

    55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64

  • SHA512

    5ca4547e2dc6c4fa17508f759f781bd37eef0eabd81d47085c0a4eb9957f48a096de1a553fce206fec961547cd1672d22112a1264761cb1a9489c57f36cb2914

  • SSDEEP

    49152:OpbRm4GPK/Mv2STfnXR8lnz48kaMoVDn99c1/0VXfEmX28xO5tL:O1GS/IRwfkFuDnu0VXsm7xQtL

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Banload family
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 50 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe
    "C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe
      "C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe"
      2⤵
      • Checks BIOS information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:3740

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Licenses\0F3444CB9E7EC53A1.Lic

    Filesize

    122B

    MD5

    371ac1d35c9b05064e03b31d65be18f9

    SHA1

    71272ad06f587b7787e6cbd52f7f4262664acdfc

    SHA256

    2dc2464757ff952b0fbbc83400d80a45b9d2311b2faf7ce542c6ff47cdb5ec3b

    SHA512

    6ce1e1f5c9f35f5ea68ce7f7812f169049c2c9b4c2d8e6f048f015b166670841325e66d613cae1f34f6b93f88f2197b47fb356c16b09331d80d5abf4a55357f6

  • memory/2580-39-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/2580-7-0x00000000026D0000-0x00000000028BA000-memory.dmp

    Filesize

    1.9MB

  • memory/2580-13-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/2580-15-0x00000000026D0000-0x00000000028BA000-memory.dmp

    Filesize

    1.9MB

  • memory/2580-14-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/2580-12-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/2580-17-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/2580-18-0x00000000026D0000-0x00000000028BA000-memory.dmp

    Filesize

    1.9MB

  • memory/2580-0-0x00000000026D0000-0x00000000028BA000-memory.dmp

    Filesize

    1.9MB

  • memory/2580-41-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/3740-19-0x0000000002740000-0x000000000292A000-memory.dmp

    Filesize

    1.9MB

  • memory/3740-35-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/3740-36-0x0000000002740000-0x000000000292A000-memory.dmp

    Filesize

    1.9MB

  • memory/3740-33-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/3740-34-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB

  • memory/3740-40-0x0000000002740000-0x000000000292A000-memory.dmp

    Filesize

    1.9MB

  • memory/3740-26-0x0000000002740000-0x000000000292A000-memory.dmp

    Filesize

    1.9MB

  • memory/3740-44-0x0000000140000000-0x0000000140499000-memory.dmp

    Filesize

    4.6MB