Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe
Resource
win10v2004-20250410-en
General
-
Target
55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe
-
Size
3.0MB
-
MD5
9dfb2cc63a4f7bfe344c992d7cfaedf0
-
SHA1
fdbfb02be0624e25c1b55d6b715558fa317f5c2f
-
SHA256
55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64
-
SHA512
5ca4547e2dc6c4fa17508f759f781bd37eef0eabd81d47085c0a4eb9957f48a096de1a553fce206fec961547cd1672d22112a1264761cb1a9489c57f36cb2914
-
SSDEEP
49152:OpbRm4GPK/Mv2STfnXR8lnz48kaMoVDn99c1/0VXfEmX28xO5tL:O1GS/IRwfkFuDnu0VXsm7xQtL
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\kgouXdCaxtamp\ = "vyyzrsdbCCNyoZDR" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\vmkuion 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dcgH\ = "oFByIGrzjr|n~mhIOyGnMu@" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\kgouXdCaxtamp\ = "vwGwWhCZpTmOc\\~l" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dcgH\ = "tBzkjBq{fLw_sHxlMsZ]\\c}" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dutplpmWLR\ = "hdHzQv[JiA]aLeZd[MInsEBurKrHgUWv" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dutplpmWLR\ = "hdHzQv[JiA]aLeZd[MInsEBurKrHgUWw" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\xbvcqdmhqlevn\ = "`CPaEyiT]Wn{EtnWkOB`f" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ehgIkcukowa 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ehgIkcukowa\ = "rn{G{WjI^fdDq}jP~t]T{aHA" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dutplpmWLR\ = "sz{^\x7fx{OZeALdRTznszWK~[v^ySMdwqK" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dcgH\ = "TBzkjBq{fLw_sHxlMsZ]\\c}" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ehgIkcukowa\ = "RVO\x7fu|ml\\YO|ZzFCuecD[}gU" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\kgouXdCaxtamp 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dcgH 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dutplpmWLR\ = "sz{^\x7fx{OZeALdRTznszWK~[v^ySMdwqJ" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dutplpmWLR\ = "hdHzQv[JiA]aLeZdkMInsEBuBKrHgUWv" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\jkUhhkoyjxa 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\vmkuion\ = "TOsWv@PeoKT}vI`KIPyNqQVmxlvSypV" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dutplpmWLR 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dcgH\ = "OFByIGrzjr|n~mhIOyGnMu@" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\VersionIndependentProgID 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\VersionIndependentProgID\ = "ADODB.Connection" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\xbvcqdmhqlevn 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dcgH 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649} 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\jkUhhkoyjxa 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\jkUhhkoyjxa\ = "]HQdj\x7fdYhKuXpYgzE" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\xbvcqdmhqlevn 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dutplpmWLR\ = "sz{^\x7fx{OZeALdRTz^szWK~[vnySMdwqK" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ehgIkcukowa\ = "rn{G{WjI^fdDq]jP~t_u}TIH" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ehgIkcukowa\ = "rn{G{WjI^fdDqMjP~t]zrvt|" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ = "C:\\Program Files\\Common Files\\System\\ado\\msado15.dll" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dutplpmWLR 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\xbvcqdmhqlevn\ = "JG`FTe`QtokQRDjoayF\\h" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\vmkuion 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\vmkuion\ = "DAbVOet_DrnOsbgIW}hdd{HP]SexpnE" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ehgIkcukowa 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ehgIkcukowa\ = "RVO\x7fu|ml\\YO|ZJFCuecjRj[h" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ehgIkcukowa\ = "rn{G{WjI^fdDqmjP~t\\ec~HO" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC} 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ = "ADODB.Connection" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID\ = "ADODB.Connection.6.0" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\kgouXdCaxtamp 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\jkUhhkoyjxa\ = "MXPd{teM^QVNdEOR_" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ehgIkcukowa\ = "RVO\x7fu|ml\\YO|ZZFCueb[Ju[f" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\ehgIkcukowa\ = "RVO\x7fu|ml\\YO|ZjFCueaKT_Za" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ThreadingModel = "Apartment" 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:BC2EA88B 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe File opened for modification C:\ProgramData\TEMP:BC2EA88B 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2580 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Token: SeIncBasePriorityPrivilege 2580 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Token: 33 3740 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe Token: SeIncBasePriorityPrivilege 3740 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3740 2580 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe 92 PID 2580 wrote to memory of 3740 2580 55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe"C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe"C:\Users\Admin\AppData\Local\Temp\55459cfc161cebc672eabbf0bfd8d406edc4aa5ae0a070dbb73749c278c8ae64.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5371ac1d35c9b05064e03b31d65be18f9
SHA171272ad06f587b7787e6cbd52f7f4262664acdfc
SHA2562dc2464757ff952b0fbbc83400d80a45b9d2311b2faf7ce542c6ff47cdb5ec3b
SHA5126ce1e1f5c9f35f5ea68ce7f7812f169049c2c9b4c2d8e6f048f015b166670841325e66d613cae1f34f6b93f88f2197b47fb356c16b09331d80d5abf4a55357f6