Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2022 09:22

General

  • Target

    tmp.exe

  • Size

    373KB

  • MD5

    ba9ba28edcd2e019634a2cd354291059

  • SHA1

    57e197322f588f7696ff8953e377bc75728d1ce8

  • SHA256

    fe7bcdcf12d34097b36cffe0ca7f56d29fb9079741d6926baf1cb76285bee367

  • SHA512

    e1a0114abe0a043e60d1d1e43c0faf9f0f8f7d743c5dea878882bd33c693545e94ef127207b9515df15677255d3e03a80cb4df4039518b4b56a602fb469b3a1c

  • SSDEEP

    6144:4mjmFJUEhqnuMotJTR364xjLRYPxSPqLFl/3vKC3WNlF7qMF934yApNhoSX:LjmFgmJk4BLRYpSyLFl//P31fzoS

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 13 IoCs
  • Drops file in Drivers directory 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 15 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 14 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: LoadsDriver 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Program Files\Windows Photo Viewer\lmagingDevices.exe
      "C:\Program Files\Windows Photo Viewer\lmagingDevices.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:2100
    • C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe
      "C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:4024
    • C:\Program Files (x86)\Windows Media Player\wmpIayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmpIayer.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:4672
    • C:\Program Files\Windows Photo Viewer\lmagingDevices.exe
      "C:\Program Files\Windows Photo Viewer\lmagingDevices.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:4272
    • C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe
      "C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:3524
    • C:\Program Files (x86)\Windows Media Player\wmpIayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmpIayer.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:4916
    • \??\c:\windows\expIorer.exe
      c:\windows\expIorer.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:5040

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Media Player\wmpIayer.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files (x86)\Windows Media Player\wmpIayer.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files (x86)\Windows Media Player\wmpIayer.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files (x86)\Windows Photo Viewer\lmagingDevices.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files\Windows Photo Viewer\lmagingDevices.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files\Windows Photo Viewer\lmagingDevices.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Program Files\Windows Photo Viewer\lmagingDevices.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • C:\Windows\Help\240593937.1Dt
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240594953.LBn
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\Help\240611359.FV7
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240612359.Zd1
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\Help\240628421.Zb1
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240629421.nTL
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\Help\240647593.51v
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240648593.7Z3
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\Help\240664765.n3l
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240665765.9R9
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\Help\240682000.h3X
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240683000.Zzl
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\Help\240701515.5Th
    Filesize

    142KB

    MD5

    bc131c9f96f79b417fa4e716555f6c7e

    SHA1

    ba650f5b06614a55a9939703cc8761cb03d62f28

    SHA256

    12bc8ebd1048a98f347d419d9c3ab6a0304f633c8d5532c4fb4f9d4f9da29bbd

    SHA512

    3546b5e13c28b74537c37bc6a1ae05ac389e4b6dc11cb6552aca4b131a7e468b2ee993f3179763da4ed7ecacd27b113db05f27885f019b50da7ecdfab2bd74dc

  • C:\Windows\Help\240702515.1Z7
    Filesize

    432KB

    MD5

    f5308b223e7846e8b061fe0d84ab7488

    SHA1

    ab2594d8b19219c72afac83fb4c8d4bc7333232b

    SHA256

    77347c3f34bfac7c0d5e790629ae94a7df434e0c4c85927c84de231a0d14be7c

    SHA512

    b7e78876858b3a811072924f598145a227526d6b2cd88901e715692b1e356ecdb63ab0b2a9c34a6070a84ffa7c7a87be323e4d21976b10ea474c12a66a6e7bb1

  • C:\Windows\expIorer.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • \??\c:\windows\expIorer.exe
    Filesize

    2.1MB

    MD5

    5009251600f40d7d7e319dc03b526f05

    SHA1

    2f93d0eb117400559089189c8435d365e27ca40d

    SHA256

    cb5620524177df89b0b5614c70c6b45b05dfdbb2f8249034dd6b3611c7d6595f

    SHA512

    f8e59b98393bfd186352dff115b53110422d06b38cc5b65ff983f58e87b1bea1205708d30f6ebdce675b743f80e591da355a7286e486e2535c1ad020a1223135

  • memory/2100-139-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/2100-134-0x0000000000000000-mapping.dmp
  • memory/2432-132-0x0000000000400000-0x0000000000534000-memory.dmp
    Filesize

    1.2MB

  • memory/2432-133-0x0000000000400000-0x0000000000534000-memory.dmp
    Filesize

    1.2MB

  • memory/3524-162-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/3524-158-0x0000000000000000-mapping.dmp
  • memory/4024-145-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/4024-140-0x0000000000000000-mapping.dmp
  • memory/4272-157-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/4272-153-0x0000000000000000-mapping.dmp
  • memory/4672-152-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/4672-151-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/4672-146-0x0000000000000000-mapping.dmp
  • memory/4916-163-0x0000000000000000-mapping.dmp
  • memory/4916-167-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB

  • memory/5040-168-0x0000000000000000-mapping.dmp
  • memory/5040-173-0x0000000010000000-0x00000000100D4000-memory.dmp
    Filesize

    848KB