Analysis

  • max time kernel
    138s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 01:23

General

  • Target

    440677bd9021db929a504bc2480225a0f9809564a5cdc2d588fbe89596dcc47d.exe

  • Size

    103KB

  • MD5

    174a4a1a62b10885fc0aa5b65d32e7f0

  • SHA1

    8b999466a127712a6e91e3e3591c3a6c3d958147

  • SHA256

    440677bd9021db929a504bc2480225a0f9809564a5cdc2d588fbe89596dcc47d

  • SHA512

    6a348b3156f12fad76daf4c876963c189443a03268eaf67d18526d535531d7cf110ee9dab1816137dbe462d675f82ae7a128458bffc07f3a475eeb8bd01794f6

  • SSDEEP

    1536:sE5w4qnGS5jNqm1Rf9ziE31wsapsSw+KjvuWRCdm9ozXW7DI376KEhIogtwGF1q3:soqnGS5xJr9zicOsSwqWUXW787ggt/q

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\440677bd9021db929a504bc2480225a0f9809564a5cdc2d588fbe89596dcc47d.exe
    "C:\Users\Admin\AppData\Local\Temp\440677bd9021db929a504bc2480225a0f9809564a5cdc2d588fbe89596dcc47d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://caiyyqq.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    fceed7a5f76725fb398c6a91ff552899

    SHA1

    237aec000ae7c7c35a639664b1ad6c0d842a0749

    SHA256

    2888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383

    SHA512

    adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    9aca23676e92c7d9c9a18e921d45a713

    SHA1

    de4086c9db29f7f7f3ca898eb451298456230cb2

    SHA256

    3204aa44181152e5e401b9028a45732733fbeb25289fd8cf9614a411b078250e

    SHA512

    3381321f77bf8197d33d787caf36bb90dd0dabfb35e41dc50e75e99a2e836a48a933f6c6ab6167412260acb528a42e844bc2914ab802ca229b4fff40f58a4e1d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    9KB

    MD5

    2aca1ef106aa6e0fdda2da205b7015a7

    SHA1

    544e39ca993aefa8febdc93256e8291ce4d210f0

    SHA256

    78544957157402f527b20d217903758c22eba023b0ae49cfea0ec79d1724dedc

    SHA512

    c40ee5217c2adaf1865145e3064061cad18cfe45f1e86ae559af13878d334d79fa31f5ca48276374e75936c175d88af59bf6d9cd0d9c754467fdc5430c9f4906

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\favicon[1].ico

    Filesize

    9KB

    MD5

    1af6c08eb07f675c862fa3cd50640511

    SHA1

    bfc9fbddea831a3cae067a570bcb4450280c7f45

    SHA256

    7fc7fdb7ea134949cefdbd00ac02724e091e0201c1cee06795f84db28a1586d4

    SHA512

    163ab2dfa0aa242f55051c914bb467c7e3eb8163f0736548f6a26d1c5d12fa4fc21db08067cedfc96465627d27a840cf347f42d35f4e24129deceefde54d167d

  • memory/3784-132-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3784-133-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB