Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 23:16

General

  • Target

    784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4.exe

  • Size

    4.0MB

  • MD5

    40e741054de924186fc92ca28e367f1f

  • SHA1

    0181be7e0a4f6354fed8c7438ee42528945bedac

  • SHA256

    784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4

  • SHA512

    e267b4fd931c2b3efd63d1dcfd21d0f8681d5cead8ae8865b167cab73772eb9e3eadd5a88eb1b4bf768696266c57cbd11ca5b3d8164a818821e0f4e3fc538127

  • SSDEEP

    98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBr:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBr

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4.exe
    "C:\Users\Admin\AppData\Local\Temp\784f0119c4fdeaf13267c53e3a7f124644b3dbe79b335d48a7f32ec132d14df4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\SysWOW64\regini.exe
      C:\Windows\SysWOW64\regini.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\EasySkin.ini

    Filesize

    129B

    MD5

    78d89536fa344a82364f1dda81d78f3a

    SHA1

    e866b4f7713f3b6718c2b4b836937c8b35ff7c31

    SHA256

    32c064c7c56cae4ea4ee32cf8ee2f110f2f715ed064c28c1a5e5b4b384439fa5

    SHA512

    2a04d9ea26e8617c60f5af189f2fce74baf151bb414390aa617adf140bce277d492764dc7a34671d0a09c61edebbd0b9f8d3ce591a2d6d54f66495f53cce6d58

  • C:\Users\Admin\AppData\Local\Temp\948_update\7z.7z

    Filesize

    4.0MB

    MD5

    f88236ac58d508dd747da0bfca466c72

    SHA1

    cd16259c208e83a6329dc02bfbee3c2e7a52b995

    SHA256

    3f40f4868be1627095fa4c91825c2f4aea63240a4e0f63bb09b97e3b1a6b37e0

    SHA512

    e7104a1e4f817b964c1f4c44481943fd98dcbb12523e99ea90edc62aaf7589d4a0b510a8f9e649c5cc8df4d7f719288412a6b31f17c565adfa136fceb074a3cd

  • C:\Users\Admin\AppData\Local\Temp\948_update\data.ini

    Filesize

    165B

    MD5

    54751bf3cf9dd462019f1b5602ddbd1a

    SHA1

    480139bf91e02ce4ff820df8407cc26a2120b4ca

    SHA256

    35e1672ca00e78ebd784d4bbf1f38a3fe612c985e08e64c0b35fc5ca76c9f704

    SHA512

    6e8b1f626d9042d6c34c3836d2cf997d85f3f795c4474bdbdd045089f3820696531b8242846d4eefe22ba90a366f9acf497cc8de7464b0816b6a979496b7c2e5

  • memory/948-75-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/948-58-0x000000001006C000-0x00000000100AC000-memory.dmp

    Filesize

    256KB

  • memory/948-55-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/948-56-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/948-57-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/948-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB

  • memory/1084-71-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-68-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-65-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-76-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-62-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-60-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1084-59-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB