Analysis

  • max time kernel
    48s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2022 21:54

General

  • Target

    0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b.exe

  • Size

    4.0MB

  • MD5

    d571f25c248e52c07a5343ceb7d9a4c2

  • SHA1

    7d00e4385dee328a7f486dc81ac8696a7d9e535b

  • SHA256

    0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b

  • SHA512

    983fbac794e65d1f391dcff37ddca5f56b8ab221611bc823be08ff9bb5b249007b75e6d7e0c4e4edd09d5edc629d7d010a2e402422154ca800fb867788f825c9

  • SSDEEP

    98304:GczGF9E+wSReWIjp3tcb9YI/LsoayFPVdBOxt1bDkMBN:GczGPERuQjdtc5vzsoaMPVdMt1bDkMBN

Malware Config

Extracted

Family

joker

C2

https://htuzi.oss-cn-shanghai.aliyuncs.com

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 5 IoCs
  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b.exe
    "C:\Users\Admin\AppData\Local\Temp\0dc1ae70ada3fb95f855a2eaed441d5f5200ea675f18270b81eab10a2a5fb91b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\systray.exe
      C:\Windows\SysWOW64\systray.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\EasySkin.ini

    Filesize

    129B

    MD5

    78d89536fa344a82364f1dda81d78f3a

    SHA1

    e866b4f7713f3b6718c2b4b836937c8b35ff7c31

    SHA256

    32c064c7c56cae4ea4ee32cf8ee2f110f2f715ed064c28c1a5e5b4b384439fa5

    SHA512

    2a04d9ea26e8617c60f5af189f2fce74baf151bb414390aa617adf140bce277d492764dc7a34671d0a09c61edebbd0b9f8d3ce591a2d6d54f66495f53cce6d58

  • C:\Users\Admin\AppData\Local\Temp\1460_update\7z.7z

    Filesize

    4.0MB

    MD5

    f88236ac58d508dd747da0bfca466c72

    SHA1

    cd16259c208e83a6329dc02bfbee3c2e7a52b995

    SHA256

    3f40f4868be1627095fa4c91825c2f4aea63240a4e0f63bb09b97e3b1a6b37e0

    SHA512

    e7104a1e4f817b964c1f4c44481943fd98dcbb12523e99ea90edc62aaf7589d4a0b510a8f9e649c5cc8df4d7f719288412a6b31f17c565adfa136fceb074a3cd

  • C:\Users\Admin\AppData\Local\Temp\1460_update\data.ini

    Filesize

    165B

    MD5

    c25ed0c30d7ec0cbc4913ab0146c7c2f

    SHA1

    68de7a1efcc8dafd05c59d4253d1e3e7285bd6db

    SHA256

    632a9c1446784a43c06b57da9e6ecf572ed1a27649c7de200788aa707086efb7

    SHA512

    6742fbc3820129cd680abdaa84351d4254dc163910516cadb244b735f913d0d72f681ce08d139eed028366ab600d905e0324b951a067d3ab44237a2bdc46767a

  • memory/1048-69-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1048-76-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1048-61-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1048-63-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1048-60-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1048-66-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1048-72-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1460-58-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/1460-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB

  • memory/1460-59-0x000000001006C000-0x00000000100AC000-memory.dmp

    Filesize

    256KB

  • memory/1460-77-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/1460-57-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/1460-56-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB

  • memory/1460-55-0x0000000000400000-0x00000000010A2000-memory.dmp

    Filesize

    12.6MB