Analysis

  • max time kernel
    79s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 11:30

General

  • Target

    731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe

  • Size

    3.1MB

  • MD5

    f2733cc44798b9014af14f7bc7d280de

  • SHA1

    0f6a947f59710ef5dd197ed9ee02d00e72aef420

  • SHA256

    731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215

  • SHA512

    a03fc99fa026eaeac18fa1d3b0830eaeca4ee431601b9a752c31926a1a34589795faffb05a9c053e6ddd86dde335913a5ccf7b5a14055436c8bc341ac541aa31

  • SSDEEP

    98304:al94XfeyP6RDfyu8LSMyj0mdQ1820sJPLaYy/:al2X2yiNKtSTdQ18dsJP+

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • ModiLoader Second Stage 5 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe
    "C:\Users\Admin\AppData\Local\Temp\731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:836
    • C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
        C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        PID:468

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll
    Filesize

    57KB

    MD5

    bf238ea7175ba09cc2d1b3d43fddcdf9

    SHA1

    4c927a47e6dd40c65d4ec00e87518495779079e9

    SHA256

    f236c51a0053c7704b55f8e64d4468fbf451711bff0049c08b98343a3b0cb894

    SHA512

    889d1c62d4ecb5632b19a0c3a99df8796b3cb679dfbd66ca60f3f0d359a9ad50833221b563f3b6502cd67ffa0d5947b7f3c7b65eef1e3802e8ccfa8f2dd60ba2

  • C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
    Filesize

    5.8MB

    MD5

    eaaa7d585fe518826886961768b03d25

    SHA1

    ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a

    SHA256

    e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db

    SHA512

    8e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a

  • C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
    Filesize

    5.8MB

    MD5

    eaaa7d585fe518826886961768b03d25

    SHA1

    ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a

    SHA256

    e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db

    SHA512

    8e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a

  • C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
    Filesize

    5.8MB

    MD5

    eaaa7d585fe518826886961768b03d25

    SHA1

    ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a

    SHA256

    e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db

    SHA512

    8e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a

  • C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe
    Filesize

    3.0MB

    MD5

    51f2e214a0cd49d78b93092e25270a9b

    SHA1

    53091dc8ebd8f86ff5091bcd10fb9ca03adc7686

    SHA256

    9edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2

    SHA512

    73d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb

  • C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe
    Filesize

    3.0MB

    MD5

    51f2e214a0cd49d78b93092e25270a9b

    SHA1

    53091dc8ebd8f86ff5091bcd10fb9ca03adc7686

    SHA256

    9edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2

    SHA512

    73d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb

  • \Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dll
    Filesize

    57KB

    MD5

    bf238ea7175ba09cc2d1b3d43fddcdf9

    SHA1

    4c927a47e6dd40c65d4ec00e87518495779079e9

    SHA256

    f236c51a0053c7704b55f8e64d4468fbf451711bff0049c08b98343a3b0cb894

    SHA512

    889d1c62d4ecb5632b19a0c3a99df8796b3cb679dfbd66ca60f3f0d359a9ad50833221b563f3b6502cd67ffa0d5947b7f3c7b65eef1e3802e8ccfa8f2dd60ba2

  • \Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dll
    Filesize

    57KB

    MD5

    bf238ea7175ba09cc2d1b3d43fddcdf9

    SHA1

    4c927a47e6dd40c65d4ec00e87518495779079e9

    SHA256

    f236c51a0053c7704b55f8e64d4468fbf451711bff0049c08b98343a3b0cb894

    SHA512

    889d1c62d4ecb5632b19a0c3a99df8796b3cb679dfbd66ca60f3f0d359a9ad50833221b563f3b6502cd67ffa0d5947b7f3c7b65eef1e3802e8ccfa8f2dd60ba2

  • \Users\Admin\AppData\Local\Temp\Temp\UpDate.dll
    Filesize

    289KB

    MD5

    f1aac1bb696a30d45e4a89d1de587979

    SHA1

    d1d353489084783766f4a328a71a953127317485

    SHA256

    3f28ed50462274e5ae2a94909b680ae0a188ad1a744ac18e74bf183c13fe6f1b

    SHA512

    8a7d712b759fa447c7b5ca7d9f66746a326eff395ccaad0df9da1f2377f157746471a7eb62047c8b1d03bd9f59d41292c05865568a95bfb0d2bc8373984b5a4e

  • \Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
    Filesize

    5.8MB

    MD5

    eaaa7d585fe518826886961768b03d25

    SHA1

    ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a

    SHA256

    e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db

    SHA512

    8e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a

  • \Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
    Filesize

    5.8MB

    MD5

    eaaa7d585fe518826886961768b03d25

    SHA1

    ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a

    SHA256

    e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db

    SHA512

    8e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a

  • \Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe
    Filesize

    5.8MB

    MD5

    eaaa7d585fe518826886961768b03d25

    SHA1

    ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a

    SHA256

    e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db

    SHA512

    8e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a

  • \Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe
    Filesize

    3.0MB

    MD5

    51f2e214a0cd49d78b93092e25270a9b

    SHA1

    53091dc8ebd8f86ff5091bcd10fb9ca03adc7686

    SHA256

    9edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2

    SHA512

    73d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb

  • \Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe
    Filesize

    3.0MB

    MD5

    51f2e214a0cd49d78b93092e25270a9b

    SHA1

    53091dc8ebd8f86ff5091bcd10fb9ca03adc7686

    SHA256

    9edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2

    SHA512

    73d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb

  • memory/468-86-0x0000000000401000-0x000000000041B000-memory.dmp
    Filesize

    104KB

  • memory/468-83-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/468-70-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/468-71-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/468-85-0x000000000041B000-0x0000000000423000-memory.dmp
    Filesize

    32KB

  • memory/468-87-0x0000000000EE0000-0x0000000000EF8000-memory.dmp
    Filesize

    96KB

  • memory/468-75-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/468-79-0x000000000042208E-mapping.dmp
  • memory/836-93-0x0000000077340000-0x00000000774C0000-memory.dmp
    Filesize

    1.5MB

  • memory/836-88-0x0000000000400000-0x00000000009C8000-memory.dmp
    Filesize

    5.8MB

  • memory/836-78-0x0000000002390000-0x00000000024F3000-memory.dmp
    Filesize

    1.4MB

  • memory/836-104-0x0000000077340000-0x00000000774C0000-memory.dmp
    Filesize

    1.5MB

  • memory/836-103-0x0000000000400000-0x00000000009C8000-memory.dmp
    Filesize

    5.8MB

  • memory/836-102-0x0000000006890000-0x0000000006975000-memory.dmp
    Filesize

    916KB

  • memory/836-101-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/836-57-0x0000000000000000-mapping.dmp
  • memory/836-62-0x0000000000400000-0x00000000009C8000-memory.dmp
    Filesize

    5.8MB

  • memory/836-91-0x0000000077340000-0x00000000774C0000-memory.dmp
    Filesize

    1.5MB

  • memory/836-92-0x0000000000400000-0x00000000009C8000-memory.dmp
    Filesize

    5.8MB

  • memory/836-100-0x0000000000400000-0x00000000009C8000-memory.dmp
    Filesize

    5.8MB

  • memory/836-99-0x0000000006890000-0x0000000006975000-memory.dmp
    Filesize

    916KB

  • memory/836-95-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1376-66-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1376-59-0x0000000000400000-0x000000000041C000-memory.dmp
    Filesize

    112KB

  • memory/1376-60-0x0000000002640000-0x0000000002C08000-memory.dmp
    Filesize

    5.8MB

  • memory/1376-61-0x0000000002640000-0x0000000002C08000-memory.dmp
    Filesize

    5.8MB

  • memory/1376-54-0x0000000075B61000-0x0000000075B63000-memory.dmp
    Filesize

    8KB

  • memory/1396-81-0x0000000000EE0000-0x0000000000EF8000-memory.dmp
    Filesize

    96KB

  • memory/1396-65-0x0000000000000000-mapping.dmp
  • memory/1396-74-0x0000000000EE0000-0x0000000000EF8000-memory.dmp
    Filesize

    96KB

  • memory/1396-76-0x0000000000340000-0x0000000000358000-memory.dmp
    Filesize

    96KB