Analysis

  • max time kernel
    152s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 11:51

General

  • Target

    2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe

  • Size

    565KB

  • MD5

    b42674ba4f39012a0ee3c88002ebc92c

  • SHA1

    1c06d50188a03ac488db25774b7d51a73ba77ca3

  • SHA256

    2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6

  • SHA512

    a53f74d65a62bfc6d71ca4059c6674f2f2ec33c99bd6b8b60408a388387cafdf373397dfd95a7cf382651cabd2cc4ea8d1aa1f507b2884a5fa964c8499d094d4

  • SSDEEP

    12288:XaKoq63D9WtxtIdn5OezP2OwmTjFF1n19vX:X563JUinf23gjnNPP

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 15 IoCs
  • Detected phishing page
  • Executes dropped EXE 2 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    "C:\Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Local\Temp\data\UpDate.exe
      C:\Users\Admin\AppData\Local\Temp\data\UpDate.exe 3.0 %43%3A%5C%55%73%65%72%73%5C%41%64%6D%69%6E%5C%41%70%70%44%61%74%61%5C%4C%6F%63%61%6C%5C%54%65%6D%70%5C%32%61%65%63%36%32%36%34%65%31%64%66%38%64%33%63%66%32%31%61%65%65%64%62%61%38%38%64%36%62%65%34%64%64%38%66%63%32%37%38%61%63%64%31%61%63%34%62%63%38%37%61%32%66%31%35%63%35%33%31%37%65%66%36%2E%65%78%65 ¼Ù http://www.gutou.cc/up/shiyimiaozan.txt
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
        C:\Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe ÃüÁîÆô¶¯
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://gutou.cc/ad/shiyi/dingyue.htm
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1976

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    982990518a437b0540d6108115e34479

    SHA1

    8028345ec1d2a6981b372eca2e5a9c1f3d82a358

    SHA256

    7565caaaa39a3988c6153bb82bfe4bc5327a4788492a2d5b6c56917ff1d669cd

    SHA512

    13dd83296d592f9145b3235b41705ca11205a35a771915fcee773198467cbae29df666e8c6c362dbcaef348a257060a57966f6bf0746a90a5f4bb9074d680b24

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat
    Filesize

    8KB

    MD5

    7c8b2e066ce2a4f21b720268714a4278

    SHA1

    382fc6fcb9d9d86da07687b8ff547132ea039736

    SHA256

    f6c3913a0d7e9f6551bd519b2d641286adebed6b44ab5818a47cf306bf074c98

    SHA512

    004d120d15e2ca9fc56bbe2de8a82662e08865f0e718981db37c56f0768227120e2a232f54ef6c27a6dae4808874d8653a087391f8d42a7686dbe39f0340debc

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat
    Filesize

    12KB

    MD5

    96c5c50b58cc1b7266286af18de1f994

    SHA1

    c258b72fa666b507c55f8a9651f44e7a6be8c51a

    SHA256

    f90d477e84a38900f43b2b57fe1ff6fa0d4336ee41662bb5589e96a4b0239d2e

    SHA512

    5c7498d3958758007b40c233a80b67ff3e06917e029dcf42468ce297a1342c2af5a7bc7781f51060f52d8d89d58f65f167cbe374b25c208007bcf227f8c1692c

  • C:\Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • C:\Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • C:\Users\Admin\AppData\Local\Temp\data\UpDate.exe
    Filesize

    352KB

    MD5

    055068cf99073f7fe89a235fa7baa30e

    SHA1

    cf50106dc2c32080e4136822bc5c625f8bb0ef8f

    SHA256

    fd92a629cf49ec0477898a3ded5c6b16107275b8e115921a4f7f4e5dcc0aa62d

    SHA512

    88748fec907dfeb7c5771ef01dd988cfbcfab85af7fa6367b375727e73f569d50cdd7e36af82b5d69f3aeae0a25e58b086b3b181c04eb378a2cb62386e55c9fa

  • C:\Users\Admin\AppData\Local\Temp\data\UpDate.exe
    Filesize

    352KB

    MD5

    055068cf99073f7fe89a235fa7baa30e

    SHA1

    cf50106dc2c32080e4136822bc5c625f8bb0ef8f

    SHA256

    fd92a629cf49ec0477898a3ded5c6b16107275b8e115921a4f7f4e5dcc0aa62d

    SHA512

    88748fec907dfeb7c5771ef01dd988cfbcfab85af7fa6367b375727e73f569d50cdd7e36af82b5d69f3aeae0a25e58b086b3b181c04eb378a2cb62386e55c9fa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TS3V5SPV.txt
    Filesize

    608B

    MD5

    055399f8f5d12c5daa4baa7868ea1f8b

    SHA1

    c467b569f64b4dab38eadcb2f836c42f0d7263c0

    SHA256

    57c1a30ad8e4799773545bea9b52774b6328dbd9f42fc347bda1c43db6984ea4

    SHA512

    7e8a6a9ad2885d618a0af50fb2bc2bc9c481335ffccf981dccfab8f7f5ce0fbc87061e962902ece6b9d2a3cc997a0f0201e09476c3f7ffa2ecd718aaeb3a03af

  • \Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • \Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • \Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • \Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • \Users\Admin\AppData\Local\Temp\2aec6264e1df8d3cf21aeedba88d6be4dd8fc278acd1ac4bc87a2f15c5317ef6.exe
    Filesize

    565KB

    MD5

    19b8f9f0a535cde42111758d34205269

    SHA1

    0cf5c595d7f6191883cb4c126f2f963833bcd372

    SHA256

    9ce5eb658c2a00e34ea754d42da55f35a08456279d4235448ea4c6dfa9ad8dd2

    SHA512

    05089cb525a1d53aeb59680b3f7db404d3764ce47c9c417e3976ef03b8aa2f98a24a84a7a0b2d4ed2b53fdfbf8530b2a32d34823cf83309e876ea3cb320e1c13

  • \Users\Admin\AppData\Local\Temp\data\UpDate.exe
    Filesize

    352KB

    MD5

    055068cf99073f7fe89a235fa7baa30e

    SHA1

    cf50106dc2c32080e4136822bc5c625f8bb0ef8f

    SHA256

    fd92a629cf49ec0477898a3ded5c6b16107275b8e115921a4f7f4e5dcc0aa62d

    SHA512

    88748fec907dfeb7c5771ef01dd988cfbcfab85af7fa6367b375727e73f569d50cdd7e36af82b5d69f3aeae0a25e58b086b3b181c04eb378a2cb62386e55c9fa

  • \Users\Admin\AppData\Local\Temp\data\UpDate.exe
    Filesize

    352KB

    MD5

    055068cf99073f7fe89a235fa7baa30e

    SHA1

    cf50106dc2c32080e4136822bc5c625f8bb0ef8f

    SHA256

    fd92a629cf49ec0477898a3ded5c6b16107275b8e115921a4f7f4e5dcc0aa62d

    SHA512

    88748fec907dfeb7c5771ef01dd988cfbcfab85af7fa6367b375727e73f569d50cdd7e36af82b5d69f3aeae0a25e58b086b3b181c04eb378a2cb62386e55c9fa

  • \Users\Admin\AppData\Local\Temp\data\UpDate.exe
    Filesize

    352KB

    MD5

    055068cf99073f7fe89a235fa7baa30e

    SHA1

    cf50106dc2c32080e4136822bc5c625f8bb0ef8f

    SHA256

    fd92a629cf49ec0477898a3ded5c6b16107275b8e115921a4f7f4e5dcc0aa62d

    SHA512

    88748fec907dfeb7c5771ef01dd988cfbcfab85af7fa6367b375727e73f569d50cdd7e36af82b5d69f3aeae0a25e58b086b3b181c04eb378a2cb62386e55c9fa

  • \Users\Admin\AppData\Local\Temp\data\UpDate.exe
    Filesize

    352KB

    MD5

    055068cf99073f7fe89a235fa7baa30e

    SHA1

    cf50106dc2c32080e4136822bc5c625f8bb0ef8f

    SHA256

    fd92a629cf49ec0477898a3ded5c6b16107275b8e115921a4f7f4e5dcc0aa62d

    SHA512

    88748fec907dfeb7c5771ef01dd988cfbcfab85af7fa6367b375727e73f569d50cdd7e36af82b5d69f3aeae0a25e58b086b3b181c04eb378a2cb62386e55c9fa

  • memory/568-132-0x0000000000400000-0x0000000000467000-memory.dmp
    Filesize

    412KB

  • memory/568-112-0x00000000008D0000-0x0000000000937000-memory.dmp
    Filesize

    412KB

  • memory/568-111-0x0000000000400000-0x0000000000467000-memory.dmp
    Filesize

    412KB

  • memory/568-113-0x00000000008D0000-0x0000000000937000-memory.dmp
    Filesize

    412KB

  • memory/568-104-0x0000000000000000-mapping.dmp
  • memory/568-126-0x0000000003880000-0x0000000003AE8000-memory.dmp
    Filesize

    2.4MB

  • memory/872-95-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-77-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-100-0x0000000000400000-0x0000000000668000-memory.dmp
    Filesize

    2.4MB

  • memory/872-101-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-61-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-103-0x00000000042B0000-0x0000000004317000-memory.dmp
    Filesize

    412KB

  • memory/872-67-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-99-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-75-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-85-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-93-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-97-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-54-0x0000000075B41000-0x0000000075B43000-memory.dmp
    Filesize

    8KB

  • memory/872-91-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-89-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-114-0x0000000000400000-0x0000000000668000-memory.dmp
    Filesize

    2.4MB

  • memory/872-87-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-81-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-83-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-55-0x0000000000400000-0x0000000000668000-memory.dmp
    Filesize

    2.4MB

  • memory/872-79-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-57-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-73-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-71-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-58-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-69-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-59-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-63-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/872-65-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-140-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-173-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-130-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-134-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-136-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-138-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-129-0x0000000000D20000-0x0000000000F88000-memory.dmp
    Filesize

    2.4MB

  • memory/1496-142-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-131-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-174-0x0000000000400000-0x0000000000668000-memory.dmp
    Filesize

    2.4MB

  • memory/1496-175-0x0000000000D20000-0x0000000000F88000-memory.dmp
    Filesize

    2.4MB

  • memory/1496-127-0x0000000000400000-0x0000000000668000-memory.dmp
    Filesize

    2.4MB

  • memory/1496-128-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1496-124-0x0000000000400000-0x0000000000668000-memory.dmp
    Filesize

    2.4MB

  • memory/1496-117-0x0000000000000000-mapping.dmp