Analysis

  • max time kernel
    151s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2023 04:11

General

  • Target

    py-hzz.msi

  • Size

    118.5MB

  • MD5

    647864bf491144519120e6aef0ccee2b

  • SHA1

    aa0f4f5ae485cc31c80d1241442bd07710db353e

  • SHA256

    1e87ebcf8bf36d40079573ee61efb7f4e7f70b46c85ca1888899490b4be5f98d

  • SHA512

    12bdbed6a35d0c22e3266f1356ad8261d66d539be4e344084aeb7a3d05d438081ffd328ba6da9028f745b17e50af96b27e80ebc7cec2969acda308657c7019c1

  • SSDEEP

    3145728:n92fD6MoAr3Z1q3oeZJDN/Mfm1eoT1Fl0f5yQBtmpX4:gfD6Moc3a3oeZnMGBRsdtmR

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\py-hzz.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3328
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1936
    • C:\Program Files (x86)\搜狗输入法\搜狗输入法\QuickQ.exe
      "C:\Program Files (x86)\搜狗输入法\搜狗输入法\QuickQ.exe" /Install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3524
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\搜狗输入法\搜狗输入法\QuickQ.exe

    Filesize

    3.0MB

    MD5

    1e1b42b6c885280e082ac373f7b59f3f

    SHA1

    1e6646b827f5089aefedac669f62ef55a19d7ad2

    SHA256

    14b6a49fb11961fb851c51b3dbca5ee8cb02d86e5dfcf7cdbd9edcd06f2c118c

    SHA512

    56826f422d8f68d6c9a6b7cd23c0a48fa7ee48c4e90588f630d4b08588b63e8cfff230549272d8411cd2fe229f158ddc108a48cba658064ded4e76e0d9064c64

  • C:\Program Files (x86)\搜狗输入法\搜狗输入法\QuickQ.exe

    Filesize

    3.0MB

    MD5

    1e1b42b6c885280e082ac373f7b59f3f

    SHA1

    1e6646b827f5089aefedac669f62ef55a19d7ad2

    SHA256

    14b6a49fb11961fb851c51b3dbca5ee8cb02d86e5dfcf7cdbd9edcd06f2c118c

    SHA512

    56826f422d8f68d6c9a6b7cd23c0a48fa7ee48c4e90588f630d4b08588b63e8cfff230549272d8411cd2fe229f158ddc108a48cba658064ded4e76e0d9064c64

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GAKQU0X5\KCUR85CH.htm

    Filesize

    399KB

    MD5

    a5f97480d1600d61613389f8ee25bcc9

    SHA1

    f824a32259bb881e012555c56391bb13a0c11f49

    SHA256

    552fc34678f4333a4f0e61f9b1d3421bc3bf6f055ef7baeb41211433c58109f2

    SHA512

    c66191d8d82881fb6ff21a88489305a448c41f924986b9aea3900326d4b77cb582be00d88c079bd3adff0094633f4e023cfff18ab985a30fdea55184f1b08ba2

  • C:\Users\Public\Videos\study95\1.dll

    Filesize

    1.9MB

    MD5

    efb4f7f2c29f4b812ec344782c751ead

    SHA1

    84e6ec5323d1c535dcf4c7bbdde259a9847eee39

    SHA256

    d48fb613b4336547f5925f88ffd5de78bb36974634aad096deeb5af4be1b96c6

    SHA512

    dc85c2005c84da617bf2280471db7afb4e4bb3f85aa885136b6daf14041ee6d0dd4afd043ac1d16e4b14eddc05ad93aa8e2dec55d1e8e22e05427666cfb2c4c4

  • C:\Users\Public\Videos\study95\2.dll

    Filesize

    576KB

    MD5

    e1b3cf30274e632c35be299d4d6e3931

    SHA1

    9c52dccc089995899c566d1897d4b6e623c790b6

    SHA256

    37987d399b9d543125909768f6197783fe8ea92d2575622ae3df9e396444f6fd

    SHA512

    1b9475c430d70cd18097849d5eecd1d41493811f7162ca89cc29ce87093b7261e9c594567d9b39cf49157e6feb50f0f014ca93d5923fe124bafe9504db976443

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.0MB

    MD5

    d87eda5fff4e2ec51cb4ef640615e1e7

    SHA1

    c5eef6c61b90364a1394a4f056cb7aebfd0302ef

    SHA256

    3a911f864f421ba7e08d6cd2bdce455f99b23ef9a7a6657499355257d072667a

    SHA512

    6e0a2aa2f7169124f4352d9afcfbb83ba7848b1377c9e6c4b1a46df52771667619395064e25a6b11fbc41f117d63800d6e74b8b30a07ed75d1b1276e47ce9e7a

  • \??\Volume{ba7a5d05-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0bb26103-f56b-4c49-b865-c4d3426450b4}_OnDiskSnapshotProp

    Filesize

    5KB

    MD5

    7a8d1b4d29cd72e678df7cbeb97e3f56

    SHA1

    691bd5a50848adee0432dc7cb1fb1a0c1c80e4ed

    SHA256

    38206c8eced71bdf4091e43564e493dfc84a1f96cbf005a05ef15d1a7c20d68a

    SHA512

    700a90ef481ea008302259531d8f545d0f44245725d89a204e127d3eeed74f0f3952209ab019fdc17b1e11bd0a0f2f1c0da9fd868ba65d05f0752d3f7be0b0e1