Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 22:51

General

  • Target

    cce6d94596c0bf65a1ccc09bd638ffecbd09b433e5417a51f2c3c032766cd213.dll

  • Size

    15.3MB

  • MD5

    11de1dd85bc2d1d737518c1050b1e5de

  • SHA1

    a6888520e043294c4735e688d2a880cbb0fae84e

  • SHA256

    cce6d94596c0bf65a1ccc09bd638ffecbd09b433e5417a51f2c3c032766cd213

  • SHA512

    28fcc63b7bf44847787f10d4d5a570a2c094bc51183a9621e8bbf5ea1a13471c8435b358d4c404a266a4b317bfb481495a8c73ceebe6a0bc08f541b32fc057df

  • SSDEEP

    196608:0bPx/++HkUuicZHM0w+riPoDLNUMtBMO7NKWPUr9V5jABSuzYvZQaf+H2iIh2IkI:0b9zkPyU+PkrZnyp+8fjimkTVzS

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cce6d94596c0bf65a1ccc09bd638ffecbd09b433e5417a51f2c3c032766cd213.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cce6d94596c0bf65a1ccc09bd638ffecbd09b433e5417a51f2c3c032766cd213.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Sets service image path in registry
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        C:\Users\Admin\AppData\Local\Temp\tmp.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2336
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\Driver_Setup.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\devcon.exe
          devcon install BoothMalthus.inf "{B7696810-050E-4d2c-8D8F-C99735CB6998}\HID_DEVICE"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          PID:2856
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{7f40ee13-6330-5613-a60d-23167588bb19}\boothmalthus.inf" "9" "66a102943" "00000000000004A4" "WinSta0\Default" "00000000000004B0" "208" "c:\users\admin\appdata\local\temp\filedef2017f206\x64"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{564a8467-194c-384c-0e40-205dc2137777} Global\{2e675e38-0eb5-345e-5823-2f21e496ee4e} C:\Windows\System32\DriverStore\Temp\{0140a352-4835-2b52-94a1-0a4727eb6025}\boothmalthus.inf C:\Windows\System32\DriverStore\Temp\{0140a352-4835-2b52-94a1-0a4727eb6025}\BoothMalthus.cat
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabEE28.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\BoothMalthus.inf

    Filesize

    3KB

    MD5

    776f3ea7afee2a21018ec6e46c8f1768

    SHA1

    761d8bc0bd5c26c2a6b6bf52e1603c95893cd76b

    SHA256

    fb039a0d4a1a352d53b35572f0e1c5582ddc80736fcdc03197576c7254bd922e

    SHA512

    671c9f45c9afab432e0b6bbff011d94374ac33c4517fce0216b5de79f6a20c97e6aedcb217c75f70cc89ba17d798e48fa4bbdc28c49cd9b2665e3086b24afe4c

  • C:\Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\Driver_Setup.bat

    Filesize

    148B

    MD5

    97cf8bf0fc3f8f374d5be1252cfe14f2

    SHA1

    8be0e0eed3da8f9041319a2a9c1aa1093418fadd

    SHA256

    04b496ad848dc208ba978968540a944aa2f8979a549b8cd4d1a089f356ea16ee

    SHA512

    1a836b17e24b51ad32f7125cf6f6e4823b4dc7860b01b502b8f9a358f565e764f4ed08cdfd857e4b1b48e4db407282d42c7f2a64813bdbf2cd3f6bcd30f36f3f

  • C:\Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\Driver_Setup.bat

    Filesize

    148B

    MD5

    97cf8bf0fc3f8f374d5be1252cfe14f2

    SHA1

    8be0e0eed3da8f9041319a2a9c1aa1093418fadd

    SHA256

    04b496ad848dc208ba978968540a944aa2f8979a549b8cd4d1a089f356ea16ee

    SHA512

    1a836b17e24b51ad32f7125cf6f6e4823b4dc7860b01b502b8f9a358f565e764f4ed08cdfd857e4b1b48e4db407282d42c7f2a64813bdbf2cd3f6bcd30f36f3f

  • C:\Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\devcon.exe

    Filesize

    87KB

    MD5

    41ba1bbdd9284e49701ee94a3f446c33

    SHA1

    6d5bd532a0f9a3bf7005edeb53b4aba2d30a0c99

    SHA256

    c65d9acba88d2c56422ec4aba235b0ae25bb3261bf400cd30efe11de0c4330e4

    SHA512

    dc55452698966b77c157a81eb458984b17e3e3a0d3ff885479f7c823b847eb739a07782f140ced12eac75fdddd7416f923c885a9d8e8b0a10010fc07bef3da45

  • C:\Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    1.8MB

    MD5

    9c842288aefe97836f56d6b20b078ff8

    SHA1

    4c28b0112195a5181891022fd999fc8a6236a842

    SHA256

    8d048151cefb7b07d4b00704fcc858d22c7501d1692902ea363678ad50db603e

    SHA512

    4e20b932b11b0c5cbce221c1eb947e7b3ddb68d5ad9d5153c713e55d11dde7482ae3164d57b20b7c82015bfcdbcc6c2d579544b324ff3662e207185200172eb0

  • C:\Users\Admin\AppData\Local\Temp\TarEEA8.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe

    Filesize

    1.6MB

    MD5

    8e17399c045f0e397c4611d4c9d33e02

    SHA1

    aac120429b61430ba2a3f618707cd6110604ceb8

    SHA256

    78778cc786849a8bbbe5931c7c846bd5d759553a9e2b598eeebe018a81a3dea4

    SHA512

    a0c75717322a81c20bfc6a8045a80f4943d6b75ad5ba79265acbadbc5e39855592de655058bc895b1c5298ca9f5d3bcf0a573654c69925d0558cf87a957e21c1

  • C:\Users\Admin\AppData\Local\Temp\{7F40E~1\BoothMalthus.sys

    Filesize

    30KB

    MD5

    f8bfa19db73f27dbd2446260367e8ec6

    SHA1

    077cba2260fec8b5ed78a95e07e42083d4c0e8fb

    SHA256

    fb1c659f19dadfa4a8f86f45674dc9f20153234d9271a24449997c43007203ac

    SHA512

    817c4f67bbbc621ee3a3b7686d2f7b3d64701cdfffe23b44cbd63131fa75e1b99bcd3cf8002a43e65ee1f963004c92de9942d507d7db9bc78f8648e12b14f5d6

  • C:\Users\Admin\AppData\Local\Temp\{7f40ee13-6330-5613-a60d-23167588bb19}\BoothMalthus.cat

    Filesize

    9KB

    MD5

    42ed8315f9e8f83ffaf05eff07f2c8cb

    SHA1

    f64a686f070d4fa771390af0f9588074ad74f7fb

    SHA256

    fdcf322c6ad729782b4cd954990c502e4b703f24c19146cdd078c2c0d7af764f

    SHA512

    31c93ef2cd67299073e9478ece83663c1fd2d7b3ebcbff762770e83260ca8951c16872f5f7fedab345ac184bfa5cb50dfd4b2dd93f6bd71a9b55c640cc296a88

  • C:\Users\Admin\AppData\Local\Temp\{7f40ee13-6330-5613-a60d-23167588bb19}\boothmalthus.inf

    Filesize

    3KB

    MD5

    776f3ea7afee2a21018ec6e46c8f1768

    SHA1

    761d8bc0bd5c26c2a6b6bf52e1603c95893cd76b

    SHA256

    fb039a0d4a1a352d53b35572f0e1c5582ddc80736fcdc03197576c7254bd922e

    SHA512

    671c9f45c9afab432e0b6bbff011d94374ac33c4517fce0216b5de79f6a20c97e6aedcb217c75f70cc89ba17d798e48fa4bbdc28c49cd9b2665e3086b24afe4c

  • C:\Users\Admin\AppData\Local\Temp\{7f40ee13-6330-5613-a60d-23167588bb19}\boothmalthus.inf

    Filesize

    3KB

    MD5

    776f3ea7afee2a21018ec6e46c8f1768

    SHA1

    761d8bc0bd5c26c2a6b6bf52e1603c95893cd76b

    SHA256

    fb039a0d4a1a352d53b35572f0e1c5582ddc80736fcdc03197576c7254bd922e

    SHA512

    671c9f45c9afab432e0b6bbff011d94374ac33c4517fce0216b5de79f6a20c97e6aedcb217c75f70cc89ba17d798e48fa4bbdc28c49cd9b2665e3086b24afe4c

  • C:\Windows\System32\DriverStore\Temp\{0140a352-4835-2b52-94a1-0a4727eb6025}\BoothMalthus.cat

    Filesize

    9KB

    MD5

    42ed8315f9e8f83ffaf05eff07f2c8cb

    SHA1

    f64a686f070d4fa771390af0f9588074ad74f7fb

    SHA256

    fdcf322c6ad729782b4cd954990c502e4b703f24c19146cdd078c2c0d7af764f

    SHA512

    31c93ef2cd67299073e9478ece83663c1fd2d7b3ebcbff762770e83260ca8951c16872f5f7fedab345ac184bfa5cb50dfd4b2dd93f6bd71a9b55c640cc296a88

  • C:\Windows\System32\DriverStore\Temp\{0140a352-4835-2b52-94a1-0a4727eb6025}\SETF354.tmp

    Filesize

    9KB

    MD5

    42ed8315f9e8f83ffaf05eff07f2c8cb

    SHA1

    f64a686f070d4fa771390af0f9588074ad74f7fb

    SHA256

    fdcf322c6ad729782b4cd954990c502e4b703f24c19146cdd078c2c0d7af764f

    SHA512

    31c93ef2cd67299073e9478ece83663c1fd2d7b3ebcbff762770e83260ca8951c16872f5f7fedab345ac184bfa5cb50dfd4b2dd93f6bd71a9b55c640cc296a88

  • C:\Windows\System32\DriverStore\Temp\{0140a352-4835-2b52-94a1-0a4727eb6025}\SETF375.tmp

    Filesize

    30KB

    MD5

    f8bfa19db73f27dbd2446260367e8ec6

    SHA1

    077cba2260fec8b5ed78a95e07e42083d4c0e8fb

    SHA256

    fb1c659f19dadfa4a8f86f45674dc9f20153234d9271a24449997c43007203ac

    SHA512

    817c4f67bbbc621ee3a3b7686d2f7b3d64701cdfffe23b44cbd63131fa75e1b99bcd3cf8002a43e65ee1f963004c92de9942d507d7db9bc78f8648e12b14f5d6

  • C:\Windows\System32\DriverStore\Temp\{0140a352-4835-2b52-94a1-0a4727eb6025}\boothmalthus.inf

    Filesize

    3KB

    MD5

    776f3ea7afee2a21018ec6e46c8f1768

    SHA1

    761d8bc0bd5c26c2a6b6bf52e1603c95893cd76b

    SHA256

    fb039a0d4a1a352d53b35572f0e1c5582ddc80736fcdc03197576c7254bd922e

    SHA512

    671c9f45c9afab432e0b6bbff011d94374ac33c4517fce0216b5de79f6a20c97e6aedcb217c75f70cc89ba17d798e48fa4bbdc28c49cd9b2665e3086b24afe4c

  • C:\Windows\Temp\CabF394.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarF3C6.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \??\c:\users\admin\appdata\local\temp\FILEDE~1\x64\BOOTHM~1.SYS

    Filesize

    30KB

    MD5

    f8bfa19db73f27dbd2446260367e8ec6

    SHA1

    077cba2260fec8b5ed78a95e07e42083d4c0e8fb

    SHA256

    fb1c659f19dadfa4a8f86f45674dc9f20153234d9271a24449997c43007203ac

    SHA512

    817c4f67bbbc621ee3a3b7686d2f7b3d64701cdfffe23b44cbd63131fa75e1b99bcd3cf8002a43e65ee1f963004c92de9942d507d7db9bc78f8648e12b14f5d6

  • \??\c:\users\admin\appdata\local\temp\filedef2017f206\x64\BoothMalthus.cat

    Filesize

    9KB

    MD5

    42ed8315f9e8f83ffaf05eff07f2c8cb

    SHA1

    f64a686f070d4fa771390af0f9588074ad74f7fb

    SHA256

    fdcf322c6ad729782b4cd954990c502e4b703f24c19146cdd078c2c0d7af764f

    SHA512

    31c93ef2cd67299073e9478ece83663c1fd2d7b3ebcbff762770e83260ca8951c16872f5f7fedab345ac184bfa5cb50dfd4b2dd93f6bd71a9b55c640cc296a88

  • \Users\Admin\AppData\Local\Temp\FileDef2017F206\x64\devcon.exe

    Filesize

    87KB

    MD5

    41ba1bbdd9284e49701ee94a3f446c33

    SHA1

    6d5bd532a0f9a3bf7005edeb53b4aba2d30a0c99

    SHA256

    c65d9acba88d2c56422ec4aba235b0ae25bb3261bf400cd30efe11de0c4330e4

    SHA512

    dc55452698966b77c157a81eb458984b17e3e3a0d3ff885479f7c823b847eb739a07782f140ced12eac75fdddd7416f923c885a9d8e8b0a10010fc07bef3da45

  • \Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    1.8MB

    MD5

    9c842288aefe97836f56d6b20b078ff8

    SHA1

    4c28b0112195a5181891022fd999fc8a6236a842

    SHA256

    8d048151cefb7b07d4b00704fcc858d22c7501d1692902ea363678ad50db603e

    SHA512

    4e20b932b11b0c5cbce221c1eb947e7b3ddb68d5ad9d5153c713e55d11dde7482ae3164d57b20b7c82015bfcdbcc6c2d579544b324ff3662e207185200172eb0

  • \Users\Admin\AppData\Local\Temp\load.dll

    Filesize

    2.2MB

    MD5

    abde7ddcc7dca86700ccf9fd3fc25b11

    SHA1

    e2fabf760f8558db2b2cfcd0fda66948e74e7839

    SHA256

    4caed7de787af5c26e5091a2733888d5af8605b5851c5f177273b452eb7b02c4

    SHA512

    a5f7e5e7315701e07b64f3e6a5b5623f9eb31de61ca0de53c0456ed202d341ca839f9e3c6eb41dbae5dd5ddba7d28cd263e3c76a48b53591ba2d5573fdca44a5

  • \Users\Admin\AppData\Local\Temp\tmp.exe

    Filesize

    1.6MB

    MD5

    8e17399c045f0e397c4611d4c9d33e02

    SHA1

    aac120429b61430ba2a3f618707cd6110604ceb8

    SHA256

    78778cc786849a8bbbe5931c7c846bd5d759553a9e2b598eeebe018a81a3dea4

    SHA512

    a0c75717322a81c20bfc6a8045a80f4943d6b75ad5ba79265acbadbc5e39855592de655058bc895b1c5298ca9f5d3bcf0a573654c69925d0558cf87a957e21c1

  • \Windows\SysWOW64\DrvInDll.dll

    Filesize

    808KB

    MD5

    49570c3624fb6d1d1244bdd9115fcd52

    SHA1

    90702b103418c5de54af0cbcd7f1bdd83605b56a

    SHA256

    ce1860f54f32aa03004d96e72c969f6ca8f76450bf0cb39b62af5bdd554bf92c

    SHA512

    a7a0ac5fe5f362b171c08112955ed4afa27300926ad7da3fc3be1e0a4175dfea6da07bd9b8f4285b2f58477f26add838c332f81481eca894e25fa3f74111abef

  • \Windows\SysWOW64\SkinH_EL.dll

    Filesize

    86KB

    MD5

    114054313070472cd1a6d7d28f7c5002

    SHA1

    9a044986e6101df1a126035da7326a50c3fe9a23

    SHA256

    e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1

    SHA512

    a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522

  • memory/844-202-0x0000000001C60000-0x0000000001C61000-memory.dmp

    Filesize

    4KB

  • memory/844-199-0x0000000001C60000-0x0000000001C61000-memory.dmp

    Filesize

    4KB

  • memory/2068-27-0x0000000010000000-0x0000000010FA2000-memory.dmp

    Filesize

    15.6MB

  • memory/2068-43-0x0000000000810000-0x000000000084E000-memory.dmp

    Filesize

    248KB

  • memory/2068-5-0x0000000002710000-0x0000000002A7C000-memory.dmp

    Filesize

    3.4MB

  • memory/2068-41-0x0000000010000000-0x0000000010FA2000-memory.dmp

    Filesize

    15.6MB

  • memory/2068-39-0x00000000038D0000-0x000000000399B000-memory.dmp

    Filesize

    812KB

  • memory/2068-32-0x0000000002710000-0x0000000002A7C000-memory.dmp

    Filesize

    3.4MB

  • memory/2068-37-0x0000000003FC0000-0x0000000004E25000-memory.dmp

    Filesize

    14.4MB

  • memory/2068-35-0x0000000000810000-0x000000000084E000-memory.dmp

    Filesize

    248KB

  • memory/2068-16-0x0000000003FC0000-0x0000000004E25000-memory.dmp

    Filesize

    14.4MB

  • memory/2068-14-0x0000000003FC0000-0x0000000004E25000-memory.dmp

    Filesize

    14.4MB