Analysis

  • max time kernel
    145s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 14:34

General

  • Target

    76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91.exe

  • Size

    3.2MB

  • MD5

    9ea52ef5ec83ec48d5cea56c7bf00cfc

  • SHA1

    0d729d82acab6dceefee8080df326ee3489e8009

  • SHA256

    76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91

  • SHA512

    34253e663008216b3f266ac67bfffaa1fc9be8f744a4d1d9e8da00329ccf60437d3621282e4eac9b09fe95934e3686799e9e5a939a36e31adc4763fca55e7b0c

  • SSDEEP

    98304:xBAM4MoPNy6dtmtmVfyKtg4ooc3Lcv7H:tHyd4teZRxcbcv7

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 13 IoCs
  • Detected phishing page
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91.exe
    "C:\Users\Admin\AppData\Local\Temp\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ].exe
      C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ].exe -t 2256 C:\Users\Admin\AppData\Local\Temp\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe
        C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4576
      • C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\DDDǧ¡ÌÓð¡Þ³Á¡ùĬAAA2.exe
        C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\DDDǧ¡ÌÓð¡Þ³Á¡ùĬAAA2.exe
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del "C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\*ǧ¡ÌÓð¡Þ³Á¡ùĬAAA2.exe"
          4⤵
            PID:4908
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c del "C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\*.dll"
            4⤵
              PID:4932
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 2948
              4⤵
              • Program crash
              PID:2480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3988 -ip 3988
        1⤵
          PID:812

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B70478C503EFF9D849F66D2FFA74BEB

          Filesize

          471B

          MD5

          3daa5eb17628d0804383c3626ebaea78

          SHA1

          2f2e2a80fee44c2f79b2457988c3b23fe2af0fc4

          SHA256

          a59a4b8a7269c4ee320cd2b0a205fd55b2a130a4130e7a438e92e3006ec47fb0

          SHA512

          6397ab3a0173e6ae9ede6fc5af275a497b88a22a44f884633201127a4504bd9e7672010605bd91757ef0f9ed14ac889cbf6e8c29a15e8f17ca90a2a1f9b9c4f0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

          Filesize

          471B

          MD5

          cf87f981717a6705d2c8540758e36c97

          SHA1

          108e602fc8ee486a3fa8dba2c7b165373739711a

          SHA256

          e87acd9782b207cfec66fdc94d1e55bbc5b02cd9ab1ac8288efd3f7fcf06e41f

          SHA512

          748d4ab112bc1943f0160214599462512b9baa9d101edf6348f6ed00aede2c328485ac4c71ed2838608ca8890e0bfac67a47afe08075b3602974e3174c0a2038

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B70478C503EFF9D849F66D2FFA74BEB

          Filesize

          404B

          MD5

          7116007e75e5de59373ccf8cacc1e2b8

          SHA1

          3e2a91fc4d821dafd501e6920239143453d9c110

          SHA256

          963ef4f45e95633c6de5b3ab1b4ba63a894ba5f06c252b976b1e213f13665606

          SHA512

          5b0a7f8b32dd372cf4dea80534aee3f600dd72864391e6439cff1fe061cce5822e42bc72c3e82777cf6f47ec5919f28d5ce5b50a4a612dc7b5a4b12763a7da8e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

          Filesize

          404B

          MD5

          0467520b0d86ea92bfa6a337f4096066

          SHA1

          cb9baad9ba090f5045b610b9eacb0d76e68d945d

          SHA256

          f6beb1daec1b24fbdcab63ba177ab796a7acc16e634ddbbdfb843ce820edb0db

          SHA512

          98e46fecd1dc0e269e936b4cd3c04ba5cf5d93b5fd9e70eaa098c710d85c20b7217f06c9dd99343486267d11d52c66877eb71482e626c88d64d57931058467db

        • C:\Users\Admin\AppData\Local\Temp\DDDǧ¡ÌÓð¡Þ³Á¡ùĬAAA2.exepack.tmp

          Filesize

          2KB

          MD5

          79d7556a9357df417700e8aff8b94faf

          SHA1

          977d72e90c0a018f5ab4d8b10dc8cf332e6de28d

          SHA256

          2022c1785cb8715aad939887b80a955c4ed0dc4439d344bfe60f0dfb8837e61a

          SHA512

          830e5d86974bcdad0a4b59958a3b78a413dc275cb4448053d15f323dac631bd35686298f13801a4ab3a88b1d19065106b003632241c63eacd99f975e835df8a3

        • C:\Users\Admin\AppData\Local\Temp\b09aa6ffa16c1420de275d1b07a101e2.ini

          Filesize

          1KB

          MD5

          826c9104cae17272761bd2e78b1675db

          SHA1

          7de9915f3ceeb0d587c6c2a203ece44c9338112c

          SHA256

          4da9cbc5c18a570343d6d30cdf5588271cab1a84426e95ce8b32675c5bfe4f88

          SHA512

          13632f0a6f1de2961d0f666622a845acfbab6102eda392f2ea7555a89be424d469f733b3915b1c9e8dd19b5dcd57f066a52fb5dff04c2a1252412424e793ba0a

        • C:\Users\Admin\AppData\Local\Temp\b09aa6ffa16c1420de275d1b07a101e2A.ini

          Filesize

          1KB

          MD5

          2db14a710301beaaff48132a3e982de8

          SHA1

          6445a92dd25756983ae1eaa1dd188f8e87036421

          SHA256

          7b78669932edd36e6758351c3756ce442fd1652754b8617150a9c5feaf069928

          SHA512

          9240c8da51ba397b0598dbf69f922da0f53741dd8a3a47661be7497681a5ccbeb6a1c502bdd799af6165797ff6eaf1bf63b889d2e1e7116078bc154f49a09956

        • C:\Users\Admin\AppData\Local\Temp\bakdel.dat

          Filesize

          102B

          MD5

          19559a9fad147bc1cf2384c516d30721

          SHA1

          e41de288c1ab0fc8f61a7b07b642c61bbea54511

          SHA256

          9dd11584c62c22d694944c1353335ae6037b249497350dd22cf4b001e5867487

          SHA512

          7cf8c8f1a79acc066c54f3a3bd51aea3263b34f074f9cf78fd6d0858b3a8f96d4dba81f25cac314267f9efac2c25efa484c629e5e3f7c05769c1ea6dadaa46a6

        • C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ].exe

          Filesize

          3.2MB

          MD5

          9ea52ef5ec83ec48d5cea56c7bf00cfc

          SHA1

          0d729d82acab6dceefee8080df326ee3489e8009

          SHA256

          76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91

          SHA512

          34253e663008216b3f266ac67bfffaa1fc9be8f744a4d1d9e8da00329ccf60437d3621282e4eac9b09fe95934e3686799e9e5a939a36e31adc4763fca55e7b0c

        • C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ].exe

          Filesize

          3.2MB

          MD5

          9ea52ef5ec83ec48d5cea56c7bf00cfc

          SHA1

          0d729d82acab6dceefee8080df326ee3489e8009

          SHA256

          76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91

          SHA512

          34253e663008216b3f266ac67bfffaa1fc9be8f744a4d1d9e8da00329ccf60437d3621282e4eac9b09fe95934e3686799e9e5a939a36e31adc4763fca55e7b0c

        • C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\DDDǧ¡ÌÓð¡Þ³Á¡ùĬAAA2.exe

          Filesize

          20.8MB

          MD5

          ed8c3f67c4a04ec64b844fd86738b831

          SHA1

          27a1238c60bf5ec3b836f26cc3cfab74ccd62b3e

          SHA256

          1b9b136409e38ad4dcd775200d150df3f18e4a8b4cc7fa76142bc1661bd534b7

          SHA512

          76d9eda2648f786d9d26a52a2e7468848da3c35391246bd62a1d6e2392ae1bf533527cdd33e233d9096344575b13cfbd70ea9c68094b1c2e09665f84c84386a9

        • C:\Users\Admin\AppData\Roaming\genwangame\76e2ca5bcfc5aee84a8a776bd9f9742eb78ac59e3d77bcf81407dd0a26628b91[ʵ]\DDDǧ¡ÌÓð¡Þ³Á¡ùĬAAA2.exe

          Filesize

          20.8MB

          MD5

          ed8c3f67c4a04ec64b844fd86738b831

          SHA1

          27a1238c60bf5ec3b836f26cc3cfab74ccd62b3e

          SHA256

          1b9b136409e38ad4dcd775200d150df3f18e4a8b4cc7fa76142bc1661bd534b7

          SHA512

          76d9eda2648f786d9d26a52a2e7468848da3c35391246bd62a1d6e2392ae1bf533527cdd33e233d9096344575b13cfbd70ea9c68094b1c2e09665f84c84386a9

        • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\ExuiKrnln_Win32.lib

          Filesize

          1.6MB

          MD5

          031ad1ecd93701d39265771942ec716c

          SHA1

          cb3ef507bf0e848894fbb96a29bfc94a0c302152

          SHA256

          9a7fde2ea7883701bf858e0daef74d787a31c3cbd9f1171cec0a3a382ee9e6ba

          SHA512

          374dab32b6304834c7acd8b5e6701ece016bf57d3abdd416ef2b63f7cbda24c9e59f9dfc27b6823ac6256bbab38aace74334dec7d57f1ef6cb9b80c239003bae

        • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\ExuiKrnln_Win32.lib

          Filesize

          1.6MB

          MD5

          031ad1ecd93701d39265771942ec716c

          SHA1

          cb3ef507bf0e848894fbb96a29bfc94a0c302152

          SHA256

          9a7fde2ea7883701bf858e0daef74d787a31c3cbd9f1171cec0a3a382ee9e6ba

          SHA512

          374dab32b6304834c7acd8b5e6701ece016bf57d3abdd416ef2b63f7cbda24c9e59f9dfc27b6823ac6256bbab38aace74334dec7d57f1ef6cb9b80c239003bae

        • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe

          Filesize

          4.1MB

          MD5

          b2a208ad9c8ab578361695fa88847521

          SHA1

          5ab3b67443675d1fe988fca4331098d3d500263c

          SHA256

          fdf583f197cb9889b63bb859c4026a4ca274ee9efceb6df371b0368608263199

          SHA512

          27ef782a8a47e29af3ff14eea1fd8df4b6004293dc6458a6f1fbcf5d0bcbb2bcf795e9cd82b2916839b83e891ab0ade287178900136e1e3e51492d72fc4bb24c

        • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe

          Filesize

          4.1MB

          MD5

          b2a208ad9c8ab578361695fa88847521

          SHA1

          5ab3b67443675d1fe988fca4331098d3d500263c

          SHA256

          fdf583f197cb9889b63bb859c4026a4ca274ee9efceb6df371b0368608263199

          SHA512

          27ef782a8a47e29af3ff14eea1fd8df4b6004293dc6458a6f1fbcf5d0bcbb2bcf795e9cd82b2916839b83e891ab0ade287178900136e1e3e51492d72fc4bb24c

        • memory/2256-1-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/2256-2-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/2256-3-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/2256-4-0x0000000010000000-0x0000000010059000-memory.dmp

          Filesize

          356KB

        • memory/2256-21-0x00000000033C0000-0x0000000003561000-memory.dmp

          Filesize

          1.6MB

        • memory/2256-5-0x00000000033C0000-0x0000000003561000-memory.dmp

          Filesize

          1.6MB

        • memory/2256-0-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/2256-18-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/3988-450-0x0000000000400000-0x0000000001F19000-memory.dmp

          Filesize

          27.1MB

        • memory/3988-75-0x0000000000400000-0x0000000001F19000-memory.dmp

          Filesize

          27.1MB

        • memory/3988-468-0x0000000000400000-0x0000000001F19000-memory.dmp

          Filesize

          27.1MB

        • memory/3988-464-0x0000000050000000-0x0000000050109000-memory.dmp

          Filesize

          1.0MB

        • memory/3988-451-0x00000000020B0000-0x00000000020B3000-memory.dmp

          Filesize

          12KB

        • memory/3988-86-0x0000000050000000-0x0000000050109000-memory.dmp

          Filesize

          1.0MB

        • memory/3988-82-0x0000000000400000-0x0000000001F19000-memory.dmp

          Filesize

          27.1MB

        • memory/3988-76-0x00000000020B0000-0x00000000020B3000-memory.dmp

          Filesize

          12KB

        • memory/4028-64-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-47-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-20-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-23-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-48-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-43-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-44-0x00000000033E0000-0x0000000003581000-memory.dmp

          Filesize

          1.6MB

        • memory/4028-45-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-87-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-88-0x0000000010000000-0x0000000010059000-memory.dmp

          Filesize

          356KB

        • memory/4028-89-0x00000000033E0000-0x0000000003581000-memory.dmp

          Filesize

          1.6MB

        • memory/4028-25-0x0000000010000000-0x0000000010059000-memory.dmp

          Filesize

          356KB

        • memory/4028-24-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-22-0x0000000000400000-0x00000000009BE000-memory.dmp

          Filesize

          5.7MB

        • memory/4028-26-0x00000000033E0000-0x0000000003581000-memory.dmp

          Filesize

          1.6MB

        • memory/4576-471-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-59-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-60-0x0000000000F30000-0x0000000000F33000-memory.dmp

          Filesize

          12KB

        • memory/4576-467-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-63-0x0000000010000000-0x0000000010059000-memory.dmp

          Filesize

          356KB

        • memory/4576-469-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-90-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-472-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-473-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-474-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-475-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-476-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB

        • memory/4576-477-0x0000000000400000-0x0000000000EDA000-memory.dmp

          Filesize

          10.9MB