Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 07:06

General

  • Target

    sysbin.exe

  • Size

    243KB

  • MD5

    efa25924138ef8e4ad1d6438fe9dcd59

  • SHA1

    629dfd73a63e9959ac4818042aec940b2ba3818a

  • SHA256

    d0977ae7f56174dba4e334241d1c91a11d5f5977e3f602947515c0eb98da8555

  • SHA512

    6ad59f237ec2b1764d0f166656fc3840439d9ce2cb809384fea9e65e51dead6ddd7e26e5d340f0b8a84fcde24c12af15994f9cb3eb14658b659b5d3bb61c7c7b

  • SSDEEP

    6144:T7kvUwPwxmnriXB3ggz43Nb8y0olOjIcQwGte:T7mP5riXB3K3hlZwGte

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 4 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sysbin.exe
    "C:\Users\Admin\AppData\Local\Temp\sysbin.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\SysWOW64\qjm07.exe
      "C:\Windows\system32\qjm07.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Windows\winsock.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 Shdocvw.dll /s
          4⤵
            PID:4592
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 Oleaut32.dll /s
            4⤵
            • Modifies registry class
            PID:5096
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 Actxprxy.dll /s
            4⤵
            • Modifies registry class
            PID:3860
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 Mshtml.dll /s
            4⤵
              PID:1108
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32 Urlmon.dll /s
              4⤵
              • Modifies registry class
              PID:2208
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32 browseui.dll /s
              4⤵
                PID:1428
              • C:\Windows\SysWOW64\regsvr32.exe
                regsvr32 /i /s Actxprxy.dll
                4⤵
                • Modifies registry class
                PID:1132
              • C:\Windows\SysWOW64\regsvr32.exe
                regsvr32 /i /s Browseui.dll
                4⤵
                  PID:4052
                • C:\Windows\SysWOW64\regsvr32.exe
                  regsvr32 /i /s Jscript.dll
                  4⤵
                    PID:4828
                  • C:\Windows\SysWOW64\regsvr32.exe
                    regsvr32 /i /s Shdocvw.dll
                    4⤵
                      PID:3792
                    • C:\Windows\SysWOW64\regsvr32.exe
                      regsvr32 /i /s Oleaut32.dll
                      4⤵
                      • Modifies registry class
                      PID:4796
                    • C:\Windows\SysWOW64\regsvr32.exe
                      regsvr32 /i /s Mshtml.dll
                      4⤵
                        PID:3180
                      • C:\Windows\SysWOW64\regsvr32.exe
                        regsvr32 /i /s Urlmon.dll
                        4⤵
                        • Drops file in Program Files directory
                        PID:3048
                      • C:\Windows\SysWOW64\regsvr32.exe
                        regsvr32 /i /s Vbscript.dll
                        4⤵
                          PID:3308
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh winsock reset
                          4⤵
                            PID:4596
                        • C:\WINDOWS\temp\rlhjghsf.exe
                          "C:\WINDOWS\temp\rlhjghsf.exe"
                          3⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3704
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Windows\winsock.bat" "
                            4⤵
                            • Suspicious use of WriteProcessMemory
                            PID:400
                            • C:\Windows\SysWOW64\regsvr32.exe
                              regsvr32 Shdocvw.dll /s
                              5⤵
                                PID:3488
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 Oleaut32.dll /s
                                5⤵
                                • Modifies registry class
                                PID:2068
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 Actxprxy.dll /s
                                5⤵
                                • Modifies registry class
                                PID:3760
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 Mshtml.dll /s
                                5⤵
                                  PID:3756
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  regsvr32 Urlmon.dll /s
                                  5⤵
                                    PID:1632
                                  • C:\Windows\SysWOW64\regsvr32.exe
                                    regsvr32 browseui.dll /s
                                    5⤵
                                      PID:4980
                                    • C:\Windows\SysWOW64\regsvr32.exe
                                      regsvr32 /i /s Actxprxy.dll
                                      5⤵
                                      • Modifies registry class
                                      PID:5092
                                    • C:\Windows\SysWOW64\regsvr32.exe
                                      regsvr32 /i /s Browseui.dll
                                      5⤵
                                        PID:4060
                                      • C:\Windows\SysWOW64\regsvr32.exe
                                        regsvr32 /i /s Jscript.dll
                                        5⤵
                                        • Modifies registry class
                                        PID:804
                                      • C:\Windows\SysWOW64\regsvr32.exe
                                        regsvr32 /i /s Shdocvw.dll
                                        5⤵
                                          PID:4692
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          regsvr32 /i /s Oleaut32.dll
                                          5⤵
                                            PID:2980
                                          • C:\Windows\SysWOW64\regsvr32.exe
                                            regsvr32 /i /s Mshtml.dll
                                            5⤵
                                              PID:4684
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              regsvr32 /i /s Urlmon.dll
                                              5⤵
                                              • Drops file in Program Files directory
                                              PID:1252
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              regsvr32 /i /s Vbscript.dll
                                              5⤵
                                                PID:968
                                              • C:\Windows\SysWOW64\netsh.exe
                                                netsh winsock reset
                                                5⤵
                                                  PID:3564
                                              • C:\WINDOWS\temp\ccnhdpdh.exe
                                                "C:\WINDOWS\temp\ccnhdpdh.exe"
                                                4⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:392
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Windows\winsock.bat" "
                                                  5⤵
                                                    PID:4356
                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                      regsvr32 Shdocvw.dll /s
                                                      6⤵
                                                        PID:3788
                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                        regsvr32 Oleaut32.dll /s
                                                        6⤵
                                                          PID:1348
                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                          regsvr32 Actxprxy.dll /s
                                                          6⤵
                                                          • Modifies registry class
                                                          PID:4872
                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                          regsvr32 Mshtml.dll /s
                                                          6⤵
                                                            PID:1228
                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                            regsvr32 Urlmon.dll /s
                                                            6⤵
                                                              PID:4288
                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                              regsvr32 browseui.dll /s
                                                              6⤵
                                                                PID:4760
                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                regsvr32 /i /s Actxprxy.dll
                                                                6⤵
                                                                • Modifies registry class
                                                                PID:2316
                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                regsvr32 /i /s Browseui.dll
                                                                6⤵
                                                                  PID:2016
                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                  regsvr32 /i /s Jscript.dll
                                                                  6⤵
                                                                    PID:4020
                                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                                    regsvr32 /i /s Shdocvw.dll
                                                                    6⤵
                                                                      PID:1444
                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                      regsvr32 /i /s Oleaut32.dll
                                                                      6⤵
                                                                      • Modifies registry class
                                                                      PID:1152
                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                      regsvr32 /i /s Mshtml.dll
                                                                      6⤵
                                                                        PID:368
                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                        regsvr32 /i /s Urlmon.dll
                                                                        6⤵
                                                                        • Drops file in Program Files directory
                                                                        • Modifies registry class
                                                                        PID:4528
                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                        regsvr32 /i /s Vbscript.dll
                                                                        6⤵
                                                                          PID:2104
                                                                        • C:\Windows\SysWOW64\netsh.exe
                                                                          netsh winsock reset
                                                                          6⤵
                                                                            PID:2208
                                                                        • C:\WINDOWS\temp\sflpltre.exe
                                                                          "C:\WINDOWS\temp\sflpltre.exe"
                                                                          5⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Drops file in Windows directory
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3920
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Windows\winsock.bat" "
                                                                            6⤵
                                                                              PID:4760
                                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                                regsvr32 Shdocvw.dll /s
                                                                                7⤵
                                                                                  PID:4020
                                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                                  regsvr32 Oleaut32.dll /s
                                                                                  7⤵
                                                                                  • Modifies registry class
                                                                                  PID:2888
                                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                                  regsvr32 Actxprxy.dll /s
                                                                                  7⤵
                                                                                  • Modifies registry class
                                                                                  PID:964
                                                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                                                  regsvr32 Mshtml.dll /s
                                                                                  7⤵
                                                                                    PID:3884
                                                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                                                    regsvr32 Urlmon.dll /s
                                                                                    7⤵
                                                                                      PID:3040
                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                      regsvr32 browseui.dll /s
                                                                                      7⤵
                                                                                        PID:2756
                                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                                        regsvr32 /i /s Actxprxy.dll
                                                                                        7⤵
                                                                                        • Modifies registry class
                                                                                        PID:4428
                                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                                        regsvr32 /i /s Browseui.dll
                                                                                        7⤵
                                                                                          PID:4040
                                                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                                                          regsvr32 /i /s Jscript.dll
                                                                                          7⤵
                                                                                          • Modifies registry class
                                                                                          PID:1740
                                                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                                                          regsvr32 /i /s Shdocvw.dll
                                                                                          7⤵
                                                                                            PID:948
                                                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                                                            regsvr32 /i /s Oleaut32.dll
                                                                                            7⤵
                                                                                              PID:2104
                                                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                                                              regsvr32 /i /s Mshtml.dll
                                                                                              7⤵
                                                                                                PID:4564
                                                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                regsvr32 /i /s Urlmon.dll
                                                                                                7⤵
                                                                                                • Drops file in Program Files directory
                                                                                                • Modifies registry class
                                                                                                PID:4068
                                                                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                regsvr32 /i /s Vbscript.dll
                                                                                                7⤵
                                                                                                  PID:660
                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                  netsh winsock reset
                                                                                                  7⤵
                                                                                                    PID:2300
                                                                                        • C:\Windows\SysWOW64\zhiqiang.exe
                                                                                          "C:\Windows\system32\zhiqiang.exe"
                                                                                          2⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:3452

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Users\Admin\AppData\Local\Temp\RGI4B22.tmp

                                                                                        Filesize

                                                                                        24KB

                                                                                        MD5

                                                                                        cd869882781c4e12e060e4f37acebf5a

                                                                                        SHA1

                                                                                        309699a62d057c8bb204972315ca4055136d7754

                                                                                        SHA256

                                                                                        b3cbc765b736cfd5f3ab80797afaa5dc908620301c370ea8e446fe6165d0ea5f

                                                                                        SHA512

                                                                                        29d15b82922f401c9549e29a13c7a8dd69ce302bc4822d12e56e86150fb4d7f2cc636018d863458a512735d1fc30e80d35f1e36be66d4ecc78b3b29352f3d830

                                                                                      • C:\WINDOWS\temp\qjmlol.mod

                                                                                        Filesize

                                                                                        138B

                                                                                        MD5

                                                                                        337b617543bb3988de686777deea254e

                                                                                        SHA1

                                                                                        6d6c1e731493b8f74ebed008b6f4476dbe3e4b98

                                                                                        SHA256

                                                                                        280bbf0bc6b426b0871bd915ba7c30f5176e972298e239269f3a5317418cc9f1

                                                                                        SHA512

                                                                                        52120f8dabdc82fd2d6fe22e81df45e6d6d5ade1c3f75560de53c8f065d990d9392e7babc21f8cf9a56f9ef10289fee73b0b9cd811d7fb201d586084771831d9

                                                                                      • C:\Windows\SysWOW64\qjm07.exe

                                                                                        Filesize

                                                                                        48KB

                                                                                        MD5

                                                                                        3dff4966b98db76c29332f5af212f953

                                                                                        SHA1

                                                                                        a18e26538ad1e859d48fccc7a8eb34565d31905c

                                                                                        SHA256

                                                                                        4decebff176d2bd0cf735540515be354a9af5cfae6fdd04dc4be3f52724e667c

                                                                                        SHA512

                                                                                        26b22c937136d51e140f300e79700992ef319e72478953d0ceb5b6738610058016ff965363c190987c8910b46eeaf5f1bec71bda988e739bdeb31d7a23018cf9

                                                                                      • C:\Windows\SysWOW64\zhiqiang.exe

                                                                                        Filesize

                                                                                        102KB

                                                                                        MD5

                                                                                        082adffc8560da3d7481210fb4eb420c

                                                                                        SHA1

                                                                                        5ce1464ad8473227682f3efc577a10e203bd0f32

                                                                                        SHA256

                                                                                        cdea3fb91fcdbfabe7beaa18147cea09785dfc0b54ac0840d5de1054e8db66be

                                                                                        SHA512

                                                                                        72ab3d8cc846d2607baa9125554fbb4602247bbe027fb22a3c3bcfed57cbf8860f134f1d36676bc654eb28a7f537c2bfe3c8a45eeae533549502d522159ed8fe

                                                                                      • C:\Windows\winsock.bat

                                                                                        Filesize

                                                                                        396B

                                                                                        MD5

                                                                                        262648df5864c7e8f3fa4db879f54e77

                                                                                        SHA1

                                                                                        2383c834093a2ffe7895d12b1a3a83e84028249b

                                                                                        SHA256

                                                                                        8fac7b1e6cffea6c2f2b2865edce80888998f4c9b02fc0447be684e354a96a06

                                                                                        SHA512

                                                                                        7b6b931d656aece66b231c50163172768353f016dd5e8f371470a25561dc29c0773ad4d928b12ad43d8681441a3c0e30d72b347939d6314e4b6532a06f230e70

                                                                                      • memory/392-137-0x0000000000400000-0x0000000000421000-memory.dmp

                                                                                        Filesize

                                                                                        132KB

                                                                                      • memory/2888-0-0x0000000000400000-0x0000000000419000-memory.dmp

                                                                                        Filesize

                                                                                        100KB

                                                                                      • memory/2888-17-0x0000000000400000-0x0000000000419000-memory.dmp

                                                                                        Filesize

                                                                                        100KB

                                                                                      • memory/3452-18-0x0000000000400000-0x000000000054F000-memory.dmp

                                                                                        Filesize

                                                                                        1.3MB

                                                                                      • memory/3452-47-0x0000000000400000-0x000000000054F000-memory.dmp

                                                                                        Filesize

                                                                                        1.3MB

                                                                                      • memory/3704-91-0x0000000000400000-0x0000000000421000-memory.dmp

                                                                                        Filesize

                                                                                        132KB

                                                                                      • memory/4688-50-0x0000000000400000-0x0000000000421000-memory.dmp

                                                                                        Filesize

                                                                                        132KB