Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 17:36

General

  • Target

    e5787d569b75831ea697588c6a6bd7147c7d6966deaa6b0900d698c2e6018c99.exe

  • Size

    4.5MB

  • MD5

    a7e74b4d48eb00c24188bfbef6c6f53d

  • SHA1

    814fa2e8cb97af650f6128e2a96658096aeb24c1

  • SHA256

    e5787d569b75831ea697588c6a6bd7147c7d6966deaa6b0900d698c2e6018c99

  • SHA512

    d9249519291d162d09946abb561b7e2a0d526d26714208c98086c514778934e09ca6939651310b853db8a46703878fa782df692860971c7c17536a0d7f2af574

  • SSDEEP

    49152:xNIlaFEedDqnroHO8wOZHOlvbuambSIN+6a9AknH:xNIccnsHtvZHUbmb/+TK

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 26 IoCs
  • Drops file in Drivers directory 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5787d569b75831ea697588c6a6bd7147c7d6966deaa6b0900d698c2e6018c99.exe
    "C:\Users\Admin\AppData\Local\Temp\e5787d569b75831ea697588c6a6bd7147c7d6966deaa6b0900d698c2e6018c99.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\e5787d569b75831ea697588c6a6bd7147c7d6966deaa6b0900d698c2e6018c99.exe
      "C:\Users\Admin\AppData\Local\Temp\e5787d569b75831ea697588c6a6bd7147c7d6966deaa6b0900d698c2e6018c99.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.30my.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17d3d5fd4cf7af57f76d30c2f5efa4dd

    SHA1

    5995e2f6e8d8ebb025d7cb1df9ad8c9229290e01

    SHA256

    4791e3934ac7e1f15a48308200f7b8173c5261a49308b81386ee00ae259ee0a9

    SHA512

    829b2cff4e79591616d411a9e4db8ea8a05eecd1a52c503cd103d25f3013474b22519c0a0f4375e8263457a4e303f0e7a916af427cbc19efcb005c98e5ca007b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    40085a41c013f53e894b25c41edc0ba9

    SHA1

    3abaddff340b2927b76491e1ed3c83625a1919ec

    SHA256

    1769b791f9b231aafbaa5f6f9f63bfc699da6b6a73b3f76ed84f6eedb062f328

    SHA512

    da6965593823ec21e21b4c13d773790a72acfe4e5acd9c80a9e55f629fc315d2b1c0e8d77bbd2c18aa0ac5540faa46345a3bc811de1302ea668ff43f4d958281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23e1421aaebdc2d56d3c2f771a95edce

    SHA1

    dde8b65abaffbe3cc0c2d664778d0397d6513340

    SHA256

    3409cd54a2ad65f055da4852033e4de70008ac1bdd2414b76c14cd20045ca149

    SHA512

    4f8fe90a1b7db81c617377e4094b624421cc1adb2ee6527861b179c79a4b748d6dfcab81975afcbc7a5002d2659731df9352b8a437ac072b99662a191442b27c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9e1e2648d5b6ced6d1baf1e22f4452d

    SHA1

    c312d8e6c467affcde5b46aece8311df116d0dd2

    SHA256

    cd8ada7916edddb6add265b4ac4ad9ce64ce0b214d20e5a4cc707fa5e337efd2

    SHA512

    23ca42c4c377915a855b170831c33719266f9ae9ea2d86f4de8ad3ce5d6f7ffd8ad509325127b81c290bb466733655ec678117581d629366f4e26aa0f1783a3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d978ff2339f71a0814d89dd50654a6c

    SHA1

    00dc904c46843a7c89218cf4e8bffe69dde76bf8

    SHA256

    fa989c036e6a059cd5d81c995e00f68756c154787f30e12d4319ddcb4413f179

    SHA512

    605cc9be11b5e50678f8020d5d090910c7d7d2863ecd57e024f8cf9a8bafc6e5ead979c6fadc1d66f000da05577333030d9cd6faf66a2f9cf9695bdfc059233f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00d5482ff4a973193f3366e2fe2cabae

    SHA1

    f86f799b09f6abbd97c181c9fbf675d8bfb70b7e

    SHA256

    059fbbb6dbbee596b11ee603defe4b76e9251c01473ee0c9b508586c691aa8ce

    SHA512

    b242abaf3204bd63e0d3adbb46f9481edd244e4fcf328c0e9d35a34cb1f4bdb5d146f922202fdb345e0ed8467a58bbf60c1f050c4d7efcc952bbcb00ad070b15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2a7eec82add666e8ecea558b64c28b6

    SHA1

    1f58ef6aa64d77ccce019e3702f357ce4292f6f0

    SHA256

    9bf1ec7afe22813da9f82c4c2ea0481581272c9360367e97529f8282c66016f7

    SHA512

    1cf237f29de40a510e04c8d62506f7daa1be3a58c48c4d6df4dae72f5140e4a3dfd07b946dc2daa1ee06d167486de102dae63b4142ef6a441c3411416762dd54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcee3e0159bc065773e0abe1f63bd6e1

    SHA1

    93e53ae84cc1a3984a8acc5b4d212c782fa8c71a

    SHA256

    2ce78ecccb9f19defea398e4d8bc793a93ce25e985cc578070fc2dcaac05589d

    SHA512

    01e026f043bc9e7aafc6964014e66edba9188626763a3d0a09537a1d338a0a76ad2fbdc50524f88a753733bf8b3fd88740c984aecdd5f2b9eccfee8556697403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68e13397848490b4e28b1e65b1cbbc51

    SHA1

    7b68ef85511b089e8d5ea94866623064011c58a3

    SHA256

    b7a32e2416281f34fad3e7a4a44c4e6490975fd98ee8c7f29a384b1bdd59501e

    SHA512

    09d4a0e420b08f520a9cfc56d96bbeeb1d1562ca97ff5ff0ccb8004dd7a470a0e098a6b164ddf0260b157d4b2b0da47c4d00cfb9625767e350affe6e0f7750bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3622a84847bf933244efbb5066ccda4

    SHA1

    a45ccc2c5c3a878ec83c59a4527771b52c8e95ad

    SHA256

    f28a5dab51d0bdd1b16c86705c5794a4c5947bbdfa2a8d57508b317418337022

    SHA512

    fa63f06d2c58608cdec1bd0bcb19a4384f000810b401f58e7b4f40080a9d69055fb2e8ffe01b9df9183d119f51b9dfe83c06a908404c5afc5f12eb5b4d066561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    621af4a57e4c9d049b4d12932835d77f

    SHA1

    914964a8c64b4e925e07e7a8b4dee9afe7fc180c

    SHA256

    4c386ba4a547d02f67e51f1526fae2608be8d3fc6bf61c8be302e97798f6bca7

    SHA512

    570e0255129f653a672fd58dff5398b2376e354b6b70f1420b28a450646382207d8b2ebe68c16cf1fca54512c8f490bfec13099d58b6358e3883559b505cf0e5

  • C:\Users\Admin\AppData\Local\Temp\Cab3390.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar33F1.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\Desktop\ħÓò·¢²¼Íø.url

    Filesize

    120B

    MD5

    5c8c7c3ce78aa0a9d56f96ab77676682

    SHA1

    1a591e2d34152149274f46d754174aa7a7bb2694

    SHA256

    40a172493bd1337c6bfd9c0af15be6d6e5d539135dd766577a05362e859ff806

    SHA512

    8ef03cf1967157cf019d1e7b585a45042642d5a1d82c90ef68f1256e40fe162460e7c26919b1fdf8c33de9f95201ee6a13e69676436d7251a017c04fdf047a77

  • C:\Windows\SysWOW64\msvcp30.ini

    Filesize

    18B

    MD5

    2cd7883782c594d2e2654f8fe988fcbe

    SHA1

    042bcb87c29e901d70c0ad0f8fa53e0338c569fc

    SHA256

    aa98ce751ef6ac5401a9278f30c06e250dbbd5e8c2e2c378b0fdf33a205d7037

    SHA512

    88413dc63847682207d2b1e6cdfcb3de9cc73da5f900a1948e4aa262da20056bcb2486ee8a7c8a4f9b0aa3fdff6b99061262fbc67aebc99bf0b42e5bfc7db360

  • C:\Windows\msvcp30.ico

    Filesize

    264KB

    MD5

    bdccf3c42497089ae7001328305906ed

    SHA1

    cf6f28e09d98ebe516b408e6b15f03f5891fdc79

    SHA256

    5f191e3486c0bafdd237f8b79f6ce0f69d1f8c9f8c948d14ab061db36286b2f2

    SHA512

    d7876d8d414ca48903393aa523296ffe35bfa3c6b5bfc4ce70adfc93d31efa61a9bfeea571754cde2e205416e57c13df5c45551b5e6aae6eb53b951065ebbf5d

  • \Windows\SysWOW64\msvcp30.dll

    Filesize

    93KB

    MD5

    a6c4f055c797a43def0a92e5a85923a7

    SHA1

    efaa9c3a065aff6a64066f76e7c77ffcaaf779b2

    SHA256

    73bd285ac6fba28108cdc0d7311e37c4c4fc3ba7d0069c4370778ac3099e21a9

    SHA512

    d8120f7f59c212867c78af42f93db64d35f2d6eae7fc09021c0a6d8ca71a14bd2b2a3006027094ee2edcf65634dcdb3ac96da3ac810171fff021bed4c4254957

  • memory/1648-103-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

    Filesize

    4KB

  • memory/1648-89-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-109-0x0000000074E40000-0x0000000074E7C000-memory.dmp

    Filesize

    240KB

  • memory/1648-104-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-53-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-73-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-82-0x0000000000B10000-0x0000000000B21000-memory.dmp

    Filesize

    68KB

  • memory/1648-86-0x0000000074E40000-0x0000000074E7C000-memory.dmp

    Filesize

    240KB

  • memory/1648-94-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-72-0x0000000000B10000-0x0000000000B21000-memory.dmp

    Filesize

    68KB

  • memory/1648-71-0x0000000000B10000-0x0000000000B21000-memory.dmp

    Filesize

    68KB

  • memory/1648-68-0x0000000000B10000-0x0000000000B21000-memory.dmp

    Filesize

    68KB

  • memory/1648-64-0x0000000000B00000-0x0000000000B0F000-memory.dmp

    Filesize

    60KB

  • memory/1648-63-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-91-0x0000000074E40000-0x0000000074E7C000-memory.dmp

    Filesize

    240KB

  • memory/1648-58-0x00000000021E0000-0x000000000240F000-memory.dmp

    Filesize

    2.2MB

  • memory/1648-59-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2236-2-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-39-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-52-0x0000000074E40000-0x0000000074E7C000-memory.dmp

    Filesize

    240KB

  • memory/2236-12-0x00000000003A0000-0x00000000003AF000-memory.dmp

    Filesize

    60KB

  • memory/2236-11-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-0-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-50-0x0000000000400000-0x0000000000891000-memory.dmp

    Filesize

    4.6MB

  • memory/2236-49-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-35-0x0000000074E40000-0x0000000074E7C000-memory.dmp

    Filesize

    240KB

  • memory/2236-33-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-48-0x0000000002860000-0x0000000002861000-memory.dmp

    Filesize

    4KB

  • memory/2236-34-0x0000000000400000-0x0000000000891000-memory.dmp

    Filesize

    4.6MB

  • memory/2236-36-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-16-0x00000000008E0000-0x00000000008F1000-memory.dmp

    Filesize

    68KB

  • memory/2236-19-0x00000000008E0000-0x00000000008F1000-memory.dmp

    Filesize

    68KB

  • memory/2236-20-0x00000000008E0000-0x00000000008F1000-memory.dmp

    Filesize

    68KB

  • memory/2236-29-0x00000000008E0000-0x00000000008F1000-memory.dmp

    Filesize

    68KB

  • memory/2236-30-0x0000000074E40000-0x0000000074E7C000-memory.dmp

    Filesize

    240KB

  • memory/2236-21-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-1-0x0000000002270000-0x000000000249F000-memory.dmp

    Filesize

    2.2MB

  • memory/2236-3-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB