Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 19:22

General

  • Target

    salikhack.exe

  • Size

    6.8MB

  • MD5

    92290d3c06e414319fb42fc0f7d981d0

  • SHA1

    6396501c4acd9e06a44f75f136528535e8003dce

  • SHA256

    3d10fcb6f54d01863d35000decd99bc4234266b668263035c55597e09c885f43

  • SHA512

    2d59d0121b48e442ba2d2af2639afe928664238ef51e819a634c7c71aebfbaf87f3e8a033285111046d2f50c9a286b611143aac5c227a000ec5d4be65e5bc294

  • SSDEEP

    196608:xclQtVzCfE9FQs1W/ojxuBxn86iiYY1BC:x5VOfE9FQUWQjxy8T5

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\salikhack.exe
    "C:\Users\Admin\AppData\Local\Temp\salikhack.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488
    • C:\Users\Admin\AppData\Local\Temp\sakl.exe
      "C:\Users\Admin\AppData\Local\Temp\sakl.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://jq.qq.com/?_wv=1027&k=57Cts1S
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2680
      • C:\Users\Admin\AppData\Local\Temp\asx0.dll
        "C:\Users\Admin\AppData\Local\Temp\asx0.dll"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 276
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:8456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9d2e5ded1bf89d1a35197267e265ec6

    SHA1

    bec083d22f402b6d46b6719c68415489b55f3ed3

    SHA256

    ed7e1db50a3530bd192e4c65372acbc44e0f171772b11740945d4bc084e6bf75

    SHA512

    4884f6f9dbf6b494a6496c04b36c4459e87f9df904dbd1ea82777713c7ec7ef0aa6f1e4a0dba53a7fe969eaddffc109901e9e5255209d8201447210cefb26150

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2de5f29aca9d711785af5e22b945cbc7

    SHA1

    ae77af8f38d4f8c06433f9e386b9218a036eab0a

    SHA256

    16cfdcc503d56515152c6167313a7e69a1d38740e343a6eefd3c9effa37d3364

    SHA512

    d1b1feb80e9fa8eaaaa5c0f69fa78654975d05161938f436b85dfad29f150e72163f20f79b122cd4999efaacf54652310d683d5a3c0d3ab3a5eb16c58d759dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f3d9b4a4958aff00a7622846f7612b2e

    SHA1

    2cfa2bc7deaeb684201e91b34b959204e416eda7

    SHA256

    612ffdb8084f9379e7680e7bbf8a85be0ac7b091ec2359aa44dea7fadc98a610

    SHA512

    a24e9e09d243d876b2acc7ed36a8bb2956029ef5b2f4089b20e7a80e54b4d50ffd59e1e7634ad8f3b863942a3cd62bb1074316b4800f5e33ff00eec9aa9e2c0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d1c76b96311550daa90b3a3b9a14b4e

    SHA1

    394a8ccb9f97af00ff24fee91a0b865c559c819b

    SHA256

    4cf248eb31124407e206600c224b300ba1dac4a6422fd1abc693d819e78bcad3

    SHA512

    b2111aeddd84e6ba211e30e5d1ddc1e022aa47213ff36cf004980156c7a37c71750f5d1afad0338eb8463d58a95f3f8643364bda8886278ece4b451450334bcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d69009fa1538433e85db35d6ab8e6fa

    SHA1

    edd73252bca4f286b55f57b7ebc139ccd25d26f6

    SHA256

    5b55b01123dde19c5457a6169f35ba92f0e4203ffcf5bfc0925fcd4f27a749aa

    SHA512

    781571d14e6b0d25bbbdb1002a6f8ce4adb87bf624b5bf338a8d0e816f3d93dc06ddae0929ca1ba78e8011185a25b12db75974f5edcf85a65fcdfb20ab9fa6c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db81cfffca81a33b731fb0f76250324e

    SHA1

    547f0002b4d1910d388a030ac56a6313dd1cd767

    SHA256

    d1afcd8500cc7c1184a24f335adb20867a8eb281bc4e2becfb3cda1b9f1e87ab

    SHA512

    758465b170a07e792c12b71ef03195624aa802a4edb94c59599335ae19612754a64bb508924ba6efd5b97760ab2f0e63f6c0d868ac77aaeec20fb2819a8bb5d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b9b9905c2c5142c4b15b89700afedd3

    SHA1

    7d1f0155862bc1c532feeaa4a15da6a689c0a201

    SHA256

    ffc4fdc7c421ba3bd645da15d76dfd199452257d9e0ad16398088b30b88796cf

    SHA512

    d6cee0a34e6560cbc809df62cb3c7f31d2110d098239744fcd15dd53b1883026380e82a365b8735026ab5983e327b2934970a7aeca551c131b2d68e485a6ee81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09d31214f5c731dca7f59d04c013897d

    SHA1

    807b5ab189da275e3a8b9067febbcb4194a07401

    SHA256

    f57c904e31ad263ffbf52e599d1d07eb738f0e4bdfe5a899725ac39a2b3b5dad

    SHA512

    384f39b22edf18d205bf927677715269d6b9b8c21a3673adb02ff0c104ee16ccae78e08aa7ea13e94d2cf94b7eb807ff1cd73d6237ffe7cab973e31e79cd96f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdd6860ccac71396b7d784a31204d659

    SHA1

    2c0613b4aa6ee3c67f2a2aecb0b4602913a38e3e

    SHA256

    1bfc8529f91df0cb3a982b5693280f295b9c78fb60620a29eff19eb7420d2db9

    SHA512

    0aff8aceeec9673e5544dfb63ed0e6bf02fa24ca1c14cf9d27daa6b5a47fc299cdca1d3ab9f519beaba020ba06a5fad29f637385a1ab966120c8e7ea6705c560

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0335366d4e653c0362b3db2d5665b469

    SHA1

    5be2ac75ecaffeb7fd6892d387bd245194566623

    SHA256

    075450cf3525aaf2c84675cce8c75afb5e8405967d9a5c499377b766076078eb

    SHA512

    b62bd22fa653603fb8ed6a64f2e42c9760494ee0e07f035c492f749dc95de8e63d0399b86272eaa4fdadd599296d5a12642d470eef43f051be01b18305f30ec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d3f58c7e8edc7d60722860fb26b35a3

    SHA1

    c5ad5110d16127b891c8e4d915e98c7b9cfa43ba

    SHA256

    6479946b9e9cf6330173d6075650f54be9dd0607edb3e4457d50f9a23e1769ba

    SHA512

    4655923b2fc56b147aae93c516466479257399b16e11b27856e699f9de1132ea6328cd2dd1962347de420dccbc81df87fb03ce134958f2232a54dc8cf1a04ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b30e5b6a0e7ea223c9a0e548a3578b8

    SHA1

    93240ee2b7e18382a15fdc6fb72e8f8df9e28aab

    SHA256

    cb2f92d5a8c79ff6e816fb705dbf42a59623883e6e7e607b769e62b994ccac48

    SHA512

    fe4e5c6b34e8a2d9499f68f3467097975a7d50d90b3e1786c7a5818f104c6a3f4a12812c1e2c2c0d49b669be604302ab8cbde391fbfe90098ec8a14d1225fb00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd0045f9b3dc297f289c20bc7673fec3

    SHA1

    3688b01c26a51dee2a56fdcc01b661e4011da3d3

    SHA256

    aa7216bfd33985ed42b390c9ca089e9918c3d6d497e1e300dca6c98822d3f73b

    SHA512

    682a42668de378b6bfff9b9657d5bd8df42add3865e35726a1ae3274d1a35af659e9dc7016bbc93105989b50eec62173ac6390858c5a149cb0f7cca66d87565c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b34bf9b56b2c9f106d87938708d4b02

    SHA1

    9cd57edf7d6cc16e8b78f6299c7e8e3138d3638f

    SHA256

    b448af9b16a94d9720375a9046eabfc2c83400e3a9550b6bb66b540d2f395c59

    SHA512

    9a00017da06af69742f9f0fe5485db4aefa389e846eba7c3b5e80d7d615c2a835c031925c11ee25ae9b2b17fc80e03141ba9c3507b0a5edefde80728371978f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9576f631c247c3fdd6c114f1ed7a4c93

    SHA1

    8cd00edc1fa77f5864b9244afd31e52b78a68ca4

    SHA256

    cda3c39d6777be8bad186be2aed5c794dd0bf8cba01542512001154308b883f7

    SHA512

    364b499c001a22052e44a34abf2f71c17b5f62fcdcfa81410650b72ba224e4fd8b9e8cd934f51f33fd89d82cc9a090fd7436887de3af73678dbf4ad87d787e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb45c6d0e901050ab5c379d6392892d2

    SHA1

    3f1a07d7d413c6f191c279d74123aef1df5e1a3e

    SHA256

    4364499223a8ebb97209d3587c232e4bf436c60d7aa3e736cdbd54b0a1e46c60

    SHA512

    7c87d5db5df7cdf3801bb58ec75cf95ee834cb873e51e47ee4b1c80307dde8bf4b39adbb8d1ad00cae71d1fc7f94cd4dedb04ea2c384750221a2f451d734fa49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c9e8a1a244525a31865bbb83e94231b

    SHA1

    c09e4f817a54ecee9ed11e2fed352703ba7cf91e

    SHA256

    e663150826791768cac168f65a894b8f6325af5280a4ce5427a78e016b6b38e3

    SHA512

    429d52ac4626a516c88b3333a82101da74d1a4465daf74fc4ce4856e2e4437246e86a9f1b38afa1b02e01e54f40ca51da9180a76f3c464a01fec5c2560927483

  • C:\Users\Admin\AppData\Local\Temp\Cab542A.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar542C.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\r1ckl4ynr5emy7w9d0-

    Filesize

    92KB

    MD5

    5f914a013176785e26d70d07234c605c

    SHA1

    5336e9ed6aeb682b46a0472f4f80ec24c4504210

    SHA256

    72b56bbce7e5e07702bf46a002c75cb3a8994fd390b190b989628d387d21975b

    SHA512

    103eff502bec0df1a36bd19a97ca1d10cc34da2183480fe146434ec916020011c8af003b66ab5f6f4886e95b21749be8d8c3c3ebf3ae1b2e5c6db216e8b4e1b2

  • \Users\Admin\AppData\Local\Temp\asx0.dll

    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    100KB

    MD5

    446afe801f9738ee2bfcb6791bdcf801

    SHA1

    fc43f35cd105e8954d77d8f7a48234e2576fe98e

    SHA256

    ba098b19bb32b3224c759d7853f4e0ebd5751f8cf5615bcdca3d52440fa07ccc

    SHA512

    f7748de18d35523aab05879944c1bfdda9a78c0b49e9b82c96b78f2e9dc8902848706857771c29cd769288d6ab98fb4b2398a92c240eca09e8dd27f297ebe92b

  • \Users\Admin\AppData\Local\Temp\sakl.exe

    Filesize

    6.7MB

    MD5

    06dcffb60e21650a7853af9a88b9a04e

    SHA1

    0021f7ae05f12f54ba5edfb2fb0c957f12fb5f4f

    SHA256

    f60632e252f6fae33c0f9b4cbff4a646d35d1504d1ed0c32cb03884bd900befe

    SHA512

    2b9e599c5e6fd498d7120e5c17cf70f79b7d15c27f820305ea0a17b1612a6aee72a07d7a85a8ec35c8a9f9eeedc3e829cea6d6d7c9dcb86f58aa76137a4a17c6

  • memory/2156-18-0x0000000000400000-0x0000000000ADE000-memory.dmp

    Filesize

    6.9MB

  • memory/2332-1394-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1404-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1390-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1418-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1386-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1388-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1378-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1430-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1428-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1426-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1424-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1422-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1420-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1416-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1414-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1412-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1410-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1408-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1406-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1372-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1402-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1400-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1398-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1396-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1392-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1384-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1382-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1380-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1376-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1374-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1370-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-1369-0x0000000002890000-0x00000000029A1000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-550-0x0000000075780000-0x00000000757C7000-memory.dmp

    Filesize

    284KB

  • memory/2332-540-0x0000000000400000-0x0000000000A5D000-memory.dmp

    Filesize

    6.4MB

  • memory/2488-19-0x0000000000A80000-0x0000000000AA0000-memory.dmp

    Filesize

    128KB

  • memory/2732-538-0x0000000003F20000-0x000000000457D000-memory.dmp

    Filesize

    6.4MB

  • memory/2732-537-0x0000000003F20000-0x000000000457D000-memory.dmp

    Filesize

    6.4MB