Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 04:57

General

  • Target

    f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6.exe

  • Size

    122KB

  • MD5

    92f110f3c314e971c03e931344480466

  • SHA1

    bf2ca29a81820bd364846b3533aaf431dc23cea6

  • SHA256

    f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6

  • SHA512

    492bfdaa99d0e727c1d6b5ead75954e2a4ffdc5d819db5244347f3bd98d2043492bdf9b0e065eaa89f299a081cfda22d5cf80db0376b6a5b57205fc799387821

  • SSDEEP

    1536:7UdrF741HktQ5Xn1go9i/1KTINXA1lf3WoS:OF741h579idDNelfL

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 6 IoCs
  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Downloads MZ/PE file
  • Modifies RDP port number used by Windows 1 TTPs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6.exe
    "C:\Users\Admin\AppData\Local\Temp\f1c1a0145bbf231c4866d43ec8180ca10c50f54bb72ddd3ed068d90b36b429b6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Users\Admin\AppData\Local\Temp\qzq7oa32p1kpsus\spower.exe
      C:\Users\Admin\AppData\Local\Temp\qzq7oa32p1kpsus\spower.exe
      2⤵
      • Executes dropped EXE
      PID:3720
    • C:\Users\Admin\AppData\Local\Temp\qzq7oa32p1kpsus\upssvc.exe
      C:\Users\Admin\AppData\Local\Temp\qzq7oa32p1kpsus\upssvc.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4996
    • C:\ProgramData\NVIDIARV\svchost.exe
      C:\ProgramData\NVIDIARV\svchost.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:3124
    • C:\Windows\SysWOW64\SCHTASKS.exe
      SCHTASKS /Create /SC ONLOGON /TN WindowsUpdata /F /RL HIGHEST /TR C:\Users\Public\Picturesqzq7oa32\CCCef3Render.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4860
  • C:\Program Files\Microvirt\MEmuHyperv\mesvc.exe
    "C:\Program Files\Microvirt\MEmuHyperv\mesvc.exe" -Embedding
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:3228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microvirt\MEmuHyperv\MEmuDDU.dll

          Filesize

          355KB

          MD5

          ce98c3cbd7bfcca2755b35e77a2bceb2

          SHA1

          c12c20bb69e7858682ab6bb21ca3971880efdc07

          SHA256

          1ec46488b2db690f6f769c6cfa7e3021ee6f88096303f04be43f3f2150d8c946

          SHA512

          dfc4f4b300cd2dc0d0f19b415da157b15ce666e1927266feb7a445ffb9199620bb7fc55746239f81fd3f79133c64c8d41822ccddc625288a33a6737a062faee5

        • C:\Program Files\Microvirt\MEmuHyperv\MEmuRT.dll

          Filesize

          3.8MB

          MD5

          56719cc92af72f56f46a5798b1430d9e

          SHA1

          497456e1b225a541058c8d7f96f2a3ef082d147c

          SHA256

          ca5e9919a5b3612a2faaab0f08f3e95db69e3d88d821a706c5d68d3f0d86d060

          SHA512

          5ca3fd7d6f86c5969949e55669c315287084633ccd42aae45cef170bce4fb05071637aaf6a9fce973cdb32003fdf02e184c8dc5aa3c327a17d3889084e07637a

        • C:\Program Files\Microvirt\MEmuHyperv\MSVCP100.dll

          Filesize

          612KB

          MD5

          89acd78f8c6d92947b3fcc78c7493036

          SHA1

          3317bd26eda9a7a0d49dfcfe27673d96b2873c95

          SHA256

          e7675926ff8f230e3ce88de65e47ab3fd6f8d617a93e062dd9ecc4226e9d16c0

          SHA512

          08ddb16ab60ea0f531f7853dc6a66a7a2302516e1b54258f2884528a4304cb05111b073d15387702c359f00bd96156043cadddd2b230bfa8bd288b578a11225f

        • C:\Program Files\Microvirt\MEmuHyperv\MSVCR100.dll

          Filesize

          830KB

          MD5

          34b2d5ad1c7c600f9d24660928a03382

          SHA1

          ab9621342ada12b355ea5fcd76b666193898c11b

          SHA256

          d7d6ff911503e848ffc6c0ba43382cc2e1e00b367d55ffdb883c54b688c5c28e

          SHA512

          0d86a396f81864c9ce5a57090fd45745f8c66a28f78fb469a6d62ce01c519f6a0c58d904afa99baef2f74ae4fe2308dc710c901d0394779837b82748679363fa

        • C:\Program Files\Microvirt\MEmuHyperv\libcrypto-1_1-x64.dll

          Filesize

          2.6MB

          MD5

          6def652fd7e5207c374fc51534bda953

          SHA1

          ee23eab28dd67ce96e7799a31801580c824cde5f

          SHA256

          80677a75588101ca6da2a22b74c02bd5b91aba2a62d1bce20d07370a9ddf0118

          SHA512

          f3284532571bfb83a622b019040e4882866941c66a06a9c83da23a1a820b940c48ffedd1d109c799b64d6bd30775cdb9ea1067869f565116653988bd763552a8

        • C:\Program Files\Microvirt\MEmuHyperv\libcurl.dll

          Filesize

          365KB

          MD5

          75b9bbfcf9581252474a5d1daa6e6641

          SHA1

          0fb1cfa16bf68fb13ba9816c2354af358bded167

          SHA256

          c78b0aa24630b35dfd3030626f873a89a39944ffa620b6afb42ae50eb1618f4b

          SHA512

          ed527526fd6053425fcefdfa5174d7dfa3b3b3601f33f8019b1215c9f1b85d823910f5a02c9bdd296d70058a516f9d464f42e712903144315e17f4ce7ad17561

        • C:\Program Files\Microvirt\MEmuHyperv\libssl-1_1-x64.dll

          Filesize

          639KB

          MD5

          2b242983d5fc098515105268eb22f0b7

          SHA1

          6a660eae893f16b988b44ec943a8dacf808f467e

          SHA256

          1679808a0a410e73d7807c1facfd0ce0ee1e6270b35d29dcdf0a8977c17418ac

          SHA512

          905b01240f92124f71acd61a075887d89a83699681f585a246aa44b9d514829adec5ab827d720c7c7eccd8392698ee3f18fe9b2f7fcd81000cb0f40caa28ff06

        • C:\Program Files\Microvirt\MEmuHyperv\mesvc.exe

          Filesize

          4.6MB

          MD5

          8c1eca3e2fe8f5fd1a0ce4b4a8cf4409

          SHA1

          8d45e044cbdcf645fe359864bc700b2568032687

          SHA256

          6ef47689ea1309e43869ec59861a677fe4e40cf03eb89386fc7d32fc516e9671

          SHA512

          4bf03b1453fa1f1bed14cb133c01c7b9b348f82da775bbbeaefc7867d348928c265b6b38623ced8b711138876365d63a669955920a5b5ae119975184297fe54f

        • C:\ProgramData\NVIDIARV\svchost.exe

          Filesize

          124KB

          MD5

          bfe68e139ea30fd7df87bf49ec6000e2

          SHA1

          8bf53a6d8e2d1f482d2bbdb23753c223322bee7c

          SHA256

          02e54bc24099508adc21dc96ea8ea707c038b5bee12d0fb7181cee9285af522a

          SHA512

          ffe1ddd74bc6b856db43c34bc91a8537b77e701a13c9285dc27bdd1979ff604258e0c44aed5e6516e8facd354c8c0920cf39a91d0e3ef13e3d27cafe9d7bd86c

        • C:\Users\Admin\AppData\Local\Temp\qzq7oa32p1kpsus\spower.exe

          Filesize

          1.1MB

          MD5

          6627cc0a08da7cc6e5063c32c15a0b99

          SHA1

          a344bf41cbae6cc673c1816de396fcc852ad165c

          SHA256

          ca8d2f8cc30d6274afe88c81db390cb14ed8e754dd8b3fed4e0c5d2c662f0af1

          SHA512

          c318fe9bac3cdf6f56e2581f91f22a82172d2150d21d30368cc72660f2cd59c6a37175b2071e5a3c63f43d880933d89505410bce3ea0c4bbd7422675470c9b9f

        • C:\Users\Admin\AppData\Local\Temp\qzq7oa32p1kpsus\upssvc.exe

          Filesize

          156KB

          MD5

          18cb99033afcd36f7eea02a05bdd06f8

          SHA1

          57655eb7260672cedfe9271bafef0b424b9caee8

          SHA256

          732dffe31b0ffef260a5ef4c690084d1726ea7ec42fab2186d6d02449167bd76

          SHA512

          aed355f55188a0ee9b0a0ecd53bdeec7f7c4927ad6fd290ce3abd1f7a55f15a79d8aa741e891010b288dd310ebf8d61452bf93365b17de9a4ebf5fcde4cb4613

        • memory/3124-76-0x0000000003600000-0x000000000374A000-memory.dmp

          Filesize

          1.3MB

        • memory/3124-74-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3124-68-0x0000000010000000-0x000000001001C000-memory.dmp

          Filesize

          112KB

        • memory/3124-66-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3124-64-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3720-61-0x00007FF6A00C0000-0x00007FF6A02F6000-memory.dmp

          Filesize

          2.2MB

        • memory/3720-50-0x00007FF6A00C0000-0x00007FF6A02F6000-memory.dmp

          Filesize

          2.2MB

        • memory/3720-53-0x00007FF6A00C0000-0x00007FF6A02F6000-memory.dmp

          Filesize

          2.2MB

        • memory/3800-1-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3800-0-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3800-22-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3800-2-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3800-11-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3800-44-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3800-17-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/4996-59-0x00007FF718670000-0x00007FF7186BC000-memory.dmp

          Filesize

          304KB

        • memory/4996-57-0x00007FF718670000-0x00007FF7186BC000-memory.dmp

          Filesize

          304KB

        • memory/4996-52-0x00007FF718670000-0x00007FF7186BC000-memory.dmp

          Filesize

          304KB