Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 22:44

General

  • Target

    7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215.exe

  • Size

    11.6MB

  • MD5

    b53c33900bc8c5272da0d10ba4d9301b

  • SHA1

    545acf4727534d0e0f282a627c735317ce1a0a45

  • SHA256

    7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215

  • SHA512

    b95c9e9c57af1d90e63dfa647e1bd71a272194d6607c9d61e4a698ece2cca7c13af337f709f280c9fa10ffcc5275c61eacdb30e3de1cd05caf4bab394e92488b

  • SSDEEP

    196608:NKskdpZFME3DfZLE/otTtM9oqFiXAWK0+GZ+fNxgQG1+HwyaxZD6EWe+v9C0:qdlME3zR7eRFFJGYNxBG1+HCjRWvvI0

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215.exe
    "C:\Users\Admin\AppData\Local\Temp\7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.qq.com/doc/DV3ZEZ3BGSkdkY3JI
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc631646f8,0x7ffc63164708,0x7ffc63164718
        3⤵
          PID:3196
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,9985387596654216068,17487068387254260832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:2
          3⤵
            PID:4132
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,9985387596654216068,17487068387254260832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:852
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,9985387596654216068,17487068387254260832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
            3⤵
              PID:2408
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,9985387596654216068,17487068387254260832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
              3⤵
                PID:1916
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,9985387596654216068,17487068387254260832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                3⤵
                  PID:3776
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,9985387596654216068,17487068387254260832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:2
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2212
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:2524
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3892

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  e443ee4336fcf13c698b8ab5f3c173d0

                  SHA1

                  9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                  SHA256

                  79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                  SHA512

                  cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  56a4f78e21616a6e19da57228569489b

                  SHA1

                  21bfabbfc294d5f2aa1da825c5590d760483bc76

                  SHA256

                  d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                  SHA512

                  c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  2KB

                  MD5

                  c21875ac2d729b057af87046f1931d23

                  SHA1

                  9e86a212382acb37e3c0d8b91c21541521d55ff5

                  SHA256

                  7cf50aff1a044f74e5ebf23300e405623955017a249763b5d64441c0e7120137

                  SHA512

                  c8d67ec83730f8a13aaacfacc9b5cb9330d1f841feef06bad38d06069d9b144af8deb26fe6c6542393356f5ffc6a841f86a9a25ee7e21d7cfc4881f9e7d57e86

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  794B

                  MD5

                  c68e6466f41776301ca95ce5866ed08e

                  SHA1

                  945539ceb45208af4d10b80b64c5f464ceb40ee9

                  SHA256

                  dc3ac2a0b0e17e094a71bfd7bcdf715077a096aa9af89a7c027d32e8a9739259

                  SHA512

                  bc0f4df9ad144072c5a633e0161a3d7c6d367f99e0e7fb9257e7d0baa389c965cbcdcd639a6bc80cf2ad8d68c982d6f07c98506390e38fe1478c51734201906e

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  dcebaa62acacba647650d4700b1237bb

                  SHA1

                  af7f006366cad3a0cc22c435b53c4f8541462496

                  SHA256

                  25a7f74faafcf0b944bc5ad8bc6731201d1c9335c8687772e54f317f5c1b6f6e

                  SHA512

                  f48e853372091057828fd03f0efcd33ce8938226f55ec30acf73d02228c6e4be984e811010e2ef76e02e1cb01a98d50ae30e66cadceef64aceae1780d36731c3

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  7898064a894ee5430ada8041d0b20c61

                  SHA1

                  afa72e6c8304e83947f9c530aade8e3c04b294a5

                  SHA256

                  683a775a75d32d017ac9811fdb7f37fd985ed7663d31cee342e96f89f8644090

                  SHA512

                  40114c834b6582eae81a9c88c2e732182214eee435b4aca488f453ac4e3c1327f968c1d21f7346678c2ebdfc13350d6213d1717136c5c38388768c5752a8d3e3

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\55f45467-fcf6-46e4-a417-ba7491e23e1f\index-dir\the-real-index

                  Filesize

                  72B

                  MD5

                  3d72cd74abe0645564f1a58aaf7effea

                  SHA1

                  9dbc27dc4fc758fc4f34232e86aa72ba4e198600

                  SHA256

                  72234305ad094ed32b4754b2171a582aec9ff9fa7d0d2f290b3c9c53dc66e168

                  SHA512

                  cc90e565dc6ab43dae115598ce92106ae2a3fdf2288d30ee056216bd9005cbcc3f45739ac8281248287ee3fbaebccb0fb349b31ea1f9cdddcb83684fa0544d89

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\55f45467-fcf6-46e4-a417-ba7491e23e1f\index-dir\the-real-index~RFe582bdd.TMP

                  Filesize

                  48B

                  MD5

                  f58045d56c41395e44bbe7c2a89f6173

                  SHA1

                  fea7dde412e46e7d5a53517ff7fa99bfb6162c47

                  SHA256

                  f4e6877cd78c7a5bef418b4afa45db95b258aac6014f41c71def22f5578e9ed6

                  SHA512

                  aff120cc72100939538bde2e65e47717bebeeb6078e952c93f30de049c7bcd27e146a6dcc4c1b053e6f2b27df4bf6f7e04b3648d2a0a759bca12eb8af8c697cf

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  97B

                  MD5

                  650dfbdf668da24e4f870b29efe2682d

                  SHA1

                  453e5a02f043a588fd507ebec1481125d0ed185d

                  SHA256

                  d811106cea77cbfd5e5b7a04009dc5cbaa65926496045fdef981f9369f42af71

                  SHA512

                  75dcb7c26b91719ede72e5c94bb5748d4e8e2b903f49f0be5e7d76fb470063170a0f488c9e1357acf5d37ba2b7ec6f94e1e6ac58ac1fb824719b30faab780556

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  91B

                  MD5

                  1e542e4f5a94c8e6de55c988a6f3cda7

                  SHA1

                  865b4f54cb9c6895ccc38530080ef115277dca00

                  SHA256

                  7c9718be7ee924db36833d1da1f09e3f3e8b266137f32d7cdbc60f74a8283c67

                  SHA512

                  35d2b8da79cfc9c0a83027f2730f8be7879407fdc8d8af6d3649c929c2ef6c98af7c2b9e4e1069f865843d2917e3ca1e6c5ecc3121c2e6cb5156f18b6bcdd627

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  ff22bebb79e784b848c7109cbe6c2539

                  SHA1

                  de37cd63b020ada12eef1386e00a10263a40ea64

                  SHA256

                  013b1accd39573b1fc4a8505ff109283c4444ee5b830b372c326bd34b8aaee6b

                  SHA512

                  c877ceec8242111852faf187673417541afb17533559678f67a3bee350c78c1e7a973840dbdd144b263c26ef3672865872e0b514714a2fb7aba3a7a4084f0bbd

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  568c92b5756417b37fed31fa17e07c40

                  SHA1

                  6eb861c26cb4f2341f1a0516bf9f3b5373ff5381

                  SHA256

                  d22d8d568e35f69257612a6bfa0c6c5265a246df68a4f9e6c5bcec9d7661b648

                  SHA512

                  6220ba86d66671ebd76cfa78658eb7e02db911c3388c598109ceb5257ea6fac051248303f1dcc4d0a999266aafbc0efc0408f1c51fbd6fbf32d331a8ce64ff8b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58bcf2.TMP

                  Filesize

                  370B

                  MD5

                  7d2808b6e6422b61aff769fa498d4d49

                  SHA1

                  d2d96e8cc3003765912041d5f0ce0f81bbea7a19

                  SHA256

                  0a458f44c5c041f107d9ea86c5b37a5be29403d4a51b25923ddb941a29ed8b91

                  SHA512

                  9049ef1c8c22afde016c18196f58921a42a77d58ce74d38d5531ef55e527e41c097a75e0ad404009e97b07f82cbd7a0114fb3477fd34d6383de5fdc5ccfccb47

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  dbccd2580b5ec6454baede98bba8d4fb

                  SHA1

                  af11b8dcf33c867ac153fed9b50d80b684711136

                  SHA256

                  9780907a22585588571ce8bc6d7b9e7318809b73a8820455f02fffc62b34bd97

                  SHA512

                  dbf15ed364c62f87a0c0c95f9126cbf94d4b7aac3ad357237cd29b7cc25a052c1f0caf1025f3ed8ae366eae5dd9753c36e35ba4cae3988fac093b5ce113d59bc

                • C:\Users\Admin\AppData\Roaming\Downloader\libcurl.dll

                  Filesize

                  729KB

                  MD5

                  f28f2bc74c40804a95c870ea710d5371

                  SHA1

                  8654243c7de98a74ede2bcf45e8506f92e77d6fa

                  SHA256

                  cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

                  SHA512

                  2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

                • memory/516-8-0x0000000006C20000-0x0000000006D10000-memory.dmp

                  Filesize

                  960KB

                • memory/516-22-0x0000000000400000-0x0000000001A50000-memory.dmp

                  Filesize

                  22.3MB

                • memory/516-23-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-21-0x0000000000400000-0x0000000001A50000-memory.dmp

                  Filesize

                  22.3MB

                • memory/516-19-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-20-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-17-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-18-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-6-0x0000000006B50000-0x0000000006B6A000-memory.dmp

                  Filesize

                  104KB

                • memory/516-0-0x0000000000400000-0x0000000001A50000-memory.dmp

                  Filesize

                  22.3MB

                • memory/516-11-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-12-0x0000000075A90000-0x0000000075B80000-memory.dmp

                  Filesize

                  960KB

                • memory/516-9-0x0000000075AAF000-0x0000000075AB0000-memory.dmp

                  Filesize

                  4KB

                • memory/516-7-0x0000000006D10000-0x0000000006DCE000-memory.dmp

                  Filesize

                  760KB

                • memory/516-1-0x0000000010000000-0x0000000010116000-memory.dmp

                  Filesize

                  1.1MB