Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 22:49

General

  • Target

    7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215.exe

  • Size

    11.6MB

  • MD5

    b53c33900bc8c5272da0d10ba4d9301b

  • SHA1

    545acf4727534d0e0f282a627c735317ce1a0a45

  • SHA256

    7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215

  • SHA512

    b95c9e9c57af1d90e63dfa647e1bd71a272194d6607c9d61e4a698ece2cca7c13af337f709f280c9fa10ffcc5275c61eacdb30e3de1cd05caf4bab394e92488b

  • SSDEEP

    196608:NKskdpZFME3DfZLE/otTtM9oqFiXAWK0+GZ+fNxgQG1+HwyaxZD6EWe+v9C0:qdlME3zR7eRFFJGYNxBG1+HCjRWvvI0

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215.exe
    "C:\Users\Admin\AppData\Local\Temp\7c00b24df513f1990e0728c43674c63f0b6dd37b660996d47c6348ee1c6c7215.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.qq.com/doc/DV3ZEZ3BGSkdkY3JI
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1efb46f8,0x7ffc1efb4708,0x7ffc1efb4718
        3⤵
          PID:3408
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7641308727263977864,1025417098397178485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:2
          3⤵
            PID:1452
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,7641308727263977864,1025417098397178485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,7641308727263977864,1025417098397178485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:8
            3⤵
              PID:4896
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7641308727263977864,1025417098397178485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
              3⤵
                PID:4984
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,7641308727263977864,1025417098397178485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                3⤵
                  PID:2728
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7641308727263977864,1025417098397178485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:2
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3828
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:4316
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2192

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  37f660dd4b6ddf23bc37f5c823d1c33a

                  SHA1

                  1c35538aa307a3e09d15519df6ace99674ae428b

                  SHA256

                  4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                  SHA512

                  807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  d7cb450b1315c63b1d5d89d98ba22da5

                  SHA1

                  694005cd9e1a4c54e0b83d0598a8a0c089df1556

                  SHA256

                  38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                  SHA512

                  df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  2KB

                  MD5

                  694f1d80e2479b7638eb43bb3110105d

                  SHA1

                  854d061fa74d34b40e7955820fe4f016d882317f

                  SHA256

                  39aa3c300dfccc9a3269961bd9c9d92e5031957e6d017a4da6e4ad5e93931a3f

                  SHA512

                  022246f5a20da0f5fb64387e88bd1fbbb0a439c788f83d05ed76b656df6237f7a51ea0fa2c97b1306329c804d803252a652f44d8a056e66cc19fb6b77d5b72b8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  717B

                  MD5

                  9d8687d2857e2b56fc16f7b23707ee18

                  SHA1

                  0e3f65c0d4276571a2828c23439ea7b9308f4fd3

                  SHA256

                  94e6c93b8a98ab9c31668c74ef3d7fdf6d1939cd0d0db79b14426d2d5ab09d60

                  SHA512

                  f2b6c6a1179b74b7c29183fec10ce3761415ee9294913a59be65e663faf02d5215a3dbc86fa5d4a31f5d1d3e2564234ec1634e4d5695ecba19da57bd46b1e5fc

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  5d838441a104cb92ea706f7a2d38f256

                  SHA1

                  a1d13013673ef2e7d27f85f588c6e94d6253de88

                  SHA256

                  470463e9f73df99bc11e173a705d53b045c9c2248314936cb28b4b10987ab3c5

                  SHA512

                  400a0ddb7fc93a9ace34918d60fae37a9f573905bd14a7bd8beb9ad4b48db4d01110cc35fa99ef568abb0314a925336045917494e550df2808d3361f04f2aa64

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  c637297383cce6916951b1ab3e17378f

                  SHA1

                  0ac2c61ccf33b86da35a367913bef3c61075cf85

                  SHA256

                  081bc151b3eff483dd73b2d9c5e353eec3858949b98ba6e7bfbf9531052ee6c5

                  SHA512

                  cec398f11038f1d8cc5a6ed3cc71699a53bbe4f738a4023df6a8048c35db7539828d6f1fa9ac3fcdb028ee0d50aa89a9aba282a4057ccb7b4a6425b20475d6c1

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\e585bda7-e3a5-4862-ac72-27c7a114b97c\index-dir\the-real-index

                  Filesize

                  72B

                  MD5

                  4242c4ce20744af43ba16d11feeb1c00

                  SHA1

                  4e5c9a32cd028763c61347eaa1edd91a0f2a2a3d

                  SHA256

                  509499279f435d1f38e6930d36b6b5630e586a5239d06a8a5eaaf5e969b8a100

                  SHA512

                  43ab5e7c12f0f24fff875a18a9bfa4a9ced46c3d6518ad492c79f43811a2216c429ef7adc04c8e2eeb938c7b62d0b83a701617d4e6829e6e285e07a9158a30a5

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\e585bda7-e3a5-4862-ac72-27c7a114b97c\index-dir\the-real-index~RFe580644.TMP

                  Filesize

                  48B

                  MD5

                  c565fc926e34d78c5b586dcdda78e733

                  SHA1

                  5fce2027eda43a3a9ec10b64905e385192ca0274

                  SHA256

                  7dfb0da6e6085caf47b4f2655d7b26724242b3dc72b36c34fa06fd789952bf0d

                  SHA512

                  b27e96023e87b5cbe3b5d4fb8184a57fa10b3d09285d1ed1c341ba3b7df575f93733131c60d9675086179eea179fbb08ef7a7527cc0d908b6eec7a9c88b494ff

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  97B

                  MD5

                  e76e87847720c8c86b8a1942616b729f

                  SHA1

                  38f015a03055581cb257013c3706e6f9089a572a

                  SHA256

                  fa4c5bc4069a50b1bb930c4203d6506bd2e49cc57747f4ff4a37e395fdd55d7c

                  SHA512

                  9f451a6e53bf17a54167458ce7bc7c45a218baa4f5cd286628369f4f6aa3c18b0e903f8c5080c336b5193fed3f81ec1aa2cf0f8a565b4d3214f46f0ec59b17e3

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  91B

                  MD5

                  c397eabd365d8c6a7731d78f18e3d03d

                  SHA1

                  2f8850a0f03443aa91cd4ba2dc043423961d67e8

                  SHA256

                  9bce76673eb91eb33c016ae8b9729b84951d0053be010b3bcc68cd0ba8bb7d22

                  SHA512

                  8beaf9b3e9e62c481def90371b07ece953001f80c61df890b65563fc40aea1e90b4be2e8534203f1c03c0a0c4813545a8d1c1f6bae86cf2fdb059f217586bd1d

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  e851df72d1bd063fdd4ee483649f46dd

                  SHA1

                  9ffe23f848a0a2e91b531e15463a5ddca9570d95

                  SHA256

                  60b88d623c7e738810433829e8deca55a1b7a87c70332dbb58d09ec6187835b4

                  SHA512

                  e614d785dc2646eb801f5891cba7a6b9f4894f66487407357699937f4d2a9bf27cf0ba291d50021441db0280dbf83b8ad618fd95c4a8fb539c753397d31e381f

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  461faaa21a99c4d79aca589feafc560f

                  SHA1

                  9ba7619013dd596b58dba95ab44cd0620f6ead8e

                  SHA256

                  dcbe1ea6d14c162137cfaa66749a3b6a243e64139871dfe6ae7aa079474e0dc7

                  SHA512

                  a52ff55223929a7323dafee0768b995d78deb8f077272bb116e16df76ffcbac44496b4ad43faf76bef2f08b8ff96981a0c8050e9cddd9085b3e58c872c974190

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  9a528eb6804aa90f1c36b35d7e69afc3

                  SHA1

                  56882ebf2412b873f36ad2c5abe8a2dc04e5d60a

                  SHA256

                  41b61d280fd8303acb5b841fd0854e09d37ec0979ea64f283b7211118177c523

                  SHA512

                  327a31c7e1aaedf4d9703bb8542d71c2c612c1c8d3bc15ac7ffe4b7dc7c7e7e3657cd78daea10646b686656259375046980ba4035d01f643bca760ef2c63fcc6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  6de52fe5dcb6d9cd13cab8907e1af577

                  SHA1

                  8037d2a08c4a2436589ff523956c6d4c789f8a6b

                  SHA256

                  475524a41170eaff1e41209e4a442c944c140ffd6932ce26a6816eac80398b1c

                  SHA512

                  382c43050efde6d8578e2f2446167cdab6c34d7674907d236530bef0809820f5af96e99345a9d14bfb394de013e4800af0692aa107d28728f11baf8f2d12d66e

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  8b96e07147c8b989e3c833ee25be5f04

                  SHA1

                  20a57dae0e6ef3b904f9fd7a683b5ab473ec3980

                  SHA256

                  c8bf14abef6eb509dca0959fbfb56ceae7b69ba16eaed84f96d718b45ccf6e76

                  SHA512

                  9986daa9cff29d85a16a16e4ec421c17a7bb6948d60067299d3fc2d1fc3e955967231fbdc9e06d103647eac9342ab881f4dd44a68c356d7c9dac951d8d87474c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  ca190bd189096a2fb88ee59629254b69

                  SHA1

                  444efa60990a61406b3f7ef1801988194e5a7cf5

                  SHA256

                  301a99fcd67b841b72778394418bd9a1c317f1944ee83da3f0a0a546600abe33

                  SHA512

                  13625719027d9001ba17b26118b72623beacb898a5da087f53f6170d37aef7cefa05ac5fc702966f2f9cf4b8ac3be8388fde8744345d647dbfb05adae1fefcf8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57faac.TMP

                  Filesize

                  203B

                  MD5

                  2d046b0cef68174461813e302e1c384d

                  SHA1

                  92e6aa9853251058870748fb69c74fe8a6680d72

                  SHA256

                  f426b67430a718008994ef3f7c196d8f56a6ab467846f9e67ec74df231a04a1f

                  SHA512

                  f5acacf9675c0ff25d686df113c4487c673f388707d5f2b866283dbcba25d5010835216481f441d5a84f52448910471676768f2e3e2b9b401de6d9a1cc4854f6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  58d66230007221040e4c5db5d8e9971d

                  SHA1

                  8bd4ec999d55aa8228140133ed7bdd161b617363

                  SHA256

                  6eca38fb602e1d6d1490bfe1d0faba72bfac9bf6fb340acb5f858018591aa1b2

                  SHA512

                  c465e9990e626e1afab8929b1f96ee1ed23434198c7ece1cc1cef73b5e8af334b212d15787124d4dbb37860ac89840add47bced222d0a7fc6ee0249d9c2dae86

                • C:\Users\Admin\AppData\Roaming\Downloader\libcurl.dll

                  Filesize

                  729KB

                  MD5

                  f28f2bc74c40804a95c870ea710d5371

                  SHA1

                  8654243c7de98a74ede2bcf45e8506f92e77d6fa

                  SHA256

                  cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

                  SHA512

                  2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

                • memory/2120-22-0x0000000000400000-0x0000000001A50000-memory.dmp

                  Filesize

                  22.3MB

                • memory/2120-23-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-9-0x000000007715F000-0x0000000077160000-memory.dmp

                  Filesize

                  4KB

                • memory/2120-6-0x0000000003C30000-0x0000000003C4A000-memory.dmp

                  Filesize

                  104KB

                • memory/2120-0-0x0000000000400000-0x0000000001A50000-memory.dmp

                  Filesize

                  22.3MB

                • memory/2120-11-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-8-0x0000000006C20000-0x0000000006D10000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-12-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-7-0x0000000006D10000-0x0000000006DCE000-memory.dmp

                  Filesize

                  760KB

                • memory/2120-21-0x0000000000400000-0x0000000001A50000-memory.dmp

                  Filesize

                  22.3MB

                • memory/2120-19-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-2-0x0000000010000000-0x0000000010116000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2120-20-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-18-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB

                • memory/2120-17-0x0000000077140000-0x0000000077230000-memory.dmp

                  Filesize

                  960KB