Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 12:36

General

  • Target

    44550a2d81cea1ebfbbc3085477237f14ef6821014b33eefcec9d248829468d3.exe

  • Size

    11.6MB

  • MD5

    4032bb668d29cdd05d8499ddf6b4fda0

  • SHA1

    74ea7f18c223531408387688ec6b0844bd550f59

  • SHA256

    44550a2d81cea1ebfbbc3085477237f14ef6821014b33eefcec9d248829468d3

  • SHA512

    5bae3908947a4306a716766af795d3a1511963dbc9e2e9fba9236bd68075334ee8a0b820a78d7f11d0dfa351ab01bbafbfde5f662c2638677edc73d41b9326ef

  • SSDEEP

    196608:zk6EtwqQ/LJ7Y7vrJMopEWa3e4bL6iXdxX7WxngF+DxuZRgPAWXLMNBNjz0aALT0:w6Uwqq17sv1MCa3e4bmQCKF+DQ7WLMNl

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44550a2d81cea1ebfbbc3085477237f14ef6821014b33eefcec9d248829468d3.exe
    "C:\Users\Admin\AppData\Local\Temp\44550a2d81cea1ebfbbc3085477237f14ef6821014b33eefcec9d248829468d3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://jingyan.baidu.com/article/93f9803fe0b0eee0e46f55e1.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6d3405931f26d4fb86f6e3ad3a916b6

    SHA1

    5f699ffe6c8143777c4c1d8efd9d59d8d388fe82

    SHA256

    c7d2c5f1f04a6a704dcc9b1507496fdf7cc6c5cefbe8a71526e51d65ffdb4be2

    SHA512

    8bea54cbc949d0515c608fcd43193b4d92b7bc4d5429064bb367b22f22533f0aec1f9a4427b53ddca3f8c36c969ab096d34ecdef6223ea378db377b5558c905f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9141ebad10698deed9267897ceb39b6a

    SHA1

    56a51e0af1b60bcc58bd554053d4141c6d375b7c

    SHA256

    f6143b6abfe22da468ae9a6904a7241e767d79137a6392890398f8892d4d867f

    SHA512

    e73c3851ed039b9ae16ed072c258835227357886de0df801b2e278db3ee767554e2573c22362288ae12b10526e694e072710aa7703de41ea4b010241a9730574

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4492ebcdbc9c381ecaa91eca91fd1793

    SHA1

    cff7a479517cfe8f7d02b7102654ed375d53196a

    SHA256

    45dfe10803dc1676e93f369f5cea7b06f611bc73514ac60dba6fbf40f8759be6

    SHA512

    1b187c41807834e9a44c95234b27ea75eea77f17eb563e2de9b407e160fa783719c830cb0d4b1a86cdddca97dfc6e290e120b320489a4d7f97dacfe642cfac0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d249f58edc1080e83b4cc24eca429ce

    SHA1

    c11ba1e6a5117b60a8ce57312da21106867d8ccd

    SHA256

    1e33e842f5a9b32abc4765056d6d20d01cdd2eb132c7ce5c11205b0e5db8eef8

    SHA512

    8634e69cfd56780239fe514261efba60c0883d23111c70b3ea46fce930e04af354a27fdec478f911704cdeb556d9b2ac4fa2165e9d838a3d6e7e8420039c9f06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    289a8ba8e604f876aa6da502848be844

    SHA1

    2e178835c82efecbd0d32727fb984bccda217e9d

    SHA256

    df94b660e9edc93f78a257e673883c06e86781810ed7102b99e31c449f92494a

    SHA512

    fa3b06a6f83fabf65253538a7c208429dd864556c173d88f07bd98b1e023d7e0352f7f640ff2c3bdcd8d653f1d171ac6e3ec32c3fcbb39fa3361cb124b220d33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc64328a7bdd41e594932164dd6abbb3

    SHA1

    63f544ecea311cc20ef2cd961e1759044d9fa62f

    SHA256

    b4fdf42a19d6207793f5be0faf16973b425a41a03eed2fcb84ddb4e4570ab66b

    SHA512

    d6f2428d7ef708ca3df58eaa8ab9b6f291486a32a0382346ea9f0514617d121f51902842f6e2c7b095cf46035cda6ae786849ea5d58be01f863990dc23469628

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    659a9bb1a90050960a554773ebcfd63c

    SHA1

    49c2030ba8a0effbad4fdcf858d3ace9c19d1cab

    SHA256

    77021db6b0584a09db58a8e7cfde5e0abcfc1e75ce69dc5e161c6f8c323bc375

    SHA512

    4cd41118c9490ecb80c03954a645c8e3d9d64add4f0759112af7c4e818a02cf4c4a327b9d53fdc7b65205f2c5b59ac78048c6e12a60ae5ab50ba7dd8972201df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1bbf10aca941cde65d986f6692bc77d

    SHA1

    19508f3ee3e238c80dac0c0b13b6e55e7153f37b

    SHA256

    f047e948be0a8a0ac90be92268b8f1248504707175cb84254d02133a19d6a3ce

    SHA512

    f20262a3b51fc1e37e66e487f5670b06e695ec7a17cb9ecb5d2cf641c470d2e8dd83040422a943107d7133cf5e21dcae2cf2e5d44989bbb003336de251be39d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ead6b5c72c4ff8e694cb10e6196cea66

    SHA1

    837e33b33a4cd8a6d9ef7e22246845e1cf682a9d

    SHA256

    6524f8bd1a6fbf71dcf069cd788b86c80cdc7ee48db6d1b6768b4ff3fb80a4a3

    SHA512

    bcbb3fa6565f636cd08908d76813de3f8226596235c22dd6b3a7fd2ad878c8b0017d8b44d075a0e3765d474e30bfc0a487c1a0dd7186c99a24db86dc1824c9f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4ea7248e6e466d544824c404dc4e26f

    SHA1

    759f1326290de02eb2c0c42d16401a821bf04f19

    SHA256

    8695443026445e0f21c737002ed91af231813380859ce230cc16c6ff516bd0fc

    SHA512

    7c49a4b5624fb60d8b5536c7548824996cd227608b85f7bacd0a1ca2d53fd967dba274ec07dcbbd716d7d91ddd0368c183ec655e3953034d3baff56415b7cb31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    581c6e54d05ee650dce3ddd0988be3e0

    SHA1

    99aa8696ad4c705ff8fa0f563c5ca54672d07970

    SHA256

    56d7a0b3b04924cce8a438941e68a0cbae27d61af496d7dbbccc06827e50de7d

    SHA512

    a6e996af003a58ad0cf09e50f049a9100ba96843289a57579ade1f81e2ffa163913b9028cf1e2069fdf0dd053cb5dfe5f166960b0be1d6e6ce2bf150a5a15ba3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7afaaf9c8600d835629efd4ee9bac00c

    SHA1

    bc1013fd6bc31bd42afc9379d67c0cd1a81ee2a1

    SHA256

    21b2ee0e088c4ee3babd2c9c806fad6a75ee2e1f6517f7dd192092e78a6ebc15

    SHA512

    b4d5d8cea14d7a991cc5bfac3d62f9afe768fd2574a836b899f19597af947f2d1f4ffc1219204bc09c531219ad7d259ea877d808561965913321f6e81f60ef36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8164d09da66b1f8e8a31c99d3f9503bd

    SHA1

    9601adc9d14d154530189556959e3fee7573fb99

    SHA256

    b56bf6c69066fee11cdec607ca9ba45b4745728599e2a295ba658b573d1bf4e4

    SHA512

    556ee2509ee56817a8de35ba4c42931f3898d8592b1e3936b4909ce602b9fe1ada6946c2ce0ac09c17e834a50b0f07f77518cd8046ab2b6407d7c76d5918b42b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    441b030bb26df2e62c66450c02427c74

    SHA1

    fc367413f0d1dddd716de0c580bd1f84163e47b4

    SHA256

    4a25fae277d19dc5e70d9d696aee1500adc347feab96f8c0bf996b1d75a4ae37

    SHA512

    352237fd53ae5ef645f12601765b498fb69ba6f8ed2482cbb357e98cbc75c7055979f3e6adadf16a798c61e17580c3b47449ffb47559620634efdb50ec72d19f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    118c709773f3654efa815980a2e11bb4

    SHA1

    308024987ace500b350b8416af40bec897684ab4

    SHA256

    0960dae8f21f40102e93af1202328156c69fb9452b278dddc5ea8b9f0eeed3fa

    SHA512

    50bbe3e07dcd5233c4702d3e3e8e0700c216dbed60d6334a33ecbef4e8a91acfe02cb820ed185812f28ca7b96240adaf87593fff8e6750fe10dca3564e1e0375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd2cc048c0adef266ce8ccfa6011ef0c

    SHA1

    12dfc0a37167ced7c49887979e964dafa75c9342

    SHA256

    b60cedc16c82ed894e39fb039026cdb6130a1ce5a449519ff2c43aee296e89be

    SHA512

    0c032a71cab0f357ee3a94220a3d558478f0e5f1e151b44dbbf810c195415585ded1173cdac7c12523296e599abc9087552c7d1b2fe09e7889f9183e2dfcb98b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0084b91f8cf1f91e3f866c95549336ee

    SHA1

    cbad3e16678bbd1b0862c5f59d97d5691c5b8be3

    SHA256

    0809b10149959e94965eb749837867d3e8f3e54834de0af289dae000e2270a1a

    SHA512

    a07e77689a15dcbc60fdc8144b8485e9cfe74be251e603334cc361dc3b8dfccc2026ee99f86dcf738c62e846d1093cbf1dd3ebafd17de0343b7665126dfbb150

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe29f4d786de2905a91d8d1bf56f346a

    SHA1

    516563d6f06c9538112e3dcf1d3b93ce37c0b23c

    SHA256

    ccb399afcf252178ebddb63942eccb4bbaee5c89e9e4c8fd7e1ecd9127b8ec9e

    SHA512

    87db237a0e0b6f7937bbe67959ce655fc9f87f0cb759353b8f5814e3549e2d4c651746bdf917a17d495118e8ff2c302218b4be626f01196069777d3848ad2277

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a6466b3077f33b64d58c180f8acc0ea

    SHA1

    1c53b4a4d0da31e7e1bcaa2ab6feaed53253c2f1

    SHA256

    daa774962f66cd5b30c4902b7183bfe3049a97700aaf9848a19918b25804bd50

    SHA512

    1ca9c64cf2249bbff20ff87d890d04354d16329149627250bd919c71e9b43743f860d04f03624db0f4fe23f87a9055f923d52dfe45109b3790678de3d0e88e42

  • C:\Users\Admin\AppData\Local\Temp\Cab32C6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3336.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/2092-18-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-14-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-16-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-17-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-19-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-0-0x0000000000400000-0x0000000001AC0000-memory.dmp

    Filesize

    22.8MB

  • memory/2092-15-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-21-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-22-0x0000000000400000-0x0000000001AC0000-memory.dmp

    Filesize

    22.8MB

  • memory/2092-6-0x00000000033C0000-0x00000000033DA000-memory.dmp

    Filesize

    104KB

  • memory/2092-7-0x0000000076D61000-0x0000000076D62000-memory.dmp

    Filesize

    4KB

  • memory/2092-8-0x0000000003C00000-0x0000000003CBE000-memory.dmp

    Filesize

    760KB

  • memory/2092-9-0x0000000076D50000-0x0000000076E60000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB