Analysis

  • max time kernel
    119s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 13:10

General

  • Target

    ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193.exe

  • Size

    11.3MB

  • MD5

    527d418380b0e7abe98d699458c8a73d

  • SHA1

    e91358f1ea03727bbf4e1fc16c4e544fb04ae9e0

  • SHA256

    ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193

  • SHA512

    ad44c91b5e0aadd11bacd79d1d442c68780dffe4538b9563e5cc940a5bef667277da92692e2b4706e60044bee32ea9d73392d9ced7207b0f6d0834052377e518

  • SSDEEP

    196608:l1AJb80lqV+MKoZqbfCJ22zUVAmKCOhjSG9xMNp2LQ99jFx+NE51hANP6MoFfAm3:LAJb80AVAI2mUVAmqSYxdk2ohaP6MmYk

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • A potential corporate email address has been identified in the URL: png@3x
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193.exe
    "C:\Users\Admin\AppData\Local\Temp\ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.qq.com/doc/DV0lrck1MZUVBRXV0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    f5bbdf5ceeed55b675ad97a32f0822bc

    SHA1

    300a9e1a944d43d4ff36dd45b741d922f5c5af46

    SHA256

    f931e65c911b65fc8cab3459ec49a6894f2ef7c5cc92b502589ec9f3354f386e

    SHA512

    e62454fa9bb0c2ee207c4c6c40be10283a5a67b659713dd4b2590d7a51eed66e2627cc1206243cf96466b70ecc61dba01c61d5a115ec9b7026019e6807453229

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ade0cdc7b2333f030ed63e34d4226480

    SHA1

    0dadea007dab5294ff1d740e9e5cee9deed64c0b

    SHA256

    2f8782062c793c53c52a6c969a75134e8f6e1da0070fe4902c320d3bf41877fb

    SHA512

    63a61282a1ba9f98a60e7b9e7b42ca9c0decf6160601f24aedba58d8259974749c2d2d9c21311cb350ba9e50fa338df142fac9e17610c64508a3e66fd8126782

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    602930d3d45e69a1379c493366bf32fc

    SHA1

    637980d9a360b8648ae9af984a804c690f0bda34

    SHA256

    11a6c97a33133657d326c888e2a8cbd05d023195b2035b8f3b7ff83aa5902932

    SHA512

    59d0fb1b6a03b857f43664491f428eaebcc140a29c68b2b0dd2d2184009ce97ecfefe6e0eebcb7bd41a04bfd8435dc03a9958378bcd6db48fd8cc2ccf231cf2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c37b0d31321a90ab4cd51801461ded6

    SHA1

    b930fb6746040503bbd2719bb72cc586205b2de8

    SHA256

    53ac78212cf99856b5457e0ef7fd0b8c6bdd6b1a0d63252bb668923d0f46b5a6

    SHA512

    ed1923be66c01ce87143cb86749b7d100ac3b3a735da53cb982ccd970cc239d78611144fc7cb245e102cd426d381c5df2afad4c0c7289fb4698633419980e410

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55b88c11affa05803f2f8df04d8e5058

    SHA1

    a4751ed2c7e098d05566252b559b87509ca3cf61

    SHA256

    47b35d15e53708a95c12f714368098491edb046fa6296a6eab07735321fdeeea

    SHA512

    30d9346ded74b04d9720e3a47ece8984d2b28309cbb6370a1fb5dd4d7a003d90ce480c5e0ebf192b585c2d5dbc4462db5e0d55066ff1ff01672829e055a2888c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a479d23ddbf8828f25ef52a3a711107

    SHA1

    aa2d07755c3a0de4448bd8227e8344da6615bff0

    SHA256

    dd9a7213c12d75fd47a6950c7b50ad775ace476996cbab16e4186a2897d84a06

    SHA512

    ccf8f1c681576b1c1d25e0818bcafc1a3b6a0a0c8191c53e987a96270d0a916c6f8ddf50f4cdf609809eba2e622f77c15d1038799c95c994ec9e445b134b78d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19176e888a18fc09cf968a63de39b8b1

    SHA1

    e8b36237d236d23414dca72479d326e0351ba06f

    SHA256

    07c9f3dcf257db95f7d86aa2a8598b97544fe5d86b041a0674c7b505ac090c56

    SHA512

    72c1bc678c1d8ecba5e9e7ea49e02315e2339ef9ca207fc6caaab690ffbd925cf458cca931af27da55c2c9153f3e71a0b7d87daa986931becde70692d15a9150

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de39cd5ce5a439581032f31ea7a5200a

    SHA1

    4d9b27d66a8a0c4d4c334ddef860def93c36adb2

    SHA256

    16ed24f7c8a9d7d406db19c26fe7cf0078635c6541f6b469f407bae060ec2b88

    SHA512

    afb3823ee58eaab4a26024c60f9935767645718ce47da21af43d7db92fde6346af1467a482f93afc77a882b4bc04c7e96c95e4dba3238cc3f64c7525460e3669

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7277245f616b489d5a05f17a21cb3efa

    SHA1

    41e30f11b5067b528444c9ae63af7ae50bc117fd

    SHA256

    215b5c1b44860761ad2a2d5c2146758ad9470e4eb0039eab082f32c25c64bd2e

    SHA512

    ba023b6a4bfedde6e45f1040c9cd3187cc68be27a1582c5ba090fdb01b52e6255353877e7cd114254f075bed65994ebf6cec11f4b078983c2aef275e35a365a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d04e3f5b7d53f105b94cb7315cac9a97

    SHA1

    a4176fc206f7c4a854ba939b6ac496480610578c

    SHA256

    993fe630a0d698296514d15f0cc706460c98886984086cff3e127958521d75ff

    SHA512

    b261cd7eb97e4814c75413c78be52594867d0266b5b5891c5ce2d7c39011d6d855eb6b82f828216701590acaa07a5b7e0b0f5b5863e315d23a43906a3be7ae44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9875dcc47a967583b66e904ff5c9c458

    SHA1

    ffbc16b5207ecbebdb48b8a3bb859d2a539486b4

    SHA256

    ef8b75a57da007923278d78c76db65ef8c5763525c740be821547a9096d4995b

    SHA512

    e1f109ba1fdc6b0911a06525f505201dd8165d2f3760c89850d3893e9c0743cb36376fb392b98246d360a3969611c1f943971cbb903ca08b5850a7b6d2862fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91b57353f0efae26aa3126d82bcce4d6

    SHA1

    685ea4dd64a61de13f5cf3034896e80b00277ee2

    SHA256

    1905b5e32f11988882cac39ff5ff4c3e24ec6a993c154e577136ef3d89e5ec21

    SHA512

    be571627fa4219f94fe29c97d3b914f6eb2d369968ba461c694210d1b8c070467527a5bdab2673c1fc26ef8e38e26309dc703b8c7d80a284d8eec36a5e4643f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7371604a60f9129ebab7d0ede230be69

    SHA1

    a8c165947c35aecdfeed31a323dc8cb243712276

    SHA256

    6483ec838a6f8146a52f988fa56ec553d4af927b5399071380c817e39b898762

    SHA512

    03912487f69357139c374516196956c427f48a94d872eb6ccaac8d9f19ab08848e29148cbe5b2b8d2c39eacf94e70e1b7625d6613da8981ea24bdbc4597b0847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41629505a2a51a71a61ef609bb509c22

    SHA1

    4941ca69dd0e1ed4669b97dc65209cd284887a0f

    SHA256

    ac26ca4efc3a152744ea6eda0adc84f5218a2d0937374a092f4348fb5ef5e5f0

    SHA512

    607088edbda85f1c7a7b2cf73e5e186d90af34373c2149f2d186b2cea00ac3fe5afbb7a5dde103731de927fb80d080cd87b77c5753073724fb5cca1910ecaeed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    476b675a2aa01f0d6a1fa01d899df2bd

    SHA1

    b924a31bee7184cb839c44447f0739132ed997df

    SHA256

    06c873a5faaefb509e7f654e1208983c58e649e7a5cd38c3b09eff8f2390f711

    SHA512

    6c1575549161093bb66d226acb350acd6fc1771a101c9ba19b494f287a4f8113136b8984b7e1b264874ac06129fde1bcc5386a5279a46f855118659b53e5ab0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2203ce267f39c4cec7daba849f66146

    SHA1

    1cd3e5ca4b558d387d36676590ce07689ac1c889

    SHA256

    0f5a76607c540343e39d611b8159a2da84ee91821b9e15b51a64434635d2177d

    SHA512

    861678d17499428124daec6ad6b15a38134f385aa55ad4b130019806a15900c45733d8ca52c1290280a4c1b8e37034f9afcd45ece7158bb456632e0e5b9224b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5fb7a9c80ab1f9fe9b6960778c33f24

    SHA1

    3c60cd1dfb24a6514697787b1496255d1584162c

    SHA256

    d5b4fb5e95eccf89997574e87e5893c9fda00a5ddcedbf308ebc1f445042a10d

    SHA512

    70c2b92885e9ff3e31c4e92c76ca7c181158ad2b91e88517b162742d43e3a32c61f688d4a0cd300c70b0a8dce7ae5abb72505923bf79ec4d0aa37bea7405a925

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e4596d65594bea89116fb5d812b6958

    SHA1

    03d022c0bb3edde23396f6d940e034555d262f8f

    SHA256

    118634371da47326b87efb706218438a9304d155f7368680bb55bd3ea08b8bdc

    SHA512

    e02947997a008a7ce2c2df60b20620e07df8935940360656c43ac222848dedc06b7664f1aa9d428018a6112aec068a017c9db4684fe39e01069f1ef1108e1561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26284fa923ec38f5b9b7a11fa3855672

    SHA1

    2fc1a1534513ba520af135f265b393fb53ce073f

    SHA256

    1eb2d6ca1fa95db6e20cdc5d82e01920c4dec00317d062c594952765aeca3946

    SHA512

    88eff7fad3f18164dc80e479ac31f62c95ece4ab3b4d50958abc847219d7b4a5a59b083a548a86c8d425fcf37d856712a54bfeb710097b532354917ea49df00f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e9bc454ee21641be04780272f029c8f

    SHA1

    9c0203f974da8799d0bdf8eaaae91183b12a782b

    SHA256

    ec8e6a13b54331b9789bb2f00bf75347033335746c110ed2bf8489b3d2d8aa3f

    SHA512

    6d075888a416c37ecbc4fd25bc8180d7b4ba4df233af6cfaebc746d1a285311ab7fbb251c3ab2c5e0006c1a870e3e8833bb99656b0e92f934b2a11d92a4530d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f0443daf3e2fdb84987ae0a534e92554

    SHA1

    0073694cd5fc04e70cdbcbc67cfe3aa7302774fb

    SHA256

    335a48c63a9f5210eba0683f5c3afcfdb49c75e2c0f2bae8e5d7b152b179ab53

    SHA512

    55c6e3ad9711623da72c83e816dc6b5fddf6c75eb809d7b202685d6432ffce50125e548dc7f37c6ffde41296e2a2856dc27a48ea3c1442452d9ff06fb0d703b8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\file_web_logo_32-b074c7d607[1].svg

    Filesize

    1KB

    MD5

    b074c7d607991bcee487b6bab7fe41ac

    SHA1

    b04ce477a18812918bc66f567b474261fa5fed46

    SHA256

    395427601a092f229ea1af00aec598e8b1f8028d200dd6b0cfd51a2639f6d647

    SHA512

    b82e671573d07b4630a2f0295c5be39399c242bb7f899065a2918e89e826fe703fe6a176fb223ee361601f03d505d3a45185d335c7b30220a9c19363ef48e274

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\favicon[1].htm

    Filesize

    6KB

    MD5

    31427df76858300902a30522c179ddc3

    SHA1

    8e980bb98c9b0f1e39dd07ff76e6aa28453d519d

    SHA256

    88fb174d6c96ac128c22042bf8bab853373feb921fa35dc9f114aedf9041d614

    SHA512

    c34fed67462ef2dafe2a2f095c3703887e817443131e8be38775eb5e602cd3187bdf20c3157c18c348571d5e82e67c585b8b188d9e60c0b79900da55b19caa83

  • C:\Users\Admin\AppData\Local\Temp\Cab23D7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar23E9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/2832-0-0x0000000000400000-0x0000000001A96000-memory.dmp

    Filesize

    22.6MB

  • memory/2832-16-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-20-0x0000000000400000-0x0000000001A96000-memory.dmp

    Filesize

    22.6MB

  • memory/2832-17-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-19-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-22-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-18-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-23-0x0000000000340000-0x000000000035A000-memory.dmp

    Filesize

    104KB

  • memory/2832-15-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-21-0x0000000000400000-0x0000000001A96000-memory.dmp

    Filesize

    22.6MB

  • memory/2832-11-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-8-0x00000000754D4000-0x00000000754D5000-memory.dmp

    Filesize

    4KB

  • memory/2832-9-0x00000000754C0000-0x00000000755D0000-memory.dmp

    Filesize

    1.1MB

  • memory/2832-7-0x0000000003E50000-0x0000000003F0E000-memory.dmp

    Filesize

    760KB

  • memory/2832-6-0x0000000000340000-0x000000000035A000-memory.dmp

    Filesize

    104KB

  • memory/2832-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB