Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 13:10

General

  • Target

    ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193.exe

  • Size

    11.3MB

  • MD5

    527d418380b0e7abe98d699458c8a73d

  • SHA1

    e91358f1ea03727bbf4e1fc16c4e544fb04ae9e0

  • SHA256

    ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193

  • SHA512

    ad44c91b5e0aadd11bacd79d1d442c68780dffe4538b9563e5cc940a5bef667277da92692e2b4706e60044bee32ea9d73392d9ced7207b0f6d0834052377e518

  • SSDEEP

    196608:l1AJb80lqV+MKoZqbfCJ22zUVAmKCOhjSG9xMNp2LQ99jFx+NE51hANP6MoFfAm3:LAJb80AVAI2mUVAmqSYxdk2ohaP6MmYk

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193.exe
    "C:\Users\Admin\AppData\Local\Temp\ccb3bacaf837b42216177f0b670088d8ebfae2906f5a8afd59167a8e1fb35193.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.qq.com/doc/DV3ZEZ3BGSkdkY3JI
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd7eb846f8,0x7ffd7eb84708,0x7ffd7eb84718
        3⤵
          PID:4556
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12876160058601004375,4382144758952881830,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
          3⤵
            PID:2872
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12876160058601004375,4382144758952881830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4656
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12876160058601004375,4382144758952881830,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:8
            3⤵
              PID:4104
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12876160058601004375,4382144758952881830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              3⤵
                PID:4560
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12876160058601004375,4382144758952881830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                3⤵
                  PID:1028
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12876160058601004375,4382144758952881830,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:2
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2844
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:4772
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:1280

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  34d2c4f40f47672ecdf6f66fea242f4a

                  SHA1

                  4bcad62542aeb44cae38a907d8b5a8604115ada2

                  SHA256

                  b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                  SHA512

                  50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  8749e21d9d0a17dac32d5aa2027f7a75

                  SHA1

                  a5d555f8b035c7938a4a864e89218c0402ab7cde

                  SHA256

                  915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                  SHA512

                  c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  2KB

                  MD5

                  2b3e0f2363c67201eeb43beca7f25226

                  SHA1

                  81eea9eefc6302b4f971147b19bbe053bdd7a4b1

                  SHA256

                  8b2b53828dbcfade244702e391a03837dd970e8a6102302d1613bf19895c4893

                  SHA512

                  e48dd95dbf873c47b8c185fb7ef891de812665488d8c09788e4bc7f98ef9fc891b5d20b5ed748b29b48d2a20292169d74f5158a72b844730a77c927784c48274

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  640B

                  MD5

                  63ab46088cc7303f6163237f0464ffd1

                  SHA1

                  f720a2f835d4514b043e58b41004772b344c67f7

                  SHA256

                  2dd24379d473ff8d1b3cb4a317288ff6fa4e1b09a62190846f97edd388be330f

                  SHA512

                  75e1c934e5400f910cf359e6deaecf2ba740b7740a98c3c310dd21114dffd01ae33cd341772ee244c9cfadf395d0c6dc167f915e3c110b2f648bbd6e787090b9

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  895a19b0b2b4b9f9e61aa64e067e771c

                  SHA1

                  fe14173063cf3f779c1570a54989e4e19dca13e0

                  SHA256

                  612a0993773e8cea273c527e72465e91fbe5eeb811c0c53f800f5d26ad22ae1d

                  SHA512

                  6543c0d11da050e6224c3f45d95b25ae1bc7d8fc1e49402d4f5090b432aa47f20336358826736efb74be061b3c3a4f08d0e6a313cb885e8ff1878413264f9194

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  ab9d52159f8853cafd24a436a39b05b0

                  SHA1

                  cc029ff4d360d4a16afd7cdc3beb32796f0235b7

                  SHA256

                  2546f9995dbd3ed8fc4bcd1ed25af0a53d91388933ec548173ff7a08c527363c

                  SHA512

                  b338cc5930fdae269f919f3d1d78fdaf55855a43246d063f8a67abe4f6e0b33ff3e5e03ebb83405610aa0625a0f589543f87025d067644949a86fbdbab28bef9

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\d78a2e18-0df1-4830-9d56-c0fea0ab3bdc\index-dir\the-real-index

                  Filesize

                  72B

                  MD5

                  9eea11d3552745ede64c1dffdccb0e8b

                  SHA1

                  c4d3d2018eb9778e2e385029b5828a6fdc671a30

                  SHA256

                  5e0edfe95223efe24977c5ca151e5ad7f6b27fbd1c1c68ea6f2f67f8dd9ff26e

                  SHA512

                  c2fc40a19c09c516e4b0b48b57019b7de1fe9bcb2482a4e3e7dccc93057d9b7e99929099b22fa2f3017dda457732225bf4836d1d68b191aaf30ca952b424c813

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\d78a2e18-0df1-4830-9d56-c0fea0ab3bdc\index-dir\the-real-index~RFe580376.TMP

                  Filesize

                  48B

                  MD5

                  0764e2b0736668362611e47109b4f02e

                  SHA1

                  9f679b6826e813b561bc2b3e6f42387a757e5539

                  SHA256

                  4317b4865ebad83de80558d0a83d35f43c30e5d1a56007711a61a28afd3fdb62

                  SHA512

                  b26591690c360358bcaddd925a4229fe5c76d5a4b7f27fb0fc91b943a974a8d1158ee187f05419f45b8377e0a8f0b10364abf69997deba0ca3715158a7385867

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  97B

                  MD5

                  a5a992485959eed7e31189e63cdfaf1a

                  SHA1

                  76f09f2365a833ff8639f8bed3bec6d1d1058c77

                  SHA256

                  82948fe8dde396884ed5685a71ee9f40874afa6308550c85ebb8417c1603e969

                  SHA512

                  6c0cd494366164b5de32738738a83e9135dbb5dea851f9a12825da3dba1252fe2b7c2830c98b776bf3d31388f9f20a14ea32d6dc20a6627a10b5cc6113193077

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  91B

                  MD5

                  17fe0abba122dcf2a6581f094fab5970

                  SHA1

                  3da982bedcabeca04aa2a5f7b1c490aaa04c93aa

                  SHA256

                  ef7737d2b817c41960c2c944f27c53b0f8a053d42cf10aed0d1f4f70fcd51ff9

                  SHA512

                  f97c9a86c70148009317c57cc347b7c17bbb75a42b7074f50167a875160e321c37d17f885de91f3d40e190bb2cf66b4bebfa1903f016326429c5655381232e41

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  e195b833427ac129cfd5f1cdde2c0749

                  SHA1

                  23ad32305eb204dd11a2c9d167b91316643619ff

                  SHA256

                  23b9e2a5c16a9e8dbb10afb2b457407c3b64efd39995d0af951d15fe3845de06

                  SHA512

                  9c481318e899b8659fd883944f0abe7b14cb2831866885fbd9ef3acf1e0ed5e8b69c7469c1d24b068b0a37ad2d789b4972f0df83ff06fd865f50c7c673098bd2

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  f1d2b09b2ee672f8d5cc002970223fa5

                  SHA1

                  a3ebc5e34c428944c7cb78595372c800e7589483

                  SHA256

                  9ed0df7e4c39e4963b922e25d3cd87ae4f1743ac29e203f1af40583a5393f91e

                  SHA512

                  f4de18ce38e8fef437c3c057561a83c04ef220b1bd9fe4fab711c8f6b77f516058eb6d41b66f2821dfb0361d46c16db16bcb8fc87cb3919f7e215288606d35be

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  c5e865ea1e9be093248308799c9bd2bb

                  SHA1

                  11e551ff8f1e3896aa106dfe7632a11b380d7a88

                  SHA256

                  d9c39755a69f5472b5c2bc84bf6829f29f99fc6cf47ae56b8d5197d6d46d1ca0

                  SHA512

                  d4e7b6e9d8b2401ce3904cd436ece7b3ba61498024439518a256723e6b5e27c39309357a73b13aca54407e64d18e2c8c92d3e7743589054aaa9b32e5ab8aacd8

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  98567709ac0b1868819f60c0ed3ae01a

                  SHA1

                  37ee5fe950228d762ce5b200ed6863721e8752cd

                  SHA256

                  7a84a11623f31bf869e18b329349a8d984a88e6c064dbbe1749ba49586d03893

                  SHA512

                  1d9f80c4938748fd292cb1dcb0b950288ae6be0e50953c8d3515806b77a78770aecac86e8eff4b93149ba7b71da293361e6ec649b506a4526e35467ebe133444

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  1bf1db91b3821f0ef2062b70c2ea4712

                  SHA1

                  fe87198eb2cd63952729867fee11ed045bc9c0e5

                  SHA256

                  d92b6cefdd9962e3939a83e0e26c630896567a915a06f05db5e80bdaf1b4f588

                  SHA512

                  b99091cab5e9c74bf712baf960f708f3a5c0bacd5c464020deaa7846bcfb19f81c5d0fd7aedcbff87cc0666941dc6e595e9b21e72c56df0964028f3663e905dd

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f51e.TMP

                  Filesize

                  203B

                  MD5

                  601c454743cf49538cf25fe87c86c6d6

                  SHA1

                  63617c15ec1214b6de33cfc99b1441a0f79b9060

                  SHA256

                  95c720928913c06809c95abc0e7ff283b2aea5c758fe5a4e69c7cda7248d8283

                  SHA512

                  271788bb4c3a5d714abf34b1fa4a675844f8148d5554d4ee040cb946b19f852891bc0cc77937cb8eb2ec0e5ee76383d90b2312c89263883daa36b1e550386f09

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  fbe9c7ad01e7b6724b9baeed70719075

                  SHA1

                  62ec77630de81488d87c77bbf60e1307178942bf

                  SHA256

                  1b7e9f6520a80edd5497cf4be945710c0d3a0c9e92a12d9502d5c9120b992ad9

                  SHA512

                  9f2871522e0cd796b622ab253d66e5a26478759ae55fcd813ab64478ba1e081f6ed7954d54d331074b2f407a739ecf7c5d0c0d1f678cc209b986e1035e9ef0cb

                • C:\Users\Admin\AppData\Roaming\Downloader\libcurl.dll

                  Filesize

                  729KB

                  MD5

                  f28f2bc74c40804a95c870ea710d5371

                  SHA1

                  8654243c7de98a74ede2bcf45e8506f92e77d6fa

                  SHA256

                  cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

                  SHA512

                  2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

                • memory/4424-7-0x0000000006D60000-0x0000000006E1E000-memory.dmp

                  Filesize

                  760KB

                • memory/4424-23-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-11-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-8-0x0000000006C70000-0x0000000006D60000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-22-0x0000000000400000-0x0000000001A96000-memory.dmp

                  Filesize

                  22.6MB

                • memory/4424-0-0x0000000000400000-0x0000000001A96000-memory.dmp

                  Filesize

                  22.6MB

                • memory/4424-9-0x0000000076DCF000-0x0000000076DD0000-memory.dmp

                  Filesize

                  4KB

                • memory/4424-10-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-21-0x0000000000400000-0x0000000001A96000-memory.dmp

                  Filesize

                  22.6MB

                • memory/4424-6-0x0000000006BA0000-0x0000000006BBA000-memory.dmp

                  Filesize

                  104KB

                • memory/4424-17-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-19-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-1-0x0000000010000000-0x0000000010116000-memory.dmp

                  Filesize

                  1.1MB

                • memory/4424-20-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB

                • memory/4424-18-0x0000000076DB0000-0x0000000076EA0000-memory.dmp

                  Filesize

                  960KB