Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 03:46

General

  • Target

    eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121.exe

  • Size

    11.7MB

  • MD5

    b115a4683b00adc3fc396317620764e8

  • SHA1

    8073de2e9565611fcfe3a974117e8f5fa5cda050

  • SHA256

    eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121

  • SHA512

    a00217408f08d20568a8b5af24314ca4ee2133cc8a8dfa24fade4dbbc38becf00290068d1fbf68d57a1b062fcd8d4ebf931a34f0f370536701283a7a1f7f8e7b

  • SSDEEP

    196608:WT1QEHf6YthDVlDAJpFQoiiuCQqNObM57fyCZ2HO/aFOe382SHtmfU7:k1QE/6YJupioB+oiMpf/gPOePSNwy

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121.exe
    "C:\Users\Admin\AppData\Local\Temp\eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.qq.com/doc/DV3ZEZ3BGSkdkY3JI
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcfcaf46f8,0x7ffcfcaf4708,0x7ffcfcaf4718
        3⤵
          PID:3744
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13877894101034173563,10009828441969059558,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
          3⤵
            PID:864
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13877894101034173563,10009828441969059558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:644
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13877894101034173563,10009828441969059558,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:8
            3⤵
              PID:628
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13877894101034173563,10009828441969059558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              3⤵
                PID:1448
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13877894101034173563,10009828441969059558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                3⤵
                  PID:3628
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13877894101034173563,10009828441969059558,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:2
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4488
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:3476
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3572

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  f426165d1e5f7df1b7a3758c306cd4ae

                  SHA1

                  59ef728fbbb5c4197600f61daec48556fec651c1

                  SHA256

                  b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                  SHA512

                  8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  6960857d16aadfa79d36df8ebbf0e423

                  SHA1

                  e1db43bd478274366621a8c6497e270d46c6ed4f

                  SHA256

                  f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                  SHA512

                  6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  2KB

                  MD5

                  c67c3d7f7c3beeaa461aad537a0940e7

                  SHA1

                  27eade81a1b01d9705efca991571197c48c69557

                  SHA256

                  54ee50582600dc7e78ccb69e5a4a31aaa2b2cb9da69c60888103fa0efce8832a

                  SHA512

                  3314d116a1435c940078d7838d8c725268db344439916ef36ed4a6108f8ebb05cbad764a84945a0c412a3ecf29a62d1e9e4369a721b8f08e88fce77253e522b2

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  794B

                  MD5

                  673398c5112b99a0374d91e95106282a

                  SHA1

                  3dcd10e418c587a3979b9c42290ceafd73de0150

                  SHA256

                  1747394e9e78a0b98a0b1f288bb3338103ebd674c0a6d888450668f8fbf30dbe

                  SHA512

                  3d7bbc4e665ff2ecf7c6a4740794a8662197f5fbb782675e12b7601eddf7dc12ae6017e3f30059bc8b3936cccfae48ec9ad6953912433d03cfcc0d42dd5d91e6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  111B

                  MD5

                  285252a2f6327d41eab203dc2f402c67

                  SHA1

                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                  SHA256

                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                  SHA512

                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  126439e84178bf71e2fb304aec598e83

                  SHA1

                  ee27f0d3ce3d7b744a778c6fe1bdb811871f3766

                  SHA256

                  d0873ea0b6c0368fb6344f13b3cbc5b01c1cbcb01a6400d75dda18d1aba383e6

                  SHA512

                  f244a06790b7d6423d6c97ec0423497074899c564118b74b33bc3752f01cb32ce5246dea0e8d6836f217e3d21f66f43911d439537df4a20bfc563d4231fcec1b

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  5a68f4c6d50bd0c586f4919401fcd777

                  SHA1

                  920623324a303d26f64a5439f758bdd186d882ca

                  SHA256

                  caeef0455af9083363461bebb85072f5dac3ae5b930fc5c92dc82ddfd9eaa5b4

                  SHA512

                  33ce0055369507c1112d136dff61b1032fce14db7d013d3ded694e0098a7af3399d49bea2faf6ac26d0a2302d74f794ccad867f4c583634ce2ec62f3fbb2d42a

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\05c05d0d-48a4-448f-9266-f154a85784b2\index-dir\the-real-index

                  Filesize

                  72B

                  MD5

                  1c949b3dd2b996a097c0fcc7b87ec2aa

                  SHA1

                  204b9b3acf0da0bd1239d74458f9fdb5e8f753c1

                  SHA256

                  824a8f8cf92324f1c8b6aa38899a68bd74e2c596dcb0e88bf6dab3d639842ed2

                  SHA512

                  9239f51f3430f7b65e16fa05fa7a9da695e38fc722470600086639b47f7e588bf8b0137719bea23f111491e1efd95a0a81e15abb755f0dfc942906366e506bc0

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\05c05d0d-48a4-448f-9266-f154a85784b2\index-dir\the-real-index~RFe5831f8.TMP

                  Filesize

                  48B

                  MD5

                  7ee1a29e056667e322bd8212e893ad30

                  SHA1

                  19480580d2345dc4761ee332bd5c4aba94003e63

                  SHA256

                  1cf9b9bb64de67712bf17749800486d06418a93afaa0239fba9614b3c9f75a84

                  SHA512

                  b647028b95d54459240ac348617fa88c30467fefb94f81391455376e86cc953de5e47da826601e43e51df3d4af8849ce25a7d58dbd2dc8afd27006d0bbfbb2d3

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  97B

                  MD5

                  a0990da9bbd7735481789bcaa8500067

                  SHA1

                  f7fed6d581a3f0bbc5d13751d197b0420d182400

                  SHA256

                  13ab7309c50d5f4c4b9a51a8963a06225a14a0f2c5ba5fa004a15b267d307ca7

                  SHA512

                  d0dee4d047c63ba2880801bd7dd659194d88a9cb262a018fc66bee0d37d146bdea4d0f393f4f01b51318d65680a575bcc7dab70d0ee3624c22a0df70980f1ad1

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\f340b808fafa9fa07eec310becde92c3437f580b\index.txt

                  Filesize

                  91B

                  MD5

                  35336931721cc347543b7d9e26bd7e78

                  SHA1

                  dd855f5618bfc1c1a837f591527bea8c4e9e132a

                  SHA256

                  629569d168a3230e6e9491cf3f8aa849c0ecbe49634986e235444c1ebd3f7485

                  SHA512

                  eea13fdf22c15d6c1f6929c65406fd4643de445fed45b6b1ffe6db3afcf0b418eb7a0a1655adba2d3a25ad2615c9f904b453b4616dda908557a69642035b0f36

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  96ed8593cac059c4a65914ddc969d119

                  SHA1

                  2a38f6c1d08f8809c6e29df95558987d7f42bc76

                  SHA256

                  b77aa64d5ee63ab3a2c7327d86d6aeedad8ca57c061bfc6e4c9effcd57b182ee

                  SHA512

                  8ba7e7d50b01681dbf66ff3553dbc5a2d6c2f692f73c46d45e8c7118df2d681dcb282db5f36f9f539299a7afbbe1bf64144ced9217d9caea1e6fe657f48c0182

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  27f07f2de13a474214177965f0ddd562

                  SHA1

                  79363bb23621be6c89bcdd644c5c8e1efa9bcdad

                  SHA256

                  14cea7e290d5a00a19d60f8fb6ab2a8ca1e54f6aaa4aad040c115c9a35d44ac4

                  SHA512

                  dea8713f3ed1ce17fb968d070dedfb0d8fc223c7ca75324f8ed561c3f105c3599a661ad157ab8ae328234c9fac8ab0393c6ecfeb4f6ec7ad7448f1c5419cd063

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                  Filesize

                  370B

                  MD5

                  110dc3b03231826b942873ea23d6f8f2

                  SHA1

                  f58d0f7ae50df749e31a9467d3484c1c8f9afa3e

                  SHA256

                  68a56ce69fd4b3bbb5ad2c21d4de2d2184b1f52392f55e1768f26d5a87c11cf6

                  SHA512

                  a95af8dea9ec6c059d841aca569cdbf35f13f84f6511f2cdb842a4e90afe36255508b963ada634e02ea6526a6cb62a948b9c7619e06406d6090c9458b2bfaf74

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582507.TMP

                  Filesize

                  203B

                  MD5

                  41a0405f0cd2f3be829c6334d2d13413

                  SHA1

                  bda4ccf47d5fd2e34612db76bb911949d1507302

                  SHA256

                  dc14525eeb165d833c7cd30136843644b905a5c7ffa9d776c2559c28f5c2ad94

                  SHA512

                  dd9edb5d9995839436f3a3bb945d3911b9cc389bb54c0a36c5f67f75e36355af78391e1889b4660ec30b279730bfdc0b473d3069e8065b6d549ff88905ca9837

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  bb98ff8811e2417634fed66b97313633

                  SHA1

                  f245756774dddf4b2540559331e3029a15d23a7a

                  SHA256

                  fe0552092889b4ec3ae08e3dd555da7d76eb25a792b3f41ee1146baaa1161321

                  SHA512

                  eeaf9cbc8a57162366efebaca91802e3e5eb231fb736e22494dc213e795bd2cdfdb7a93f9ff5eb8be684cd2b89267d1579aad75e17987ad359113a8258806d3e

                • C:\Users\Admin\AppData\Roaming\Downloader\libcurl.dll

                  Filesize

                  729KB

                  MD5

                  f28f2bc74c40804a95c870ea710d5371

                  SHA1

                  8654243c7de98a74ede2bcf45e8506f92e77d6fa

                  SHA256

                  cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

                  SHA512

                  2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

                • memory/4880-17-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-7-0x0000000003A50000-0x0000000003A6A000-memory.dmp

                  Filesize

                  104KB

                • memory/4880-21-0x0000000000400000-0x0000000001B1F000-memory.dmp

                  Filesize

                  23.1MB

                • memory/4880-18-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-19-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-20-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-0-0x0000000000400000-0x0000000001B1F000-memory.dmp

                  Filesize

                  23.1MB

                • memory/4880-24-0x0000000000400000-0x0000000001B1F000-memory.dmp

                  Filesize

                  23.1MB

                • memory/4880-8-0x0000000076130000-0x0000000076131000-memory.dmp

                  Filesize

                  4KB

                • memory/4880-25-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-9-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-10-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-11-0x0000000076110000-0x0000000076200000-memory.dmp

                  Filesize

                  960KB

                • memory/4880-6-0x0000000006E90000-0x0000000006F4E000-memory.dmp

                  Filesize

                  760KB

                • memory/4880-1-0x0000000010000000-0x0000000010116000-memory.dmp

                  Filesize

                  1.1MB