Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 04:00

General

  • Target

    4940cec93f81b37ae28a67e83c1bc366239eb0d5158f827f9e26f22665c527f4.exe

  • Size

    11.6MB

  • MD5

    84a7fb37ada6574e16ce1e6411412d75

  • SHA1

    9fd9a123ad8785b64f20f8cb0435d945b2150676

  • SHA256

    4940cec93f81b37ae28a67e83c1bc366239eb0d5158f827f9e26f22665c527f4

  • SHA512

    d07825ad96a4736dcf5070f3ecd72ae00294a61a7354b0f78decf32ece916c577a20ed842fa36fe3fe54302d26b39dae2e736958d681ad03dd093731152a2156

  • SSDEEP

    196608:3k6EtwqLJYNZAjYUl8frgH3N0lDnt46PokOXuXiWWz0DIO8:06UwqdY8jYggrIWZz9XiWWzHX

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4940cec93f81b37ae28a67e83c1bc366239eb0d5158f827f9e26f22665c527f4.exe
    "C:\Users\Admin\AppData\Local\Temp\4940cec93f81b37ae28a67e83c1bc366239eb0d5158f827f9e26f22665c527f4.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://jingyan.baidu.com/article/93f9803fe0b0eee0e46f55e1.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3000f20d301e1df9bf707d20f5132240

    SHA1

    faac1eb6074413665bb724d88f892dbbd84c1d56

    SHA256

    5e475faed1f6a5b04c0a5c88040b61d89cda13a6d8f65c5fe10170601d86cf00

    SHA512

    287c0f9d84a53f27096fbc8a0f2503a26658d1a14f403339fb2fc5250ce3c197de591eb3e7f23c74ac112b748abd0914d6345db8664e49f687d9faebfa1abca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59ca2b5257bfbd0135bfa2f4acdff11a

    SHA1

    35854cd11d453423551341d5f2d5cb4544041b86

    SHA256

    88e184014100e2e6e6e84f3e2ce687705a63bebc62505f98596998d7955718c5

    SHA512

    cc9f630af0e3a547585114e853dbffd4eb881898a31c1095be2dd276d0a58f29e54365f1038162f1cdbc9c2719076579e78a55e65d54223e90890bed89d5feb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    256cd499958854b5619143dedcdc5bb3

    SHA1

    1a214ffcff2da860d499625a40d6905ef8685051

    SHA256

    6679eddf7e0c03a336877eb6952700cacfa28d7754ed39c027325dbf3fedea2c

    SHA512

    fef9c2a3c656e8b69f666e0951b6fc3615509e46b881de18d74709a40312c411666fd10587edc2ac315a9e69c63f63c2c3c0a033aa3700a0510090ca28f0a587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd56c0829f2af6df7fe2d26bee8f66ca

    SHA1

    9f80b956a6b2625a18180498e9c5b1a9c7b38f58

    SHA256

    832de37810c6556a60b4228e1f3b396e4b2cdc383a0c4da67452a9ff992b3668

    SHA512

    0ad455115561fce9e1db09e9d4a751141a3f83899bd91c4aa56cfb137fe0ef458d94e40763e63ff3a4b6623280d39d9f6b66c4e5666cb8f6b1155b76ffda9959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08f734d01e776e42870b082a5b3ed2b7

    SHA1

    9dc4202ebfab1c55a2055f8f98c21b665de68676

    SHA256

    20f9adb843d47002b38d7c65ab205275edb2ff55d9797a19b04bf985311831db

    SHA512

    9470881fa0543e6748044631033f20ad58956f72e6408a440254b3e2c13988f34484e28b4e4198e93ea872a6f0884ec391c48f8ebd677c38a6c68302e365c06b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    675d439ba2d99b70f7bdfc0ee0b48bd4

    SHA1

    905f0d76e66e906d2a25bf595d210782032ff895

    SHA256

    c1a0492124dbaa5db9614394d1a04bbde4409814e2642bdf354b6428608aadc0

    SHA512

    40b7bcb727388372e7046650ce2cb9ff28812a13e470a307513c74d9c7d2864f6500ea561644f218c7dac91a0b423ca01decb166417900037ac28d45245bcb35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a75dad98a2fc2ba7fbdc9c74486d855a

    SHA1

    03c42255f8dfb5ec54655970bd61628ba77bd556

    SHA256

    18970f3ce7c95a1b4d72148a39e200ba603109949b2a36233ec3c96e3fe1f39d

    SHA512

    c515196107006f91675c26604fbd6626da0853996cc3a4ca39d7926a072408c1c5ca3e1c6496b69e512bba9fb2deb8294bf756617f39d719b001b2ad9cda0d3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c195cf1cbe921706d041178694a89dd4

    SHA1

    d49a5a173100df12ff04b481ec5f2abff7e9f5bb

    SHA256

    fcece8358d9976d6167fc54a19ea568eb3cd9ec17aac91df5471b5193a9e9ba3

    SHA512

    0577e62cbb2a01fb3ad6de94118d7e3864260dfda00e18b332ba5bb9ae2a6a84e6a515cd2d24e590f78a6cdd1043e45f1cd8e81005d842704d4ff691f06504ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40d1b0040c7018d56b58e6ea30cd7c99

    SHA1

    78e431e92b6cb6e8558ea02b4031d98120fcad57

    SHA256

    ab3052971f33814ce6bf25a760794374f790d88e5c4da469e030090f25b3d26f

    SHA512

    81c6ff4659cdf6c4a7a18e9a1d7e612b1db5de3623d69911981033e743a0a3c284b290dd6d5efb463348f5e61d1e9f092792b24d5693bd7f85ed187ba0b9deff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f75874ed99fdb7772f5596079658fa7

    SHA1

    26332d9bed76160d1a6f540f2d11cdda7376cc0d

    SHA256

    d1272d29f84ef72149602653ffb112eeb2379a0b3f2357fa6dbeec2e3ad1b688

    SHA512

    4921af8b3491833d19425ef329eefbb98722d314d862a1f810d512412e0c7ece343577ed382d937b8844be62abf54d622d42d7f9605c0d70a29df8fe10c4e995

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6151030887c373b985902ae5bf223bee

    SHA1

    375c6107c8c9f7fb2a7d77e0bbf031e7044703f5

    SHA256

    fae76044b8cac717a7693f674ecb015e42c2c81bfb80da98c7e4c619d0a238ea

    SHA512

    da385ca20280f9f77bbec3f09fe3ffbc0c0b33e3537ed58b65d06e55e8b6473eb506447a1ce2cfb84f0142815f981ded39e7d29fcb83127c86301bab044ec942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7711ed0aec63f38f557893fbc5145de

    SHA1

    2954416c6fe4726f5c5146754f496ffa3f8c4d62

    SHA256

    d8c03ec991c72d37a4523314ab7b54a4e10a85eac85a0dd8e1c60c63b58cc336

    SHA512

    f403f111a8ff67a8dafd7933dbec5f13c6cceba1df3d5407408213780838c8cf77bc4d911bcb9ddfc923215fa8ccb2e4311bc055950c0a556ad6ff4a1228a5d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e336a352c39798cd365d975fa71dba67

    SHA1

    83679bd16df21beacba452393c2de49a04bfd916

    SHA256

    40fc9e5c6062fcac138a7474604abaccfdd495b5a7b1a7a6e23f2fa3b023a4cd

    SHA512

    1981fab9bbcaec36b51e4f517be43308d2ce8cb009c51be4d95671a2a17a6571b757de4a5f0b54ee68e3b64dcf07ca66ace36c6df150d54466d2b8242dd2651d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    920c5254393915a8ef971bdb16878591

    SHA1

    8810d3afba95b40c66effb18d2f8ad704925a367

    SHA256

    3e936891b40b5a748794a77cad34c933ea5f20d600f5876fab0aee685c201c7b

    SHA512

    fa2c505d225ed5e310dd0faff9b7224395d4f3ca9ff5dade9cbdffd69e676c7ca9c174ba0b74133333f4685f7e34138746790db4e801ffdae7c50a225f5b0d3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2165c61d364575466cd8f1657db25f77

    SHA1

    4f8dd605405b9b3b3b456c873d080d9120cb90ae

    SHA256

    a09912ad3835576eb74a48f573c542d97b7f1f64ca315439f9c75b87e34f499c

    SHA512

    ccc823df996216213bccf5b1071d56f7d073606509d08181775574ba0ffaeaed5864af97ef47437cd93fb3e440b3fdbc57b3cf1dc762f9c98dc0494bf631b294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee2e4943331de0bcbe6b052eefb4fd41

    SHA1

    63c98764a1579f9004ee9867e3bacb822b5efbe6

    SHA256

    f9e2935f3225a273748aa34fd188af0e229ac5966f35f6a292a6e3b262bd3d3a

    SHA512

    0bb0f90254b37cf0ef0a881ff3326bff64156225168119c4530cfa17b99032861e8cc663ca8e9d313c3da04e3847ccdd38fc47db455b777a23bd1dc59c6ac640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e28a203fd9a167cf498534b38b47c6bf

    SHA1

    f9a826ef1e81158424cab89551875448ce2eceb6

    SHA256

    a506fa322d846ed01befa831d023a280bbef479c7fb1711a1642ec3ad6a89450

    SHA512

    8e9880efb8fe55a606d88dab70a56106198b80c0f4f04f720249ce49744b4b5514292fdea43b1ce38d4e81d5066bea8589b39651f2518ec893fe0f7da729034d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    917bfbcbc6a0479c9e10fc4e552178ec

    SHA1

    815a6cb1d10b4563b02a4158f05e827758d27d9a

    SHA256

    80e146cd5734430aedd29aff3c0338e69d190301593e69f93c37fce3cffbd923

    SHA512

    812a68f6684dfa5f103a6ac6f8348fa78c794e2a491352c3e807108e542474350b8c488d3fec66f2a25b461e32b29f5044efb1f3383a6a35210581acf426a361

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27e0e97e116aa85b1775f69f6e396ac7

    SHA1

    2b28a6bae801b9b74e2dfde266b32e18cf91a07e

    SHA256

    f9f9bc2f15f209c59f78ad42597fc6f19fbc21413f24794a7ab0151ffdb018aa

    SHA512

    2598b6a6b05fd03c55c1eff38a3b21b9f7c6afbfa4721e20b953bec851765a1b9e268db2d25da33bec45392ec596129075efb97ecf2a0e954d3638a42442dabe

  • C:\Users\Admin\AppData\Local\Temp\Cab1C3A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1CAA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/2068-16-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-19-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-23-0x0000000000310000-0x000000000032A000-memory.dmp

    Filesize

    104KB

  • memory/2068-20-0x0000000000400000-0x0000000001AC0000-memory.dmp

    Filesize

    22.8MB

  • memory/2068-24-0x0000000000400000-0x0000000001AC0000-memory.dmp

    Filesize

    22.8MB

  • memory/2068-18-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-22-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-0-0x0000000000400000-0x0000000001AC0000-memory.dmp

    Filesize

    22.8MB

  • memory/2068-17-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-6-0x0000000000310000-0x000000000032A000-memory.dmp

    Filesize

    104KB

  • memory/2068-9-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-11-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-12-0x00000000763D0000-0x00000000764E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2068-7-0x00000000763E1000-0x00000000763E2000-memory.dmp

    Filesize

    4KB

  • memory/2068-8-0x0000000003DA0000-0x0000000003E5E000-memory.dmp

    Filesize

    760KB

  • memory/2068-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB