Analysis

  • max time kernel
    120s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 04:04

General

  • Target

    781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b.exe

  • Size

    11.8MB

  • MD5

    2a50547b0862c3670769f025619058df

  • SHA1

    dc4044527ffe0a2e3e231f9bbe725f4af7960e6f

  • SHA256

    781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b

  • SHA512

    7285260186f2b513bc43178d79f3e6f61f0c5c499db0eff0cb7ee6a0b24da7af076b46f3e0bfb7a6f094d750276b0bbfa77e216896c5e817c6429a03919a2ebf

  • SSDEEP

    196608:Bx0n65dYHadykfgxPFbks7zmELJvBJzzFflbWYzchp8IZTV56srubyohJny1hcGK:g65dLuFb9GELJ5Jzpf4icsIZTPibdGK

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • A potential corporate email address has been identified in the URL: png@3x
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b.exe
    "C:\Users\Admin\AppData\Local\Temp\781dffc78dbc31aa8a397263fd50d2392b6a2bc463f6f8cead63edb05efd6d4b.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.qq.com/doc/DV0lrck1MZUVBRXV0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    b981628186a9ddfc988cc2c858518fd3

    SHA1

    d922bf14b42e70f7e4ead10aac07616389bad120

    SHA256

    40ea5b2b438daf66a4134a0ccb58d2cafbe204e6ff29b035a77579734278d6a8

    SHA512

    2730816817a3360c0575bea414047b8140d8fc52b7f34886f01da2557e7645eda5fd1501d4d599c00298c6728967fbd08a31e6ef98ec2ed122ca28ac8caa72c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b82dca5c09081b2bf5ee3b12e85d397a

    SHA1

    2e06b24395dba56dce7132a5e454ad05368396b0

    SHA256

    adf6a23052051ad3e570fd82ba331de97f7c4a1fa49904d49a3336b692df3761

    SHA512

    7a490cbcbabb61f0f235fd48ae47ec5c16c70676c338eb0d326ebe71c832d787a61e78a49e90a833e3092d36595b7fc1b6ab80c315ac5c6f7d0b5a4d530d5b82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0a3c4633e4bbbbe451e9c7b8aa916cc

    SHA1

    99598094222f2df3b2dca29c11ce930f4691111b

    SHA256

    05c5880dd6132629c13d3a076094460331e5021bbbd08c3f1c9d352579228ca1

    SHA512

    f37722e1816f868dff8b116be793d6b166c22fcc3ec4af2eb04b5572df7b230a4d48790b528fdb0966586fb7b50099249f8a1da543c5ca255e45ce8f4cd007cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    143d9f25a3539d83f87b854cbf553cab

    SHA1

    986669839d31e1ae3b4a66d9c2893b95bbee2fd4

    SHA256

    6bdf9b856521eb4a4e4a9dd35d5ba2f66b0e355a307c6c0360ec4a41dde647ab

    SHA512

    86890be77b0028ac343ecdc5174667abc8107e139fdf014329c6871191579ad3b43971b8188d5aa36cf5734394370aed2ce976d31159cf802f8648d5b6fc6319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd7828cbfe8e968d592b4d902901d8bf

    SHA1

    57b5737d4bbca47b8ebb5b7c278c0c64e079a72a

    SHA256

    fd4937fdca5a4cfe79eb2e7dcca636fd5eb5c0e59746e3883d26d923da604f64

    SHA512

    40fc3ec373cfa900616a770d42c132e42315505ab34e5773b6cc0f27cd8aee172a4be9f9e7ed4d0bf11144526659f99302bf614d8068b453373b45760fea0144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d31431d449191d8f41185dde5b969f17

    SHA1

    578a91358498832e95995277b04cc96ecc2351d5

    SHA256

    1a124c29d32b7604ce3e904a8f97e4cc3eb29fa771326a89968beff5130f57b1

    SHA512

    912fe4cbf0ac6b3da822315a8f41a0c8145467b76e113b5068ba79b443f5ccab1975eb4ab77c5300f8d1587576a7cf6f6a5270ca5a7a9a18b3af6d32be487bcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc8f4d9b6a785fa22aa3f1a2f693c7d9

    SHA1

    b3df74c80a9f62da326c34c870bb1b69fcaac9fd

    SHA256

    2696fa9ad6d6a71b4c145ba8b97dcf7db099eac95eda0112eb55d6359d8b7b52

    SHA512

    5882eb6cc3d05c3b36aee7477f8400506291a6198fe714defe1df5c91c8246983fda961b9f96af4207d370eb282c1f7d985ea61fc92a71a9f72622a8f35790c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eae21ef1ae612558d2e00ae6e87a1125

    SHA1

    ee46920bf202dfad1d7e7b1d52223bcf40780ed0

    SHA256

    2b02972ab178864900bd2361513f502c0895b465ad1a51fcc84fd2e094746b56

    SHA512

    89d91e34f26e20dcfc42d637053078324cf2dee656cd0cabc2d276427249fd9ef0e167862d90c3375c850ca81dd2e7685801e918a5e67069ff84379729cfcb1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    185323c3f4bdc4b1d33313bee25e89c3

    SHA1

    2230e833994071240cc589523b80b70341d4c659

    SHA256

    66e3b556b98b6eef5ef7167912867be5d3f7c69f9940aef476857db3e01e0f1e

    SHA512

    9f400923aae451a0ceb468fed6486db0aea5acfa98175ca77cbe42fdb95e0ef5f2b1181948999dcbd38853551a3bee53c53058c97ba9dce048b502c376a81dad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb80dc238723c5c8debca84a42932c88

    SHA1

    42dea04bfcf6ee4ee6b27940cbec5251e4cd47a6

    SHA256

    879cccc10f591c5f40b418ac128ed836f9b9809b56cb205498eff57c4c9056bd

    SHA512

    2c74a6c12fe9ade4132a351cdf61f48a5b33ec8462dc118c5c7854d7d0784fa01b8f509fe6eb1fd604091c6b4f1f91e05c2ef4129a2985a89446a16ba809c1c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3549cf4efe6c46003959f2ff855a290b

    SHA1

    41ed3c6d74fb4e079770533980058e3e8dba73d8

    SHA256

    a89bccce50f9aedf454cab1cee90771d5a77aebc0dbe6abb5d51b7e2b569125f

    SHA512

    cd505c3e5d3b04cb82b2fbc0a449baa9ae386508d18e452851dd9c316a6fce67272653927075c93926f4f6d0614437ecc4a1e72f5336b41e2af4835c08712484

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0078b744fce54c9dd9c4269131d024fe

    SHA1

    f41ade5f337cb41a0f931edb90f2b38cda19b473

    SHA256

    f6c74d6a5c2a43394be699534fb428d31fb57c735fb9de17c07f9c9bfc8d89d8

    SHA512

    0225ad974ded3c6272c9d8d43321110530ed8c2a285c99d2fec93c42c6b3a8d25919d4898bd77fc5afb197b0bb24e515dc98426be4902f9fea9f61dace1084c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    878aba216eca7c156bcd5207aa24429c

    SHA1

    daa85d43f4c6d10f6be94920b63a7457d8cd6fd4

    SHA256

    7d9b12e69d1dfe3998ee3de882113cf5ecfe9992ee78a83d339f60849b8bf2fa

    SHA512

    002cda198944232af32603081d16fadea6715f4c7caeb699b9ae677c7c3fe896555fd847f4dcac3589d231b6a53622bee12d2a4c5f0b7134e8b8e281dd1bd0ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c339ce2b2d25f59784182ca50f963ab

    SHA1

    2b4bbbc25e27e4840fdf391b863fe65a72e5c090

    SHA256

    e3104c9e875d30e03d0dbe78dac541705647acd86df7beb09cb7c0947a784870

    SHA512

    a80c8e2102ac5f109e841d1c54588817f97ff6c55b769fd998f35c0c385126079bdba461729fb8f041a84263e8a5d4171ea8424c777265c937c2589d5b1d29f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d5d78d81e216c8393f2242f0b56209d

    SHA1

    65f2b65519480fd84eaa281ddcd7aec4f8d81bfb

    SHA256

    b35abe4008b214524dd74e66f7ee1d7ebf7cab5882035dc770dc7c026abb2a5f

    SHA512

    ae41b3562c42c5fdd8f5845c704632a8478e00babd582195ec14be5fdea6bf3f423c8406486b7088222ffd674e6b7451db6e663ff2baeba734a0c832859a4c95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d832c080c6fb05c75829fbe3503cbc00

    SHA1

    24f38ff5dedc2f31b43cac96875f410e92d06a19

    SHA256

    a05dbfd0cc03f33c6bc3065ac42f96a3ed6a8980b96b2d5145a822d8ff13c51d

    SHA512

    0ba7f74059d1439b28d85bad62f0b20d644c53adc78048dbb3669dcc7cdad3f0e7dc79f4e0eb3208c0b30b9b91202d2197b24b23df3003ac36392acbcdf453ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2aa409d2628cf073b36b1363a32bbc1e

    SHA1

    1a4373e5e2f85b6171c69e9f2dc96b7a68e4c798

    SHA256

    ab463b8b7de39393c540be0f9ad86879d3f09327fb95a59abf4ec442ea684057

    SHA512

    4fc5f1648a3e6b8c43ddeefd500b04e4186d6cf2781a09c4d80618cfc3c2c8df2d372cf2ce7857315d45cf20ac69f30b28adc8e86611dd2bb0a27019800b0a2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ae23afd269c82c2d0ac76047209a49c

    SHA1

    e3b2ceb313ab39296dd50d8e5ac31060e679460a

    SHA256

    452a6c81015550bd0cac1761beafa84667c386e0d1fe5dc1a87d4eb17e16b201

    SHA512

    91c85a6543b836581dd0f44b5be3be4936d2b4d4b356520ce4804d17a0f55368fcdf819e333fe77ba5caf5aceed6044dea5992fede0a52a53c1e1db32aa9be86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ee63025f07e419bcf4b2a9b8e5c3813

    SHA1

    a97a2e5de0853dfd3acaceb098871c85649980ec

    SHA256

    9d02125011f77ae9ea8d1f5350074025f7adffd21fbbfdab308abcfb469ddae6

    SHA512

    9668357fdd1d5fe8deadc63a86ddce992f0d11e6835d4b9903457f6ffccbd4c2a6c60c659063c74105eee781f8582512d174c5ee7d44a9f4980bc70eb6fcf412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1cbb935354eda89cb78cd0ebcafa9a5f

    SHA1

    aab5b330f82aaf0708cd500a759f767283f37149

    SHA256

    c9037a002a1db9715ffa76b6e5cff0f344d33c1dd090b44fb3245e3fcc91820c

    SHA512

    b727ca21a994850d43c1d98a8bf5c13a640f1bd8ede4021a70a9dc44e4fdddc3b8c42686de9f2aa946d949d6e2ac1938c38621e2af8a04e67ade16ed54779ee9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\favicon[1].htm

    Filesize

    6KB

    MD5

    ac929fd39bae20490dcf84b4a9473025

    SHA1

    e5ce09d090b92cfcfcb115d6d8d98bd2a0bcf538

    SHA256

    98f48a4eb702766b2e84d1dc820f862dc9132350e294eaa87ad0b0ae68b6c4c1

    SHA512

    5365420695f001131637b446f2c4f03d9e435204cb2b11d3071662b3690446e20c032885532ed8a8cd6aa4ca75c5392e7c49c689bb969f744329262f7107bcc3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\file_web_logo_32-b074c7d607[1].svg

    Filesize

    1KB

    MD5

    b074c7d607991bcee487b6bab7fe41ac

    SHA1

    b04ce477a18812918bc66f567b474261fa5fed46

    SHA256

    395427601a092f229ea1af00aec598e8b1f8028d200dd6b0cfd51a2639f6d647

    SHA512

    b82e671573d07b4630a2f0295c5be39399c242bb7f899065a2918e89e826fe703fe6a176fb223ee361601f03d505d3a45185d335c7b30220a9c19363ef48e274

  • C:\Users\Admin\AppData\Local\Temp\Cab93E8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar93F9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/1884-19-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-22-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-20-0x0000000000400000-0x0000000001A8F000-memory.dmp

    Filesize

    22.6MB

  • memory/1884-16-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-17-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-18-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-0-0x0000000000400000-0x0000000001A8F000-memory.dmp

    Filesize

    22.6MB

  • memory/1884-21-0x0000000000400000-0x0000000001A8F000-memory.dmp

    Filesize

    22.6MB

  • memory/1884-6-0x0000000003220000-0x000000000323A000-memory.dmp

    Filesize

    104KB

  • memory/1884-9-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-12-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-11-0x0000000075070000-0x0000000075180000-memory.dmp

    Filesize

    1.1MB

  • memory/1884-7-0x0000000075081000-0x0000000075082000-memory.dmp

    Filesize

    4KB

  • memory/1884-8-0x0000000003C20000-0x0000000003CDE000-memory.dmp

    Filesize

    760KB

  • memory/1884-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB