Analysis

  • max time kernel
    117s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 05:23

General

  • Target

    f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a.exe

  • Size

    11.4MB

  • MD5

    9ca0678dc602abdf7ed9c8994f0056e8

  • SHA1

    3d7abcbe0ccae6dd323e46aa450b33e41f1b87b3

  • SHA256

    f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a

  • SHA512

    6aafb008ce337de18a71a4d592e230760145e2771e4767e9c115240e934c882f831e91895aa60ec698a6b3d042fe5c1625da04b588f52d16d2d0f6ca65731a1e

  • SSDEEP

    196608:8+V1Zf0MG+PZxHIyICzcPz5ZcJ1pI/cIyLdvpfbaXmWUNZTVwho87dl+egc9ygt:HNX7PZRzc3cJ1awZpDNZhwN7b+egkygt

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • A potential corporate email address has been identified in the URL: png@3x
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a.exe
    "C:\Users\Admin\AppData\Local\Temp\f9ad46d78dfc0e9d6bc654004b14c475766b90c2884c7c28319fb84ba0a8433a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.qq.com/doc/DV0lrck1MZUVBRXV0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    3c2774c6b4598481926e99fdda77fcae

    SHA1

    961ad22b4308b9b4fcc280baf78ea8dd4b8e9f80

    SHA256

    67e3a641cd8b1a96079d784526a26381f437a09131aed2d8c50c7df6e9f601ab

    SHA512

    8f13eeee2cf2acd12f2129720ca5a7c2f628790a7cb860698b78d9e1303eda96acf3992f2aa35b30267d8dafe511c5b2bf14e646c6c316ef16b40ea9d59ca62f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae85a5171128f225b9cefff73c04525b

    SHA1

    05ea07aa47ba71c30e6887096e3a498bf8ce547e

    SHA256

    3ef0dc0abe045f2d5a73b7c825baf4e8a21c1141e3a1ad3ba6b9e7603a74e168

    SHA512

    d7991ffdd18d288c4f5edcd0b9a42468c06110534537e86240c88511f371095a34c465295f674db42f8fdc651abb13bb17ada6619c9adc4b706dfb17b6e8501c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61f2e94f9c25e07eb8cc2b88a46fefd5

    SHA1

    ecfcb240b03d666f469908922ddda5be064074dc

    SHA256

    3099a0b0c4900273dc54f9f7d5415f718cc6923e0f4dd9f245fbeb39cfb3dba1

    SHA512

    42960930ed4228b3d4dbf6076149ddd1b14d2ab192c60289f156a794da975c666955a4e2f114a5e7b9b05dc1cbf40ae1a2c3c6aad69cbb4136b7947d4fd86470

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cea8d0ad1137c7a37668f9ba90f5b31

    SHA1

    8f1ee7f0e46408e4d3334eccfe40b9c67b24340c

    SHA256

    2829cb325506f7ce4e43aa2858b16a57bdc0ee53a80cd4ad58d591d249243c1b

    SHA512

    c03deedb8427490caef335772160a054ffbc2e918f324ced638981495e5b6ba2a3be83011bb4f2b61803140010d8d283efdda2789a7d1fa42cdb41c4e6a91b4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68d5b5ef431743a3d5e42bfc098e6fa0

    SHA1

    56211604f4646d8826fbcf033862c261addbfdfb

    SHA256

    f667ae46e148988b08f7a4dd591eb1ac6534128bb15d19b5e16e43a029b136e8

    SHA512

    1bcf805a3ae1f5ee321cacdc6cbd360533a95abb082c0a3bd6dde8f5dede13586bd94e7a9e8e8d1541efbf84f1fc90fea4e1543efa842df42bcafcfd00b4a99d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1ab26aa0e080389a5d82df82571f95f

    SHA1

    90c768b724e01b9af2a18d342c46f5cd8636832b

    SHA256

    cace94b791a0e8fefadee88cb49640e411532587c42b995673d5ea6d0b6e7c0a

    SHA512

    1077300b26092da9d10c193320f4558b6039894079631f1b6b42e18e95116327ecbead0fab31b1a842f006e9e57b0b8c88dc9a29867f783eeeaff8e4e080c613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e4ecb0b04591c537b988cce6f808b65

    SHA1

    08c7849ad2b501991174c0c94137f6337ce3de06

    SHA256

    3063f865946ddbdc41849352ca5c336c07441a49bb7ca08352ef5e1e908c54c5

    SHA512

    a1a16e653ac3732b80557f5c50eda35c368b8e1cc5dfa7c21d7f787c2bd8d695c23c6b131b825e0d404dcb70870bd3cb06ae97cd1ecd8d04e3e8c491f610bfae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8186a9bb14255518048add41da5c18c9

    SHA1

    5cbbd7d22d7c40f38c088d536f8d262328583aa4

    SHA256

    4a2e63325b942ffb7c522f858929434dd0db8081597271c935ac9c1db0030511

    SHA512

    e833ec3a80ca8fce01d32886ea91596f327c8efb71b0be3cefa54dcdb31ef82ea0fd9fac7e2dba9386d85319838ed7c99173a8c08c1f465b6e63b769ec398409

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b9fd6dd879a6083b1a96770722c718e

    SHA1

    e458d0e4e4417bd813e8d7991bb15175448fbabb

    SHA256

    56bc752123051d72036644e984a463e35a0b4e55f26773c8d0d91664b8ca622d

    SHA512

    9f5d71ac752dd5c3ad3792893b230068abe5f7f2b3bbe2864809a5240c3f30afc64764b5a84095dd2bbcd2982f4ee04c9cd6481788e34ba25a4dcfe2af9ec6e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c00e255c21d2aa317b3e822ce7e5042

    SHA1

    3f33bba575a3d684ef1e1ee10a7a6207299d365b

    SHA256

    a7d6daed0b43329389e22f9988655a1b97f32d8d545378fc6188353e2181aee5

    SHA512

    06503bdfd186113378346c2396d0ca35748beae559b742ad8872750d99d862448c7529035b2431605f9b0ca34fe602c535e6003a18086f0ff3cba0cc6a54b9c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62a30650d2d8d9d58731b1ab41e593a3

    SHA1

    4791d282921fa653b54a1f839d48a3d18ddffcf1

    SHA256

    9b6564da15f771af201fa7ae25692ee5824b5c7eeca87e68d0f644be4c2aa9d9

    SHA512

    2ba487fef73573c8efeb81a97ca39ab6cde7f6d4ce575f9f93822c083b9a45cf0f03931320d3fca2a763d9112d6aa8f9b950a3000737c33d5534587b73290549

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42a0cb663ac0dd305367cae1cb633ee0

    SHA1

    87aa1ca78687a6a1bd560fdb9200c26b38515102

    SHA256

    9b18b3ca78f4d358619623e4f416d109ec5f91b7a4ab990afa2204e0ac221e80

    SHA512

    fc9b6b69151cafe02424a2369fa0fe196f46102f7ac31a5f429a453e529dca74ad3c1af2ecb438e3962353eed4f7feebf70bfb1c7b1ea383e444854c23f144b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e70ea6c34185ebbc7b35047e28189a69

    SHA1

    88c1f6277138ba9f79961ccf02737c2da177f306

    SHA256

    a24652b74580c4085fa0bc1f66efd6e9d61ca629c42e3d8d53606bcdc4ce170b

    SHA512

    e950b8585e91bd4e869fc4ad9706614a3263b460bfbf4d920611391308b9ff9a7ca31aa90855a3ae04aa207e96080d98e1b3d70a91ca36cafca5df74bef9cae6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    619e6a5a6b449e94e03aa29fff33ded5

    SHA1

    6a4968ec672b71acd745f8972ea1e944ff72b8f0

    SHA256

    afbae2186e84a9de399d3333bb6504f814f8d0cf66d3f6e8863378476c017073

    SHA512

    df237fe140432af84c9ae6cc4516166769ef60336d8f34de521ec2de90a376121b3ba5355bb547d6550bfd1690ff7a0a0ace62a85ce132265d7fc2d6feb892e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4616676206cff2f2aa878f5fb66dd0b

    SHA1

    df1cd07959a442110afb347c384ee5f0025856d5

    SHA256

    6abe7b56a88c1126dfefe957514753c9219cda6bf68fa641ea83127189beb6d3

    SHA512

    c3a6c042d61015f0eb48015ce17ae17884b3bb597ad4212813d714f39d37afc9cf633ef8cb96fcdd3dd8b792f76448a6c8f1879308b2a70b1bb57b7dd5424ce7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    227b7ebe266065c3d42a8cf89c7a80c3

    SHA1

    30b5fa5c46163e5ebbbe1d874949cada9e76864d

    SHA256

    9d48d7af41dd23c30024f2491712a62a76ff052d86a0f8932921ade6cb0abf2c

    SHA512

    f666dc3f48365799c8173e75f8aa0ea64ee726585e2d36d3fc861c2de15dc3f416775e60996291f298e4a759d68902f4ee2a2347f2f3dacfe0d2bb3dfe4e0dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1980492161e742c64919341bd47ad45b

    SHA1

    e350f1e14da1e2a462a7aa6983cc6be8592916a2

    SHA256

    f46adcbb2535f2aea0e14812b4b2f21d1deacf56b9aaced121ff2452a458f3c3

    SHA512

    df7d8fff85225673759914d70b208e138161ff62f9aecae27afd044d92ac51ed2884e078fc34a4008295fd33e19d6460a58af0229c5afd9be91a6b1f336a8a3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86233b0dd54b863c1d1663703cc55abc

    SHA1

    e580fe9e52cadd8b8723d7c1d93cd493ce758d85

    SHA256

    b670487c717bf86779c37cc0da201abbd330e4b0b99c77a4eb64dffa838ae8c2

    SHA512

    277618304e4297368dce56e1651597e0f83689314f7838b34af497f794307791bc3d90f4559c2c17b9b486a7febe872142ad7d9ddd9319144da173f3c6593fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0ba226f140f33386910876338a623a9

    SHA1

    df07338efe528b7b66867bbd4bedd8639bb03c88

    SHA256

    6e98b1261f6285d111c6eee9168927714e5adfc3ff83c42e47096d44e0c03530

    SHA512

    ff9a7f9f5954d7433ee657a0a6ff9fa38d6ba30954a84139486a9cb267e73331a524e39f1358bec0c299397a8a82da82c6e5b020f607aa717fc810140ede9ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_F4BA400FC87361C05D40DBAF6EA131E5

    Filesize

    532B

    MD5

    e16110d97ad8391834cf2dbe8364cdd9

    SHA1

    407ae3022c5ca93b9c1caaa559165ec4281580d9

    SHA256

    ef85d2211b2613ac5259fbf5c2e27dd6a09bb37bcf2d19899a85f008210842f6

    SHA512

    4690eaeffb782b8c24c0429bd30ae2f123120e8f36000a83b5e15468e9d42394962370606e9507b11b91e372b2a086ef14ddbbf6d4de8d7f7fb3df8b8070ed1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    357507af62992d9efc39771efad617e8

    SHA1

    d4b3c58ba138be3704d82738ecf12fd1dc1bea27

    SHA256

    1d079a1c2dce0081be6eeccf687296c168d45858cf6e83417b75ca46c4a79721

    SHA512

    9f79eeddf35ba333a4bc122cc40a8e48bf02aaf8f05a222bf00bfde908bc67ef0f3506f9bec5dc2128d4acd6999b3ce7ca4a516095d8bbe4dc772994c863889f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\favicon[1].htm

    Filesize

    6KB

    MD5

    f689e6a2633bc536b658080159376918

    SHA1

    743cc92cd11032a1d728920da01cf0d62964c64a

    SHA256

    aed43a6ca91664b9a37a87f48f623aa85916bc82be60073e4ccee0328c780651

    SHA512

    7a5000fc60c5538da80c68b35f0e715f2fe858f5b93a35a9a703319d4db474c81f37121add5f07ba594df31d21ca4151465155dbfc6f03d8f63e09d5f5d51d92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\file_web_logo_32-b074c7d607[1].svg

    Filesize

    1KB

    MD5

    b074c7d607991bcee487b6bab7fe41ac

    SHA1

    b04ce477a18812918bc66f567b474261fa5fed46

    SHA256

    395427601a092f229ea1af00aec598e8b1f8028d200dd6b0cfd51a2639f6d647

    SHA512

    b82e671573d07b4630a2f0295c5be39399c242bb7f899065a2918e89e826fe703fe6a176fb223ee361601f03d505d3a45185d335c7b30220a9c19363ef48e274

  • C:\Users\Admin\AppData\Local\Temp\CabAEC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAEB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/2976-24-0x0000000000400000-0x0000000001A91000-memory.dmp

    Filesize

    22.6MB

  • memory/2976-15-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-18-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-0-0x0000000000400000-0x0000000001A91000-memory.dmp

    Filesize

    22.6MB

  • memory/2976-22-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-6-0x0000000000390000-0x00000000003AA000-memory.dmp

    Filesize

    104KB

  • memory/2976-23-0x0000000000390000-0x00000000003AA000-memory.dmp

    Filesize

    104KB

  • memory/2976-8-0x00000000036D0000-0x000000000378E000-memory.dmp

    Filesize

    760KB

  • memory/2976-20-0x0000000000400000-0x0000000001A91000-memory.dmp

    Filesize

    22.6MB

  • memory/2976-17-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-19-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-16-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-9-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-14-0x0000000076890000-0x00000000769A0000-memory.dmp

    Filesize

    1.1MB

  • memory/2976-7-0x00000000768A1000-0x00000000768A2000-memory.dmp

    Filesize

    4KB