Analysis

  • max time kernel
    117s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 04:40

General

  • Target

    88da6de4a752151dbb2936855e1307f628628bfc0597bec39ce61b7347b7d3ba.exe

  • Size

    11.3MB

  • MD5

    700608d1bfe2c81db02cbdde080252bd

  • SHA1

    4fc0ce37f41622ce450a06054f827385bdbf14c9

  • SHA256

    88da6de4a752151dbb2936855e1307f628628bfc0597bec39ce61b7347b7d3ba

  • SHA512

    696bf5df4fcebe086f4373403ad83a78fcdce72277d6aa1943966683991cd707f7cacc6aea6d7d49b7d37fa51ce6b7d5f71b79fba4aaccbd514728ffa44018d1

  • SSDEEP

    196608:gvScToVXQcM66VGe1SOg4ZH6uzE40Q4LR0ra8xo6ToZXtS1rYks21Dje/GS:w9uQcv6UhOg4F9ZgKhxfOXt3UDqeS

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • A potential corporate email address has been identified in the URL: png@3x
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88da6de4a752151dbb2936855e1307f628628bfc0597bec39ce61b7347b7d3ba.exe
    "C:\Users\Admin\AppData\Local\Temp\88da6de4a752151dbb2936855e1307f628628bfc0597bec39ce61b7347b7d3ba.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.qq.com/doc/DV0lrck1MZUVBRXV0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    d166aa91ce9be52976a4daf486c935ba

    SHA1

    244cffcbb034274786a413aff3357c5add2a6a44

    SHA256

    d200f68ebe948e8893e0d10dc22e7bb3b09e8aa0c46adc29d32453ffbfc23603

    SHA512

    edc1c449f3a19ffe1a04dfe9b6fc0e7f2ae8c0e912f1caabcf51cd0830183ebf512a4ff0e124931fc04870ddda68720bd2d478f64133d3dad5246c36b182a441

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f03dbc3f6dea95bf83c29c5f9c6ecf39

    SHA1

    0b6fb291eb753bbab319e1dc1503258c033b4f0c

    SHA256

    3687b6d153eed468409352a437c1d9ac637a6c0ef1acf1de617bce9a58a4ab6a

    SHA512

    6103ef25f6e889fdb80566ee8d628b13a6763632f847114c20573e0b8e6511e2571b13b44f1d841805e9b60ebbad4136a836d38e0eb848cadc28dfdbc02da3ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b3cb4ed8e8752c8723526da36f81f76

    SHA1

    fe944742a4072788b586c3775f6ea853eb6f2fd7

    SHA256

    d58deaf31e2fbe3d214081954b79ddd341aed57815217ffb369804fbc0dccec8

    SHA512

    c312c03f54216422603ab720d1f8dd1f72622aca81929c0c588c86ebdad01896cb77160f1a4df9a2d3b08a9c3bde82c0c90193a52406fb88dd3464875d81a9ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    177f902cc45febec5519340ee0cc6701

    SHA1

    d1f1a4040ebfc7225b3ba9ffb5805332109b7d3b

    SHA256

    ab2e0f85e7462b06ab335598f0ab5f6c44d261b38d8ea5b8a19a2dfc83f56c97

    SHA512

    c65279f7e5936b54a74f09bda1f353d023a7e20c0255907979376ab7bede7332903d2d7aba78f9fd6fb44b7d80737d526fd8e965e4bc68b98c8bf18b6b389a55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdf33442a943fa018b37017a1f11b288

    SHA1

    a6689a04d5768187800acda8c5e8d6eeda0e622c

    SHA256

    8768e46629712e180190b0fcea03ea84b07f80ef6e8634ad31c4d2a0c08c2633

    SHA512

    afdf521cf982d03b69261329b9199c76c3bbe53ff67ec83de5c0cee985973b61c3a89fbef3f03c7fee7fc3871e00450b9893df488f2909bb0263060bf91ffbcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d6ae93a09d7fbad26fc14ccfd8266ae

    SHA1

    5d01495bca610c559d5ffb383c6d64e68696032c

    SHA256

    cc3d65b215575b9b9c7570871a48852bf001ec6337607b91905ae5c558451d21

    SHA512

    84c7d6862c5bba691a8bfa5cddac5c0dd209ef22fa2d43a9f37ab9c288a782762310ee1afbcd703df282c94df838588dfe6b613942181ab7681c9b06d7223f6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    797d0b2f2871123755716c8d2995619e

    SHA1

    e28f461b5b61ce8905b92efd1409adab0a0ca63f

    SHA256

    2d0b35a6462079724b5aef80dd5e76cca4adab1bec7ef58480b1a068a9178aa2

    SHA512

    22c2162db7bb4389c2d4279571882d4494e8019491d5712888b8d1fb0d3e11e956fd1a0df83f12735421ea00df2f20216bdea43c58790814760fb5ba334f41f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    733451017f30fd5f364634b0e63c2664

    SHA1

    3e68ab7b175e3a9782471d7a5a7123b976edb85f

    SHA256

    a8beea37be17c8715bd4a0176eaf54f638cf6799f5b67d9dd3c718e0287c99cc

    SHA512

    70edd431fc120a7bb690d1c303974683d38d625e8528f0212fc212168ebbaf9b87a921adb383a3c8833219fa2249a146db1208aa73bb57fef33b64bc61a427ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46b7b5066b0c39b5eaa712d0cc503d50

    SHA1

    40f28f36d2c577ca1637aeb9685b181cdc6ea5b7

    SHA256

    47e45f775bb60475f421e14b4fa2bdb6c21ec0fa19b79c4efdc15463156e05f3

    SHA512

    c4768080b0339b973f85780b53c593a7fb9b5d19f03872e3b43f661b95e5c4e5ba645f1894e227e26c3e073abb59c7c7f53cda51d6c01eeca5a6922e9edf8e2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c44e21013af2b349fadc0f1bc4abb72

    SHA1

    d98fc698531f57d3e7164e767f7ecad5c6361efa

    SHA256

    2e3b7cb420ee4cc9746d698f671dc26f2b4df7d78fcb586a904c8ce305df2add

    SHA512

    911ee58710b399981f4aa67310ab463aea3653cfdbacc1eb8ae581773c460fd521091d364360ce885da8409f89879ba3f0eb31fd48bb3186b1d70e416de61ebf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c44126f981762bf4a54874bdb84b3966

    SHA1

    031e7cca58988fd4e2a8c0d855f68b84f0ff0b11

    SHA256

    925df93d5f79844aa2d63834063f45c0c275588b38eddab4b6359b3600e155b4

    SHA512

    a1b47f2ab40277534e3139aede64964e37ab9dbddc827b3b9d97fe62e9c42583da270e668277357dd5e13b6019ca09ce4f6493c51c3bfe254a8190e7a053ede3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cf487d34d306183e9e961f57e31949f

    SHA1

    ae19698b13bc7888008536bb301cca0c195ea232

    SHA256

    07e2e831661615790e5df711e19d1901ccb2a9af4ded29412de55e5050a1bf3f

    SHA512

    f26ac92c72e3e63507f19e6ff2c2ca4d0051e895d856593efd5e8ece8768a78736b816a3cba967dcf9729bdbb4b30da5d8809907ca1f8d3a7f931a1dcc9e55e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30224bf1513a62cec3b1e947b9a41f62

    SHA1

    191eb60493fb8f987301d4856a9a6f33f5f727ca

    SHA256

    a4b5cf16f698930b907633a81061be5f570a10e83047d19e2752c7a4cb4c4e55

    SHA512

    fd33bd7003b00779bc1125cbe6a769fba256e8d30592da2b3126452ebe751cd37d97396d591e701424103cc19935226049c8146489073887fdf9e3a48afe6d55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11b6bbd8bc2dc5061ca8104ef46ae6a2

    SHA1

    ceee22d5ccdb9f7212830bc37ca7b14cb158e9ee

    SHA256

    3c6dfe628e7640e1f31006c3077a730ed2283c0dbf3bb780c63c67a988e54811

    SHA512

    0df5f259b9e20c2b126b3729f1ba6e53c9cdcc1d638805b3c4d01ae8c0f494b9ab52e53ccc212647b819f7cb81107fdb507c944fda8fc55af1711908e6507a9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ca73de0ec60e35bc9144e3fe139dc25

    SHA1

    f519cd289d75d1440efeec4cc0d177d7fd1e5176

    SHA256

    0e363f5c49351cf5a641527c783e013da17c0195afbd4cf1dcc4ae833ad6c181

    SHA512

    5225bb95a4ba65f01b064cb81f22852e7ce1fd2abf213948558870efa32b8983031c85190ba61bd0ccf5b67b721c3693a4e18f29076eb39c6f3fd00dcfad7671

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fde70e33a35c6efc7c12e446e749d64

    SHA1

    88ab3f3ecba92b3fdca8697ea8b5199257630c02

    SHA256

    36ceea7feaa5599d9bc0b5e7bc9835957dc687c905e99784634c77bb83ccb71f

    SHA512

    d86d3b9e6940a69e0c23c3f9331055b472bd4a52b44a565a56ba6b390dadbedb6b8f80458303153dfa0ebfdff595f7896e44d2596bf57a1c87c0a57c3aef3cfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d35bde2ec08b5306aa5e7b29c86c01eb

    SHA1

    9137876e5c5d96c3375959001440ad0382f78d00

    SHA256

    2e4e3a0075182ec87094b9f88e7e93700ff2d2f5b8a67e40700a99932135d327

    SHA512

    630679923bc446b64d030cae72cbbd2f22476615c3fcc746177837fb8dde6362ffc5ffbd499f208b1a9042138f75f46944d7e0537a1bfbca9177e787d68a33a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5ef1549828a25fed02dd668413da94f

    SHA1

    43d3eefa30e70578abc3ecb41f0ea5a139871d38

    SHA256

    dcb68e9fa5ce14439108ab8c61039f451d6a75dfb6cd12d061b17c03d5855d97

    SHA512

    3e28a305ac1a3b642e13e900585f230f6d85c04b69583e96eeea9838c6684d39d40b892e08af9833c8d1d73e38f1e7db5e3f495fa794023a301ad471cb0a1cb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ec40f95c4c3259566d6d65af8b7228e

    SHA1

    4b27a9c110ddae347ef599cc8e4ff291e11a15e5

    SHA256

    d88008158e21b6ee7e08a827e7f85bc68576b25c00d07d3eee4254058031cb0c

    SHA512

    25c922882cd23bcf3779f94722804d32acfb738b876309c6e6cc38259044ea4750d09c50849ec7b493278dd24d65d4cece03ed40e5b306ccdd37217b76bfd118

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce79f2640515c069fb0f86a3ecd1bece

    SHA1

    d5299273ab90cbe99a689c6cc548f1ed6bde3521

    SHA256

    57b9371171f7b31fe70cfa42041d3bca572e72c62c0c8402a2a43488f876b9e7

    SHA512

    20d7900ed1293abfe6cbeeb894dff1e524c30c90599100d3e90adbec7f490969f0d49b0d718f1a4e916808a045ae7a63fa21fc05e938b747eace1499b0d16ed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    91ad927c3a1e713f2f5b421d39613e34

    SHA1

    106b808a02fca9386e3704133a7de329bea37fce

    SHA256

    c13a59e66d020e5c25893034222f2d81ed24040d9cc2762702ee87f80662dc61

    SHA512

    81ecc3ac331b55ba001a76043a91e38f78e552837fddc472a1cdbd29f880dbd1372daaafd4ebde9c39a37243916d08d7c7f9bcde4009f0dd63b49998fc4112bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\file_web_logo_32-b074c7d607[1].svg

    Filesize

    1KB

    MD5

    b074c7d607991bcee487b6bab7fe41ac

    SHA1

    b04ce477a18812918bc66f567b474261fa5fed46

    SHA256

    395427601a092f229ea1af00aec598e8b1f8028d200dd6b0cfd51a2639f6d647

    SHA512

    b82e671573d07b4630a2f0295c5be39399c242bb7f899065a2918e89e826fe703fe6a176fb223ee361601f03d505d3a45185d335c7b30220a9c19363ef48e274

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\favicon[1].htm

    Filesize

    6KB

    MD5

    bacfba31ab435e0e9299a8bac611768a

    SHA1

    d7a5f5982a91e90f3f375a970f5a86812b45a7e5

    SHA256

    e9d1211c3185b277352bb1b739cf9eec1cb14e605bbbab34487ae4042cbd40f3

    SHA512

    f2d4317b36dffa7281ae7ff0d1dffe4caefbf566dd51ac11b4b825fa2a7cc03f5411ba1c1123ab3538b758a878d2dde62ef670256a6fdcdf65a15e4100b660ab

  • C:\Users\Admin\AppData\Local\Temp\Cab9476.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9477.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/2736-0-0x0000000000400000-0x0000000001A96000-memory.dmp

    Filesize

    22.6MB

  • memory/2736-19-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-20-0x0000000000400000-0x0000000001A96000-memory.dmp

    Filesize

    22.6MB

  • memory/2736-16-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-17-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-22-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-18-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-23-0x00000000003A0000-0x00000000003BA000-memory.dmp

    Filesize

    104KB

  • memory/2736-24-0x0000000000400000-0x0000000001A96000-memory.dmp

    Filesize

    22.6MB

  • memory/2736-8-0x0000000075094000-0x0000000075095000-memory.dmp

    Filesize

    4KB

  • memory/2736-9-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-11-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-12-0x0000000075080000-0x0000000075190000-memory.dmp

    Filesize

    1.1MB

  • memory/2736-7-0x00000000037B0000-0x000000000386E000-memory.dmp

    Filesize

    760KB

  • memory/2736-6-0x00000000003A0000-0x00000000003BA000-memory.dmp

    Filesize

    104KB

  • memory/2736-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB