Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 16:41

General

  • Target

    94cf01a0e9ac51c490dc3d221caf2355c90d77b0115603f679f13ea166e58b38.exe

  • Size

    11.4MB

  • MD5

    4ef89f1d8b9a14c8ebb051738bfff5cf

  • SHA1

    d3b750681bb6eb8180f40b175d3cd606cae1d3b6

  • SHA256

    94cf01a0e9ac51c490dc3d221caf2355c90d77b0115603f679f13ea166e58b38

  • SHA512

    170c345455ffdfaf4296cf09dc52a7dce2d9c8d353b7e91453b3c5157e8801ce2f13fc6687ce1fece207f4f8bb5d8e3b789452ef93bcfdd4d421d3c8249fe652

  • SSDEEP

    196608:gk6EtwqZVbQLDoH/w5IEGAz5hYPOBbVKHpCP8Ak59RXMHAy4I:Z6UwqZtaD+vEGq4ybVNPrk5EAy4I

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94cf01a0e9ac51c490dc3d221caf2355c90d77b0115603f679f13ea166e58b38.exe
    "C:\Users\Admin\AppData\Local\Temp\94cf01a0e9ac51c490dc3d221caf2355c90d77b0115603f679f13ea166e58b38.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://jingyan.baidu.com/article/93f9803fe0b0eee0e46f55e1.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    634681562949194530634bc8148c6d6e

    SHA1

    884c21210210b58e51f609e946f94c95b3b91504

    SHA256

    e5153ced8c3e20c15781509c78c3dcaa21a00d293eba5c548164896f61fb1458

    SHA512

    c38e3f23bddbe6eebe521be11ca4ecc7e1401cabbcde3530b9dba634453561de8452bf38266cfb57e99ce83023b46aea23a801c3fa70bd09f2473beb318cafd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13d28537f163306c18067bba7627660c

    SHA1

    36e444b0e43a5d74db02f16c67568eaac004f933

    SHA256

    546dbbf2bb759c0bd9af6b95a115428f50b200bfd369111b58816837675135e0

    SHA512

    d43be279f0113159c722365bf17833cf901959c45bb1051ee7784ace92dd56545a2a053e17ece7e4b010cbcf0e7e994c7d7d0b7ea64c536a05da1631e30e5e6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8344ee295b6e5c4a30a4dcfab427924

    SHA1

    75c7d21c0f7d0f242679b87afa5ba1ff878be55a

    SHA256

    5c9c3afd667f1d2ef63641285a26d7a901028f7190e441651643b3ed26f2a19b

    SHA512

    ccafa7416a259c09cec3e3884116ea1c167efac97f7360ca9ba6620d8a0ae0450617ac0ec710833a84818a2b80e2a9c8e4fc0395ca40f39df3e76c5333662bb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0fbc363aaae76525962f632f551c1a

    SHA1

    f30843853189bbe5fb8fc05630196ac268d67a32

    SHA256

    1c5d0f1185b49870beb1b979fe86998c9d5d32750208ccc312f47367609e1fec

    SHA512

    0bac8ea8552b2328f6591c7ccee4e1a0e15d2f1f5a0877d5bebd7ea880e072d5eaa9786f0ff4745e2495f0751eda78fb61009b2db712fd47e20fd1a12032c541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c9b3147dbd05d9bf0495008494c2676

    SHA1

    518f94e828347d4f043808ebbb462ba4d60e7b03

    SHA256

    2f6e76ae1b48b3a17c7cb56a8fe071f7cdca7ccfc9adf49084c7b9be133f70ca

    SHA512

    a04938455644562cbc70ef5990a14e86f82095a407fbfe92213e9221d32bbc4ec9d21a7dc42f77ccab6679f8f2e53557ea933ba7267991f594da25261685dcd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b6992b6a274306625c73de5ac75a868

    SHA1

    c064bc43d3d4444ad53cb02b8d68daa234f288f8

    SHA256

    fa41dcf851fb91d19f0e938b33b133577cebc5c27b923a8408f090b9c92fc4db

    SHA512

    01c7517111ca701f1a3c70990baa035ae9c78b52d6151d01878e3b717ba2073a875b88ba8722004934e33d9e96159eef455ec1dc57f2cb47675e58a47c6bc00f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcade5863dc298ea33836c561a3fd3af

    SHA1

    8e3b3fda4498f5e58c579b72b6cffba0a763f260

    SHA256

    ab42c4c51094489a304f22baab6b478be3b326100d890df149551437838adbbb

    SHA512

    deed7d25255e3e310eb0c6a8a607a4994fbeea8f4be8eff612d421c80dc9e5f4cb69b74521573fd711871e37c1252b345cc82b409095e944cec252e7e045cd10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9c61ae0355d9818c079106e3bd50601

    SHA1

    c522a9e5ed6b650eae2798bf63f79cc8bc879831

    SHA256

    880e62cf99761c16e53f846e36622339a35ce06bc33b462d8fd7555a8b360cc6

    SHA512

    3a05e80db5a5b506beb25f5fcb34988f74f402ca8f9f1d4654f5f24eaef02bd644cdadfd48c0e8f5c952f23e5f96f692eeb0bddef4ffa3108b02137984a637be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1351653dd428a3469a75634ae975b0d

    SHA1

    c75228753593b75f15e8a8a239bf065fd10dc1b9

    SHA256

    a1475388c049d6945bf10a5deabb4dde9019987f5e9af9d5aba57c969a618684

    SHA512

    7ec5697008e9474d4bb98e41647a6941621d710c9efb46bc04b394334c60d4229a89f0f27433088ce92c0ab655b8de2a19c912235b913f65ca7f36fe1a4e8853

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fa5b963b2ce8cf8b1b73fbf707841ea

    SHA1

    f7c0268a084d8664ec8797a774fa32606fbda096

    SHA256

    d38932787d654588a2f14d46764ab4071c01ae5b2c49c0856dd0ed9a3b422dd3

    SHA512

    5b402c5a23107d2e5857f3e14ff5eb642e94777968426feff4c069d01494537a7986b30d0073c71fe21e67cc77a5504d78af91f8793cd8956bc3c8af1125f056

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4516d02403a37806b30fc7d5331c6bfc

    SHA1

    5fdb04c911de346517042e005517e924a4171ec0

    SHA256

    745c6d64068a4809b8d8051c8e8b5db2173239fa481d08d1879d814aacd788a0

    SHA512

    8291b0371fccb25f62c9161edbcd06f16127d11b18368e4a8572af12cbf7f3df924634073ea185b7f7434c66af07b49ab842cc32e19abc571534ef9656152beb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fd68e3bdb5f3168f26f0a524c436dc0

    SHA1

    e94ec63238856084f52eeb6940d93acb537bfb97

    SHA256

    c113871ff84a461e73aca5719c9b0f0ad5ab4f68f50e13ed4986938131603b0e

    SHA512

    48a4fa4728874c275f8e02b5c99081dbf734bb090ea54d5c67a75b33bfb5366e005d08be634e06f434b9446203a8b02cb7c4313c964a8d94c7de84380aa4d100

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae3919c5d3a80e50adfa7e0f1de8d838

    SHA1

    da50e7908bc6d060c178c4231a744e5f8de84b5e

    SHA256

    2f980ac34e97ecc53f32918d9e4648b01691b32b07ec3dd69a30c8b7de64bd17

    SHA512

    4e561131a4c8bc7dc00038c914fe2e98fb06b53341da620f952304e7341185ec4e6780ee9e71128df74bf0fe8b0bf79bcc6263d4a0b975ad138aca280ce69016

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9df009ac3cc62667bfb330b713593ea

    SHA1

    5ec2de3af395299249d1706a050c4ca5c391f0a3

    SHA256

    060aef977c1cf7e010b89586b8a28057fe7fbebe96fbf001f30f118635245789

    SHA512

    498e0a7c04b823addcf5863b7266dc9b7a4b3ebd83073f23eebaae679406a43b1164f38fcd299cda6e83cf291ce1e8891891847d1be2bea1b16ace2391860754

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba58d6dc9821a2b1febf4b16be4cc54d

    SHA1

    5a7353feedf3915e227b257ae69ac606f7524fbe

    SHA256

    264186fab40f910b813a451ba9349a7e8d217feab20135ba09bed671c5b2b5db

    SHA512

    d4803d978d376ce4c1a2664896978917e55edece6b9ddfa595814c11fc598e9ab29fb76bc835b0ac80dabf0bf630ca30a1de97ec02f14499cde1ee5ad97028ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64e9a8fec5e328f00bafcd218ce06d5c

    SHA1

    87a99966d29afed7aad8037aea5a0253c18a2c18

    SHA256

    0d2e52b5834c60b5e643fd45aac2ef3a2fef8c0c14699b870c5bbdbda206bc03

    SHA512

    8e7d6a9689d3e77c4e421a635cf99a749e7407c7553950fb1a4c825e142f9bb8af1f595cf5f4ff1d2d6eef3fff2bd9756a8d2eda0f714e89790c64c5200fda6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c45121cef8fadaa9a58501ff0cfbab5

    SHA1

    d9b4b162f63ec1cb05b89ba1a92a6c4fcb880225

    SHA256

    7f60254145a6960ab9202f813d11ce3f3c3ef7199021ff05b8161513505e72af

    SHA512

    5ff3338fe596203533a6aaf9e393cd3e23db119ea044f1f5f7a753a9b32675a19dc9d448535bc8f814db9f1c51ada885b44dd1b9807da27d3ed30b753a0e1949

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58b9148a03fb85e665a858f93811f93b

    SHA1

    72a2ae4c8ffda4d957f3552eed80ef97935a5802

    SHA256

    5e28932f125366d2a6eadbf430d038b18a7ff94ab4c78f42944e788bbe914075

    SHA512

    5fc69b45dca3afc1437cc41be506e644505480695ac929f35843272ff9af9371c0a02710cfca06ff002e81fe093f0fe6e50899039c50c96e835b99a32d11a337

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e3329262e9a038e927e6e43a9612208

    SHA1

    aeeed2ef16b8035f21e41481f1daf733153c6df2

    SHA256

    17ac41ddf05898b51c5f04b72190e883b5c495a8403d801453ad3c800dbd35f0

    SHA512

    94e605c02f4236a11ac322e234b765321db8f7f318770e048f69638df9c400ceab0bc1c4915d5281a6c4b9f08f7f03c8aec799dcc2943b39ff5328de4f22542f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bf4839e0e0c33a13113135ce54da2ca

    SHA1

    becfa1ddfed51c2da933ea9fb4ace43bc1dd6f2a

    SHA256

    e0d4e98982d5c3ebab1d61308c6bb3e22fbcd13dfb939bf5436cee066de783e6

    SHA512

    cc50b70581b9f90f5a05e74d842d16f790702a2f3a5e991a1a08c245366b754838b54ae35fb443159f10bcddfbccf922aa8cb0a423d8d2e1be24cf582bc67fd0

  • C:\Users\Admin\AppData\Local\Temp\Cab521.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5A1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/2856-16-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-19-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-23-0x00000000002B0000-0x00000000002CA000-memory.dmp

    Filesize

    104KB

  • memory/2856-20-0x0000000000400000-0x0000000001A91000-memory.dmp

    Filesize

    22.6MB

  • memory/2856-15-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-18-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-22-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-0-0x0000000000400000-0x0000000001A91000-memory.dmp

    Filesize

    22.6MB

  • memory/2856-17-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-14-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-24-0x0000000000400000-0x0000000001A91000-memory.dmp

    Filesize

    22.6MB

  • memory/2856-7-0x00000000765F1000-0x00000000765F2000-memory.dmp

    Filesize

    4KB

  • memory/2856-8-0x0000000003B90000-0x0000000003C4E000-memory.dmp

    Filesize

    760KB

  • memory/2856-6-0x00000000002B0000-0x00000000002CA000-memory.dmp

    Filesize

    104KB

  • memory/2856-9-0x00000000765E0000-0x00000000766F0000-memory.dmp

    Filesize

    1.1MB

  • memory/2856-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB