Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 16:00

General

  • Target

    7e1d686f1d6d26ce7b86e3ed9e737612904f37c620dadf340d2481c2a0e3e5a8N.exe

  • Size

    2.9MB

  • MD5

    4833ec8dc2c54e604af9a36f5ca884f0

  • SHA1

    ab322e271682bb7df83717faa84a557c08a89376

  • SHA256

    7e1d686f1d6d26ce7b86e3ed9e737612904f37c620dadf340d2481c2a0e3e5a8

  • SHA512

    19392c1a2b9ba6a0ba59fd4566929d299bd86dc021b4666ebcc680a0fdfec57c1781ae92b7c445b737bba139c893f849f763fe4096ae12dcb00459791335fe43

  • SSDEEP

    12288:fqGKl6bcNQSjEgkSiP8Lr2mFE66kjlKuJ9J7tfg+LRZq01Y:fNKl6b8JYgyP8WTGIuhZvPq

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 9 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 30 IoCs
  • Indicator Removal: Clear Persistence 1 TTPs 4 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Drops file in System32 directory 1 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies data under HKEY_USERS 24 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e1d686f1d6d26ce7b86e3ed9e737612904f37c620dadf340d2481c2a0e3e5a8N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e1d686f1d6d26ce7b86e3ed9e737612904f37c620dadf340d2481c2a0e3e5a8N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ping 127.0.0.1 -n 5 & Start c:\windows\fonts\riagyfv\aeuoswp.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2776
      • \??\c:\windows\fonts\riagyfv\aeuoswp.exe
        c:\windows\fonts\riagyfv\aeuoswp.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1924
  • \??\c:\windows\fonts\riagyfv\aeuoswp.exe
    c:\windows\fonts\riagyfv\aeuoswp.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\TEMP\5624490732756533.exe
      C:\Windows\TEMP\5624490732756533.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks /DELETE /TN nwlve /F
        3⤵
        • Indicator Removal: Clear Persistence
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /TN nwlve /F
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="aymfue" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="blivq" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='aymfue'" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="aymfue" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:796
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="blivq" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1632
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='aymfue'" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1972
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\TEMP\b9e2755d.exe
          "C:\Windows\TEMP\b9e2755d.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:776
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:648
        • C:\Windows\TEMP\b3ad0fc6.exe
          "C:\Windows\TEMP\b3ad0fc6.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1780
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:284
        • C:\Windows\TEMP\be58984f.exe
          "C:\Windows\TEMP\be58984f.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1732
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks /DELETE /TN nwlve /F
        3⤵
        • Indicator Removal: Clear Persistence
        • System Location Discovery: System Language Discovery
        PID:2016
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /TN nwlve /F
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1040
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="aymfue" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="blivq" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='aymfue'" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2120
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="aymfue" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1500
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="blivq" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1964
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='aymfue'" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2368
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2044
        • C:\Windows\TEMP\bdae74d7.exe
          "C:\Windows\TEMP\bdae74d7.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1032
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2356
        • C:\Windows\TEMP\b7590d5f.exe
          "C:\Windows\TEMP\b7590d5f.exe"
          4⤵
          • Executes dropped EXE
          PID:1488
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1368
        • C:\Windows\TEMP\b21497c8.exe
          "C:\Windows\TEMP\b21497c8.exe"
          4⤵
          • Executes dropped EXE
          PID:2960
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks /DELETE /TN nwlve /F
        3⤵
        • Indicator Removal: Clear Persistence
        • System Location Discovery: System Language Discovery
        PID:1836
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /TN nwlve /F
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2548
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="aymfue" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="blivq" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='aymfue'" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1696
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="aymfue" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1520
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="blivq" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:464
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='aymfue'" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2460
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:792
        • C:\Windows\TEMP\b6e6d47e.exe
          "C:\Windows\TEMP\b6e6d47e.exe"
          4⤵
          • Executes dropped EXE
          PID:1988
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3012
        • C:\Windows\TEMP\b1a16ee7.exe
          "C:\Windows\TEMP\b1a16ee7.exe"
          4⤵
          • Executes dropped EXE
          PID:2020
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:344
        • C:\Windows\TEMP\bb5bf860.exe
          "C:\Windows\TEMP\bb5bf860.exe"
          4⤵
          • Executes dropped EXE
          PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks /DELETE /TN inao /F
        3⤵
        • Indicator Removal: Clear Persistence
        • System Location Discovery: System Language Discovery
        PID:1544
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /DELETE /TN inao /F
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2156
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="iyhfbo" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="aqnme" DELETE & wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='iyhfbo'" DELETE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2288
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __EventFilter WHERE Name="iyhfbo" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2720
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH CommandLineEventConsumer WHERE Name="aqnme" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2728
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic /NAMESPACE:"\\root\subscription" PATH __FilterToConsumerBinding WHERE Filter="__EventFilter.Name='iyhfbo'" DELETE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2676
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2716
        • C:\Windows\TEMP\ba92d3f7.exe
          "C:\Windows\TEMP\ba92d3f7.exe"
          4⤵
          • Executes dropped EXE
          PID:2748
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2592
        • C:\Windows\TEMP\b55d7d70.exe
          "C:\Windows\TEMP\b55d7d70.exe"
          4⤵
          • Executes dropped EXE
          PID:1484
      • C:\Windows\TEMP\uin77.exe
        C:\Windows\TEMP\uin77.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1720
        • C:\Windows\TEMP\bf1706e9.exe
          "C:\Windows\TEMP\bf1706e9.exe"
          4⤵
          • Executes dropped EXE
          PID:2012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 784
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\b9e2755d.exe

    Filesize

    95KB

    MD5

    351da346f5c12846d8511f4933247550

    SHA1

    65c709ed8f81e10e2d0acd7f9ebc522bfc7ad588

    SHA256

    79032d7902a081be28417dfe3f45ce4c575a5c7cc54a7c1d08e5b3123fd8aa08

    SHA512

    8351caf6045991fc82184c0e6af84e63906c989e1ecf2ba1f77d5ca927a3a7fa6b26f4b4713c83b3153e4b8927ceee6c750b05cd28bedafa213bc7494f95812a

  • \??\c:\windows\fonts\riagyfv\aeuoswp.exe

    Filesize

    2.9MB

    MD5

    3551e5a53f9e0a37bf3ac00b05cd2572

    SHA1

    12156fb08aa97c9cc3720bc36439acb992771e7f

    SHA256

    df2807d4b6e1dfb2f65ce01140b0d6578a76a953084a34d9901e25d549c7e31a

    SHA512

    fe6fdd1fb490501fa4cbdb27727b06d729d732286f425e86c07ebc9fee435105a2a728810388eeb1a2d1fb9424e13aa3319dc9675437e7c2c638c680a8efb9b8

  • \Windows\Temp\5624490732756533.exe

    Filesize

    244KB

    MD5

    de3b294b4edf797dfa8f45b33a0317b4

    SHA1

    d46f49e223655eca9a21249a60de3719fe3795e0

    SHA256

    d6d9b5fbf32d64da140ebf83495f8c3b4f28e5a336c4b7306c84e12abf7860e9

    SHA512

    1ce19d0a57a621225702b8a7b30bbd8ca482ab305d3881f5af63cd1ac712577b633955b8b95c11ed73585dbca6377859ed27a1859e369064841639a2b4035c97

  • \Windows\Temp\b6e6d47e.exe

    Filesize

    95KB

    MD5

    c505672b725bd181d353c146c0e4197f

    SHA1

    fd53abaeb91331a711221d321f4e77a55d2d5530

    SHA256

    343528292a580344462458f3881925933f5e4dd381be9483fd4415960b6263dc

    SHA512

    7c80752aee62fb99a20bfcfc3515030c911ed417526f0d40396fc3e90c3fb6fdbba535df142411a35ba0dde77d00985bccb389581ae0c19b2b45ca40feb9e75d

  • \Windows\Temp\uin77.exe

    Filesize

    173KB

    MD5

    fe45603f5313c2712e0e4b33d0c1aaf4

    SHA1

    a7159ee2d43d612b4ca87a4ad9cc50d0cbec6428

    SHA256

    8464a458a905b66f3579cad8770042a7003d891197a27005cd25b1c0207c95eb

    SHA512

    4f184a04e5de40c121283e1054ed31ea1cac33589d2a0aa3e1eeae2c2130e39f63c4ef3d4b4cc8c9cd5619c34428e7c19d642d2ee1b8960dd550048fab2e2009

  • \Windows\Temp\uin77.exe

    Filesize

    173KB

    MD5

    f3c2bd261b9674bae77007320d8fabc5

    SHA1

    d0c1e60f07bec2666632e465de2b6fdb800624b0

    SHA256

    db9d02f6f3949be2afe94a93cdbc69000aebfb0ff72c9eda311234794a020540

    SHA512

    459b910d823df50bd64727d7ce1c8db92339a36583db0535dfe79e2114d8bfa072eb5ef0bb91fa62ce942f4e3e1dc7f1355a68dcaaef144ab4b4f11b2f2415cb

  • memory/1924-13-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/1924-10-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2068-23-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2068-47-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2068-69-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2068-155-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/2596-17-0x00000000011A0000-0x000000000122C000-memory.dmp

    Filesize

    560KB

  • memory/2596-43-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2596-44-0x00000000011A0000-0x000000000122C000-memory.dmp

    Filesize

    560KB

  • memory/2596-159-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2596-162-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2652-0-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2652-5-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB