Analysis

  • max time kernel
    125s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2025, 07:09

General

  • Target

    Chromestup.msi

  • Size

    13.4MB

  • MD5

    a476065df4bcac42aad4f3eeab3545b4

  • SHA1

    4b60df157d79c4863a8065e149ec6e447d1a3342

  • SHA256

    32cf48d0ef7ac450c80fcc9fb9ec28af88370298c36547d2a94ff882b12500ae

  • SHA512

    0d5a5e298b145d61f17b6c3376011706535e3441f6b9c2346e67db4ce762fcbbb3da072d98f7bebc5f31885000cc0661951632508784ed7feeb61ff6c0597e95

  • SSDEEP

    393216:pBfMDbMkh0n28RmwRRenYtpBRW9AxGq5azUUEC5:vMNSSnsjRaKDGEC5

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatalrat family
  • Fatal Rat payload 2 IoCs
  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 14 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 7 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:784
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chromestup.msi
      1⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2948
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3616
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 78AF0B3C1D11D155E04BC764B15BB805
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4892
          • C:\Windows\SysWOW64\timeout.exe
            timeout /nobreak /t 7
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:3416
          • C:\ProgramData\setup\aa.exe
            C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5168
          • C:\ProgramData\Packas\scrok.exe
            C:\ProgramData\Packas\scrok.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4312
          • C:\ProgramData\Smart\TjNkNpAilaYvt.exe
            C:\ProgramData\Smart\TjNkNpAilaYvt.exe install
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:620
          • C:\ProgramData\Smart\TjNkNpAilaYvt.exe
            C:\ProgramData\Smart\TjNkNpAilaYvt.exe install
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3528
          • C:\Windows\SysWOW64\timeout.exe
            timeout /nobreak /t 2
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:3656
          • C:\ProgramData\Smart\TjNkNpAilaYvt.exe
            C:\ProgramData\Smart\TjNkNpAilaYvt.exe start
            4⤵
            • Executes dropped EXE
            PID:3020
          • C:\ProgramData\Packas\scrok.exe
            C:\ProgramData\Packas\scrok.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3696
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2968
    • C:\ProgramData\Smart\TjNkNpAilaYvt.exe
      "C:\ProgramData\Smart\TjNkNpAilaYvt.exe"
      1⤵
      • Drops file in System32 directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\ProgramData\Smart\setup.exe
        "C:\ProgramData\Smart\setup.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5880
        • C:\ProgramData\NVIDIARV\svchost.exe
          "C:\ProgramData\NVIDIARV\svchost.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1344
        • C:\ProgramData\NVIDIARV\svchost.exe
          "C:\ProgramData\NVIDIARV\svchost.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3144
        • C:\ProgramData\NVIDIARV\svchost.exe
          "C:\ProgramData\NVIDIARV\svchost.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e579e56.rbs

      Filesize

      1KB

      MD5

      8ef99e085a9e335073e809c6e0070ec8

      SHA1

      6168bc705bfe2d043397b6172d37dbaf3ef2b13d

      SHA256

      44706b924a6dd8c215ba14ae7723c02df9cc37bd20737f0479d026164c2b3e7c

      SHA512

      2f59e4070280672bf9be978dcb88e8eeb0aaf0725b49618d4c3c63a4b018e9f9af3a575f1f615736051def7613773de7e6a7893586490a853646a45dbbed0b16

    • C:\ProgramData\NVIDIARV\svchost.exe

      Filesize

      3.4MB

      MD5

      e67516972f762b64b2dc4b03ba8296b3

      SHA1

      15a764f0dd0f0e98b1dbc2e54858ea4228123853

      SHA256

      f23fc1c9fc311388f659a3c3c839c8c2be94b74837b5af19afcfc0df9e8b25e1

      SHA512

      e1e29ae8854932944377039ec681a443b7528366568991f89845c62d6d65503355a5e76a22c2495209cacd1f64e8346c41671d3af1e691a7b64183c5734f40da

    • C:\ProgramData\Packas\scrok.exe

      Filesize

      2.7MB

      MD5

      ac30909929056007eaf0fbcf53c3a21f

      SHA1

      7046d48c84748b246ebaa1c0153e8f81d3b0acc1

      SHA256

      f11baf3657a9bbfeb5d140a37d456573f589212447446a1519033ad010b9f58f

      SHA512

      71a40652f3cdfbd33cfc539855d6cbb1fba601e83bbd4b3e4f5e397144b3abfed5d148b486aec4eec17136e063609f93beae72a5e78d12d876dd79ccd3c9c849

    • C:\ProgramData\Smart\TjNkNpAilaYvt.exe

      Filesize

      832KB

      MD5

      d305d506c0095df8af223ac7d91ca327

      SHA1

      679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

      SHA256

      923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

      SHA512

      94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

    • C:\ProgramData\Smart\TjNkNpAilaYvt.wrapper.log

      Filesize

      935B

      MD5

      800f6a8e7db6875828e3ccd3a727ac70

      SHA1

      6dffa759e3ad855e14e8c048f1a7ade114fe0d2e

      SHA256

      d02dd55378f7a138ebf86a351e2ab54e07bf17af37b70014434a07004ca98f5c

      SHA512

      087a8e1bcb129e4d0af3b9267f60431af9b23e3491b0391509a7d6926e5cf02230a687a4a4a577df6819dc09b54d1fd4ed50ca47743383672c6610be889ad890

    • C:\ProgramData\Smart\TjNkNpAilaYvt.wrapper.log

      Filesize

      1009B

      MD5

      7042cfaa6c98aba2c27f16953c1ad87d

      SHA1

      11768f996e2e882d3d32f73fcc70b480d34e60c0

      SHA256

      72813747a14587374848b41218c1399f315d2402bdf72ad571f262121a0a0137

      SHA512

      7518e656c830265930566a3be6b617cf4ec921d2116e80c55e6a1549c43b8ebe922104d8f7a59d9260e7c572a26538899816300f1c4cdb40eabca06bd489a632

    • C:\ProgramData\Smart\TjNkNpAilaYvt.wrapper.log

      Filesize

      424B

      MD5

      f89151164342c6544098ef91e6fecad6

      SHA1

      cf96be5b28617bf1f9cb73a67e31b691903deac9

      SHA256

      5d8f50ae6823148918824fd89c7a7f7b9a82fd64a99e09653ffeee7a3d6e0b86

      SHA512

      34f4f75abe13583d18bb8177aa7b518c9c881dab800b46fc128900a2978a03640c6ef289ec05d9b81701f8b87afe6d9424726dc98b115065f7ddadf9a5e91f3b

    • C:\ProgramData\Smart\TjNkNpAilaYvt.wrapper.log

      Filesize

      677B

      MD5

      d9e12ec4193c056b10dcdf30f58441b6

      SHA1

      552176b94f8f3e16f175448e9ee7325be5df49bd

      SHA256

      a32c26ac1568887e192ee14dd652a81978066acf55a8d5734b13f02b67886352

      SHA512

      9ec0e82ce11549908360770f4e3cc9aa8793f832b96e617c5abcdbf88cc409184a3bf54bffc6905482d0600778fd3e87d68c1e580630276f2660cd4b9d94ca13

    • C:\ProgramData\Smart\TjNkNpAilaYvt.wrapper.log

      Filesize

      769B

      MD5

      eeaa4df402b90ef059d96281379b7e05

      SHA1

      9e2a4226c6b2aefd1434a8eacf2303b8fa8a136c

      SHA256

      2b0b5eab1699674b5ca7ebf94bd77028dd1ecaef6160bce994b40ad4ecddff68

      SHA512

      923f4fa00364306b534cf5620d551350cc46c9f3c25ce99fc6a36ddb1a565ee24001fc260629baf2875df6b74307c6512969d3d2abd394ed1c62f3c510d63c42

    • C:\ProgramData\Smart\TjNkNpAilaYvt.xml

      Filesize

      298B

      MD5

      2c706293a3cfff8cc184a8e9a3b3da08

      SHA1

      873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d

      SHA256

      ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067

      SHA512

      4aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043

    • C:\ProgramData\Smart\setup.exe

      Filesize

      4.7MB

      MD5

      113f2ba0cb86477d66f1d8c85a1babfc

      SHA1

      b5501c19f3fe899565df3bead0580fa3fee54856

      SHA256

      6cc5816529c56e5b0c871accbbb3de9abf83ac541645f587da4607d60d3b0e11

      SHA512

      50617759533ca626d79bb19764da0a44774ced9d59a4a6386eda46ad6c21dc54189605b7555fee870059e447c5d4dde28c7c68dc185ab5cd53002f68f4c27d40

    • C:\ProgramData\setup\aa.exe

      Filesize

      1.0MB

      MD5

      09c448be7e7d84e6e544cc03afbb05d8

      SHA1

      ddc13e71a72bc49c60f89b98cbb79c2449cfa07e

      SHA256

      a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5

      SHA512

      e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12

    • C:\ProgramData\setup\ddd

      Filesize

      10.7MB

      MD5

      82caf2f7b43286317bd12b703c63670f

      SHA1

      9aed1ac05263c1ae297966862a60ca8007aa93e1

      SHA256

      e5f84ec6545e825601ff3510a1847d0554640851969aaeba53af2fc74c68dc20

      SHA512

      4c060a2bbb35e80831ca5008c80ffeb5c703fbba37f9bd9f0ddcb660628bb50c8ce9f4035fdc31da705bb019224926ac30276fd54333c70f5d496a82007d1f39

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TjNkNpAilaYvt.exe.log

      Filesize

      1KB

      MD5

      122cf3c4f3452a55a92edee78316e071

      SHA1

      f2caa36d483076c92d17224cf92e260516b3cbbf

      SHA256

      42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

      SHA512

      c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

    • C:\Windows\Installer\MSI9EB1.tmp

      Filesize

      587KB

      MD5

      c7fbd5ee98e32a77edf1156db3fca622

      SHA1

      3e534fc55882e9fb940c9ae81e6f8a92a07125a0

      SHA256

      e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6

      SHA512

      8691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a

    • C:\Windows\Installer\MSIA1B2.tmp

      Filesize

      1.1MB

      MD5

      ae463676775a1dd0b7a28ddb265b4065

      SHA1

      dff64c17885c7628b22631a2cdc9da83e417d348

      SHA256

      83fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22

      SHA512

      e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      b6c3beadfa8571b4c0a049193e41b1fd

      SHA1

      6add00b1ed46d9e462f5c37c17e1bd60c8b565d7

      SHA256

      1c9504b34928e0758ae1981c2bc08383cb0401e3bbd98ce58890a775ac2a406c

      SHA512

      12e6e7e825530f2f094f04272843b4addd5f43516b9b170c2a6fd9c8756302e87275a77625013f66189ec12134e70be662d996aa2e24142acbc9a9c21d98a216

    • \??\Volume{28d8005c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b5a36326-c034-4319-8fc2-0012ac073134}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      e0a6cd7da7f03c119d5f221ab71298f3

      SHA1

      83c21a0ac885dba7c03568d758bf86cf2ea3f0de

      SHA256

      4e89797ba4a7d914a0c7e6b2d64e3f6ed591b5f0d949901d7e475d5e3cdeef43

      SHA512

      c3a1df633ee0b7da3279e9227b036c28c2340850d76d378f3b5521ae8fd7874dc090f8c5d3d591f1a529b06d10ffc25eeb3b9ee9be451b02096b29fd7aebb76b

    • memory/620-74-0x00000000001B0000-0x0000000000286000-memory.dmp

      Filesize

      856KB

    • memory/656-149-0x0000000002A00000-0x0000000002C00000-memory.dmp

      Filesize

      2.0MB

    • memory/656-148-0x0000000002A00000-0x0000000002C00000-memory.dmp

      Filesize

      2.0MB

    • memory/1344-133-0x0000000010000000-0x000000001002D000-memory.dmp

      Filesize

      180KB

    • memory/1344-129-0x0000000000400000-0x0000000000911000-memory.dmp

      Filesize

      5.1MB

    • memory/3144-131-0x0000000000400000-0x0000000000911000-memory.dmp

      Filesize

      5.1MB

    • memory/3144-138-0x0000000010000000-0x000000001002D000-memory.dmp

      Filesize

      180KB

    • memory/3696-113-0x00007FF7687E0000-0x00007FF768D8C000-memory.dmp

      Filesize

      5.7MB

    • memory/4312-68-0x00007FF7687E0000-0x00007FF768D8C000-memory.dmp

      Filesize

      5.7MB

    • memory/4312-67-0x00007FFBE03B0000-0x00007FFBE03B2000-memory.dmp

      Filesize

      8KB

    • memory/5168-63-0x0000000000400000-0x0000000000510000-memory.dmp

      Filesize

      1.1MB

    • memory/5880-116-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/5880-117-0x0000000000400000-0x0000000000B99000-memory.dmp

      Filesize

      7.6MB