Resubmissions

19-11-2022 13:50

221119-q5g7dadg75 10

16-11-2022 22:11

221116-13znrahb4y 10

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2022 13:50

General

  • Target

    b4d4590a582639275a82f8de43cb470da98af293b3e3d147ae66fd24b793a832.exe

  • Size

    4.0MB

  • MD5

    a0588d88e7ddb01fc9ac9d3b5cf215d8

  • SHA1

    3647f00f21ba2f090d81f07fca5137c4566b4046

  • SHA256

    b4d4590a582639275a82f8de43cb470da98af293b3e3d147ae66fd24b793a832

  • SHA512

    0597a689f1b9c521415835272f123782ce5431c3049be15aa38664e8b288cf29a6715eb47e023e2479bfbba2ee387435ba72b5b7e14801a6c086b59f311df9c6

  • SSDEEP

    98304:WBLaX2XjPrbVGbFWMZNA2wITWuXIu/M1vrGp1oVXL:YLaWrh3WNVwWWuz/M1vqpeXL

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d4590a582639275a82f8de43cb470da98af293b3e3d147ae66fd24b793a832.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d4590a582639275a82f8de43cb470da98af293b3e3d147ae66fd24b793a832.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\deldl.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 0 /f
        3⤵
          PID:1860
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /f
          3⤵
            PID:1544
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigURL /f
            3⤵
              PID:1836
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" /v DefaultConnectionSettings /t REG_BINARY /d 4600000000 /f
              3⤵
                PID:4328
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" /v SavedLegacySettings /t REG_BINARY /d 4600000000 /f
                3⤵
                  PID:796

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\deldl.bat

              Filesize

              699B

              MD5

              c6bd8c5ea90831eb71f920bffbdc0a29

              SHA1

              e87c7d038d85e19d0ab3b56f32a70b9a5486ece5

              SHA256

              c406efc6d11bef6aefce056fc46fc562eb717aaf30a3bb8e35e460af78ea88ed

              SHA512

              8c47b14dcf1957040a03aa1cf16854bf90aee4e2b5a46522b291fcecfed4a6bfb442aef5d52b22f5b367638609856a50a5c3d43ab43427c09c0744c0b9572c1c

            • memory/2084-132-0x0000000000400000-0x0000000001092000-memory.dmp

              Filesize

              12.6MB

            • memory/2084-133-0x0000000000400000-0x0000000001092000-memory.dmp

              Filesize

              12.6MB

            • memory/2084-134-0x0000000000400000-0x0000000001092000-memory.dmp

              Filesize

              12.6MB

            • memory/2084-135-0x0000000000400000-0x0000000001092000-memory.dmp

              Filesize

              12.6MB

            • memory/2084-143-0x0000000000400000-0x0000000001092000-memory.dmp

              Filesize

              12.6MB