Analysis

  • max time kernel
    190s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:45

General

  • Target

    7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe

  • Size

    29KB

  • MD5

    0816fbe3f9db95d1d5d17c847ad7de7f

  • SHA1

    11860a60879b14b8b08193f52ff9bbe5cd9cbdd2

  • SHA256

    7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0

  • SHA512

    9ed81069776a877bd70aedb51deb2c0bf87810105aa63164defb99d69ba8ae52612d83c1f0edeec1bc349f4fda649dd07ddcbddb3cc610d7edb59aeccb8b2976

  • SSDEEP

    768:bncSv1fYN9bjyoPg3lspxTjWtL8LIazF9:ASve9bjm1spJWV6IE9

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • Drops file in Drivers directory 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe
    "C:\Users\Admin\AppData\Local\Temp\7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe
      "C:\Users\Admin\AppData\Local\Temp\7a8979d7529aff95bc92828b7e005192c451f764c831c2819891d18af966bda0.exe"
      2⤵
      • Drops file in Drivers directory
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:472
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:472 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1556

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    4153fc14f1900e979521529b48fd5d34

    SHA1

    ecb49a975396c12480e8c2c1654c3f49a1f5979d

    SHA256

    b701b6636d139a56f3c3a322873887acb9bcf94943aa76534536f69dc04b6e32

    SHA512

    7082eb7adb16803957b4781d46f446ef1d6651462c06312f624b6dbcf2548a7a592b5457ef0b29c0923e325e137159ead151c4b5ca669b7eb355ddb04940c87c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SYVGJHL4.txt
    Filesize

    608B

    MD5

    e10260adf32ca86ab4da64ee236b2959

    SHA1

    bf617fa2d402247818db1cf2299e0204be5fc71b

    SHA256

    9b8d639be4b53cd8b06c1bec2a7f5df9d6a598d71091c16e1444136f542b0c3f

    SHA512

    407483549c2cf33299508104aaf393699436b707b18ebb08d0ffd3cef513b19f43f92de333f5ee8c55bf1c2639b0e89baa748cdecd73e4af42e2f6cffbdde89f

  • memory/2012-54-0x0000000000400000-0x0000000000440000-memory.dmp
    Filesize

    256KB

  • memory/2012-55-0x0000000000400000-0x0000000000440000-memory.dmp
    Filesize

    256KB

  • memory/2012-57-0x0000000000400000-0x0000000000440000-memory.dmp
    Filesize

    256KB

  • memory/2012-58-0x0000000000423A72-mapping.dmp
  • memory/2012-61-0x0000000000400000-0x0000000000440000-memory.dmp
    Filesize

    256KB

  • memory/2012-62-0x0000000000400000-0x0000000000440000-memory.dmp
    Filesize

    256KB

  • memory/2012-63-0x00000000767F1000-0x00000000767F3000-memory.dmp
    Filesize

    8KB

  • memory/2012-64-0x0000000000400000-0x0000000000440000-memory.dmp
    Filesize

    256KB

  • memory/2028-59-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB