Analysis

  • max time kernel
    127s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:46

General

  • Target

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

  • Size

    426KB

  • MD5

    07f06f07be8fed6d6d3549194b3e5686

  • SHA1

    3af21ce20da77519adb2e75e4115805b58b906d0

  • SHA256

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

  • SHA512

    d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

  • SSDEEP

    12288:82pPo5DWEbs+LjK0VneEFhPlTSzZV4hQt:8225iEbsGeEhrKt

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
    "C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\6c735d.tmp
      >C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
        "C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:844
      • C:\Users\Admin\AppData\Local\Temp\6c7936.exe
        "C:\Users\Admin\AppData\Local\Temp\\6c7936.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Windows\syotom.exe
          C:\Windows\syotom.exe
          4⤵
          • Executes dropped EXE
          PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6c735d.tmp

    Filesize

    426KB

    MD5

    07f06f07be8fed6d6d3549194b3e5686

    SHA1

    3af21ce20da77519adb2e75e4115805b58b906d0

    SHA256

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

    SHA512

    d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

  • C:\Users\Admin\AppData\Local\Temp\6c735d.tmp

    Filesize

    426KB

    MD5

    07f06f07be8fed6d6d3549194b3e5686

    SHA1

    3af21ce20da77519adb2e75e4115805b58b906d0

    SHA256

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

    SHA512

    d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

  • C:\Users\Admin\AppData\Local\Temp\6c7936.exe

    Filesize

    59KB

    MD5

    7b86a52b0408148032096a84cf75ece9

    SHA1

    c069be8b2adf29b3f4ce07b53072db36b7a8dd70

    SHA256

    87c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea

    SHA512

    d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e

  • C:\Users\Admin\AppData\Local\Temp\6c7936.exe

    Filesize

    59KB

    MD5

    7b86a52b0408148032096a84cf75ece9

    SHA1

    c069be8b2adf29b3f4ce07b53072db36b7a8dd70

    SHA256

    87c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea

    SHA512

    d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e

  • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

    Filesize

    350KB

    MD5

    94a510acab1446ebf38e0e08c21853d9

    SHA1

    780702baabd2e5b4503b50d640b3a86fbf62e448

    SHA256

    a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

    SHA512

    4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

  • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

    Filesize

    350KB

    MD5

    94a510acab1446ebf38e0e08c21853d9

    SHA1

    780702baabd2e5b4503b50d640b3a86fbf62e448

    SHA256

    a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

    SHA512

    4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

  • C:\Windows\syotom.exe

    Filesize

    59KB

    MD5

    7b86a52b0408148032096a84cf75ece9

    SHA1

    c069be8b2adf29b3f4ce07b53072db36b7a8dd70

    SHA256

    87c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea

    SHA512

    d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e

  • C:\Windows\syotom.exe

    Filesize

    59KB

    MD5

    7b86a52b0408148032096a84cf75ece9

    SHA1

    c069be8b2adf29b3f4ce07b53072db36b7a8dd70

    SHA256

    87c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea

    SHA512

    d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e

  • \Users\Admin\AppData\Local\Temp\6c735d.tmp

    Filesize

    426KB

    MD5

    07f06f07be8fed6d6d3549194b3e5686

    SHA1

    3af21ce20da77519adb2e75e4115805b58b906d0

    SHA256

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

    SHA512

    d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

  • \Users\Admin\AppData\Local\Temp\6c735d.tmp

    Filesize

    426KB

    MD5

    07f06f07be8fed6d6d3549194b3e5686

    SHA1

    3af21ce20da77519adb2e75e4115805b58b906d0

    SHA256

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

    SHA512

    d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

  • \Users\Admin\AppData\Local\Temp\6c7936.exe

    Filesize

    59KB

    MD5

    7b86a52b0408148032096a84cf75ece9

    SHA1

    c069be8b2adf29b3f4ce07b53072db36b7a8dd70

    SHA256

    87c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea

    SHA512

    d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e

  • \Users\Admin\AppData\Local\Temp\6c7936.exe

    Filesize

    59KB

    MD5

    7b86a52b0408148032096a84cf75ece9

    SHA1

    c069be8b2adf29b3f4ce07b53072db36b7a8dd70

    SHA256

    87c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea

    SHA512

    d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e

  • \Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

    Filesize

    350KB

    MD5

    94a510acab1446ebf38e0e08c21853d9

    SHA1

    780702baabd2e5b4503b50d640b3a86fbf62e448

    SHA256

    a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

    SHA512

    4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

  • \Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

    Filesize

    350KB

    MD5

    94a510acab1446ebf38e0e08c21853d9

    SHA1

    780702baabd2e5b4503b50d640b3a86fbf62e448

    SHA256

    a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

    SHA512

    4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

  • \Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

    Filesize

    350KB

    MD5

    94a510acab1446ebf38e0e08c21853d9

    SHA1

    780702baabd2e5b4503b50d640b3a86fbf62e448

    SHA256

    a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

    SHA512

    4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

  • \Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

    Filesize

    350KB

    MD5

    94a510acab1446ebf38e0e08c21853d9

    SHA1

    780702baabd2e5b4503b50d640b3a86fbf62e448

    SHA256

    a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

    SHA512

    4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

  • memory/664-81-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/664-75-0x0000000000000000-mapping.dmp

  • memory/664-83-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/680-84-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/680-70-0x0000000000000000-mapping.dmp

  • memory/680-78-0x0000000000270000-0x00000000002A4000-memory.dmp

    Filesize

    208KB

  • memory/680-82-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/680-80-0x0000000000270000-0x00000000002A4000-memory.dmp

    Filesize

    208KB

  • memory/844-61-0x0000000000000000-mapping.dmp

  • memory/844-63-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB

  • memory/944-57-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1736-56-0x0000000000000000-mapping.dmp

  • memory/1736-72-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB