Analysis

  • max time kernel
    168s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:46

General

  • Target

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

  • Size

    426KB

  • MD5

    07f06f07be8fed6d6d3549194b3e5686

  • SHA1

    3af21ce20da77519adb2e75e4115805b58b906d0

  • SHA256

    edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

  • SHA512

    d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

  • SSDEEP

    12288:82pPo5DWEbs+LjK0VneEFhPlTSzZV4hQt:8225iEbsGeEhrKt

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
    "C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Users\Admin\AppData\Local\Temp\e56d4c9.tmp
      >C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
        "C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1536
      • C:\Users\Admin\AppData\Local\Temp\e56d5a4.exe
        "C:\Users\Admin\AppData\Local\Temp\\e56d5a4.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Windows\syotom.exe
          C:\Windows\syotom.exe
          4⤵
          • Executes dropped EXE
          PID:1512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1512 -ip 1512
    1⤵
      PID:3420

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\e56d4c9.tmp

      Filesize

      426KB

      MD5

      07f06f07be8fed6d6d3549194b3e5686

      SHA1

      3af21ce20da77519adb2e75e4115805b58b906d0

      SHA256

      edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

      SHA512

      d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

    • C:\Users\Admin\AppData\Local\Temp\e56d4c9.tmp

      Filesize

      426KB

      MD5

      07f06f07be8fed6d6d3549194b3e5686

      SHA1

      3af21ce20da77519adb2e75e4115805b58b906d0

      SHA256

      edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef

      SHA512

      d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb

    • C:\Users\Admin\AppData\Local\Temp\e56d5a4.exe

      Filesize

      59KB

      MD5

      5a0f7fe220f0caafe614e1cc98b892ff

      SHA1

      272501e08f3c4ffd7e879aad2f0fb8efd588fd4b

      SHA256

      9cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca

      SHA512

      70b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375

    • C:\Users\Admin\AppData\Local\Temp\e56d5a4.exe

      Filesize

      59KB

      MD5

      5a0f7fe220f0caafe614e1cc98b892ff

      SHA1

      272501e08f3c4ffd7e879aad2f0fb8efd588fd4b

      SHA256

      9cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca

      SHA512

      70b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375

    • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

      Filesize

      350KB

      MD5

      94a510acab1446ebf38e0e08c21853d9

      SHA1

      780702baabd2e5b4503b50d640b3a86fbf62e448

      SHA256

      a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

      SHA512

      4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

    • C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe

      Filesize

      350KB

      MD5

      94a510acab1446ebf38e0e08c21853d9

      SHA1

      780702baabd2e5b4503b50d640b3a86fbf62e448

      SHA256

      a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165

      SHA512

      4018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de

    • C:\Windows\syotom.exe

      Filesize

      59KB

      MD5

      5a0f7fe220f0caafe614e1cc98b892ff

      SHA1

      272501e08f3c4ffd7e879aad2f0fb8efd588fd4b

      SHA256

      9cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca

      SHA512

      70b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375

    • C:\Windows\syotom.exe

      Filesize

      59KB

      MD5

      5a0f7fe220f0caafe614e1cc98b892ff

      SHA1

      272501e08f3c4ffd7e879aad2f0fb8efd588fd4b

      SHA256

      9cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca

      SHA512

      70b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375

    • memory/1512-144-0x0000000000000000-mapping.dmp

    • memory/1512-148-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1512-147-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1536-136-0x0000000000000000-mapping.dmp

    • memory/3484-143-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3484-138-0x0000000000000000-mapping.dmp

    • memory/5016-135-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/5108-141-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/5108-132-0x0000000000000000-mapping.dmp