Analysis

  • max time kernel
    143s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:35

General

  • Target

    fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c.exe

  • Size

    311KB

  • MD5

    3acae02fcb29940d3473010c8a2a9cbd

  • SHA1

    c843ad5ff8b01eafe64ecad030beb24fd336a8dc

  • SHA256

    fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c

  • SHA512

    212ac5b1cedc571541e18a8a67f02309612a7e242a08fe66a0e549ca616d1bf885658f8342d23e6e9f5b9200a4eb6f43e63d3fe86198c59f3e250dad9adae6d7

  • SSDEEP

    6144:OUfoCVoAqF5gxYLQPfcwSVyqFoSZYV/2Jzid+mzk7A1j:OYnKF5gcQHLioSWc7m

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c.exe
    "C:\Users\Admin\AppData\Local\Temp\fce97ef8ab70e808ba2b2817c382d657a4e0923704c1cad2bb023379220bca6c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\WINDOWS\srchasstsss\Fobeka.exe
      C:\WINDOWS\srchasstsss\Fobeka.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:864
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\WINDOWS\srchasstsss\V3like.vbs"
      2⤵
        PID:1940
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.naver.com
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1416

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\WINDOWS\srchasstsss\Fobeka.exe
      Filesize

      86KB

      MD5

      16a11eee5b66798df236ba4f066ba795

      SHA1

      eaae9ae757f995df5f3f09dc2902c80d874edd03

      SHA256

      8bed8f6d002dd96535d13e6c8ed65694fab7a7a8f61af8a146e0ab4a38e99dfc

      SHA512

      a52f68e750e8e3a844f53960598a8de0754bbd914b602479f3be412e7f19c51aa50020333386ec812f15749b098572672130742e9395c07d941ebeaf84ff0771

    • C:\WINDOWS\srchasstsss\V3like.vbs
      Filesize

      86B

      MD5

      5e480601cc42498b764ba33a10766cbd

      SHA1

      d306d8dfe2ff756996bd61d43106210cc42eeba8

      SHA256

      b4d1791c17f6a9ccd5c45313b9993827e4e87ef3a68aa227c55589208ae04ffd

      SHA512

      295b5e21392c5af0f17e895f59dff4de894d37f25c6f8aa1dfe85cbfc19c177682a3d2a6be80a83cf6b737a7b196a5184ce9e24c67ae33dbda766f8bc81e216a

    • C:\Windows\srchasstsss\Fobeka.exe
      Filesize

      86KB

      MD5

      16a11eee5b66798df236ba4f066ba795

      SHA1

      eaae9ae757f995df5f3f09dc2902c80d874edd03

      SHA256

      8bed8f6d002dd96535d13e6c8ed65694fab7a7a8f61af8a146e0ab4a38e99dfc

      SHA512

      a52f68e750e8e3a844f53960598a8de0754bbd914b602479f3be412e7f19c51aa50020333386ec812f15749b098572672130742e9395c07d941ebeaf84ff0771

    • \Windows\srchasstsss\Fobeka.exe
      Filesize

      86KB

      MD5

      16a11eee5b66798df236ba4f066ba795

      SHA1

      eaae9ae757f995df5f3f09dc2902c80d874edd03

      SHA256

      8bed8f6d002dd96535d13e6c8ed65694fab7a7a8f61af8a146e0ab4a38e99dfc

      SHA512

      a52f68e750e8e3a844f53960598a8de0754bbd914b602479f3be412e7f19c51aa50020333386ec812f15749b098572672130742e9395c07d941ebeaf84ff0771

    • memory/864-56-0x0000000000000000-mapping.dmp
    • memory/864-64-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/864-68-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/1752-54-0x0000000076261000-0x0000000076263000-memory.dmp
      Filesize

      8KB

    • memory/1752-63-0x0000000000240000-0x0000000000282000-memory.dmp
      Filesize

      264KB

    • memory/1752-62-0x0000000000400000-0x00000000004DA000-memory.dmp
      Filesize

      872KB

    • memory/1752-66-0x0000000000400000-0x00000000004DA000-memory.dmp
      Filesize

      872KB

    • memory/1752-67-0x0000000000240000-0x0000000000282000-memory.dmp
      Filesize

      264KB

    • memory/1940-59-0x0000000000000000-mapping.dmp