Analysis

  • max time kernel
    184s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 00:08

General

  • Target

    fce58603d18b169d67fee4a3df7d39757a4126716703840acfe8cfb5e34990e9.exe

  • Size

    688KB

  • MD5

    b2e12c662badc96d34a096f48db2d85c

  • SHA1

    d6d99f90c0dd1a56a1285532254a1c92a6024077

  • SHA256

    fce58603d18b169d67fee4a3df7d39757a4126716703840acfe8cfb5e34990e9

  • SHA512

    52815a032f3f88758098757fe18bf575423f481a6e58586fc5f80105cce4d367373913516c802decb225e92b2fb0bf3c130163dc2e75d15b4239a16001dbde92

  • SSDEEP

    12288:Q8pU1gjXtuyO5lwwP5JuPi4k57It16nP0jaogTF4mFvnnkWTVb5VedvRoqr+In3/:Q8pUcU98wD6uIp2tL/35bLLRQ/

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fce58603d18b169d67fee4a3df7d39757a4126716703840acfe8cfb5e34990e9.exe
    "C:\Users\Admin\AppData\Local\Temp\fce58603d18b169d67fee4a3df7d39757a4126716703840acfe8cfb5e34990e9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.csolwg.com/?app=error&s=Windows7-64
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PO6DWTW0.txt

    Filesize

    608B

    MD5

    dbbf34c9f2796e4702510375ed037332

    SHA1

    cb90d05f5c97a56b6afa14dd3d408f7ee3e9dc10

    SHA256

    17f58c57d21999a8d0501d0abfd9731d97cca18067af938dc29904cb2a9c1171

    SHA512

    8271708914962a62dd14746a8547df5b51c2074fe1b34cdd66f4b2198341ea9aea4a486d57e4f6495ab8b181c9cf9735d1c2ca5381d011b2478b6afeb002a9c3

  • memory/1992-54-0x00000000760C1000-0x00000000760C3000-memory.dmp

    Filesize

    8KB

  • memory/1992-55-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB

  • memory/1992-56-0x0000000000401000-0x0000000000405000-memory.dmp

    Filesize

    16KB

  • memory/1992-57-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB