Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2023 07:19

General

  • Target

    tmp.exe

  • Size

    29KB

  • MD5

    03420503492876831fe357bab392ca17

  • SHA1

    d3ca0ff647471f9ba82db7ffbe1666532d1a6295

  • SHA256

    d9ffc2f3a4b9d8241db6318ee0f365862f499e041af2fc615a08b0680f265fe1

  • SHA512

    2e48f798f1c4d2c3e1cbd34eca1c724fdea962354f9222ab357d238770ed329ef1fd743f45c4bbe3364742b40b05ad5aab6d2f7c7d4ab47a3dc9ad654a0c3282

  • SSDEEP

    768:lk8fRyRdrZUoovLBTf2dxW4xHnPgvM0d:lk8fyrkvL10DxoE

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
      PID:4564

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4564-133-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/4564-134-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB