Analysis

  • max time kernel
    141s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2023 03:47

General

  • Target

    b32c491bae58484a6c8e97d93ad8f4e79974759a21cb32d82c5bad40e7dcb680.exe

  • Size

    11KB

  • MD5

    437702d0f28d7d5f1d0e7384f74208b4

  • SHA1

    fc4f6d60995f949fc8a549e0d621a93ee73175e2

  • SHA256

    b32c491bae58484a6c8e97d93ad8f4e79974759a21cb32d82c5bad40e7dcb680

  • SHA512

    2628e32140ef00b5f04984a76088b24de755e0c2fcdcf37d3f7258615341d8cbc125fd4b7d7a6ae0e5b3ebdd08c20eeb64a1b3fdd2943ac6433a1220448173b0

  • SSDEEP

    192:jHWhla8+SAnDk3X2oLLG2tzyW4jGgAxDwCMrpY7Y8LqPZo5LdCfffnMO32WSoqP:TeQ8+6LxGWgGgAxDr6+Y9PffPze

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b32c491bae58484a6c8e97d93ad8f4e79974759a21cb32d82c5bad40e7dcb680.exe
    "C:\Users\Admin\AppData\Local\Temp\b32c491bae58484a6c8e97d93ad8f4e79974759a21cb32d82c5bad40e7dcb680.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 92
      2⤵
      • Program crash
      PID:1384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1304-54-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB