Analysis

  • max time kernel
    50s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 21:11

General

  • Target

    2f3a3e776bcdeb21ef0e530be052231ffb2c0cc541c7083c646a4c24b9befe5a.exe

  • Size

    4.3MB

  • MD5

    ea3e9d19106196e24b10b15d2ae9210d

  • SHA1

    0194afbf5ccd49db5e168815b31b19871b8fdb7f

  • SHA256

    2f3a3e776bcdeb21ef0e530be052231ffb2c0cc541c7083c646a4c24b9befe5a

  • SHA512

    8472297798911213ef8eec4a943898978463756e89a3295f3a4ad12d6a26669cfb9c0c18bfc176d549f99e7b3b0e15a6b06803cbf2040c9aa79d5691f00b55a5

  • SSDEEP

    98304:XqlBDmLNAlORoPZ6YCSEvDAKOHG2eSgw41WSqBgZT4kxL4tbezpJ:XqvtkiR6YCSEvKm4IqiZ3YeNJ

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Sets service image path in registry 2 TTPs 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: LoadsDriver 12 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f3a3e776bcdeb21ef0e530be052231ffb2c0cc541c7083c646a4c24b9befe5a.exe
    "C:\Users\Admin\AppData\Local\Temp\2f3a3e776bcdeb21ef0e530be052231ffb2c0cc541c7083c646a4c24b9befe5a.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\SYSWOW64\cttunesvr.exe
      "C:\Windows\SYSWOW64\cttunesvr.exe"
      2⤵
      • Sets service image path in registry
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in Windows directory
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic BaseBoard get SerialNumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
      • C:\Users\Admin\AppData\Local\Temp\5bcd7ef71fac4386.exe
        "C:\Users\Admin\AppData\Local\Temp\5bcd7ef71fac4386.exe"
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5bcd7ef71fac4386.exe

    Filesize

    456KB

    MD5

    b37b7cb0d855149fc56b7d76fa40d54f

    SHA1

    e402a250ec28e5d5c3f30dc706bdd729ac87b922

    SHA256

    2281727177c49d7f6519b62407d4de86911a773e3d2ebf63a2b9d9827ab8bc45

    SHA512

    08089b1e712061522edfa9e317bc44c6f7af474e3cf7adf56390f9131a9bbef14371319f25b613587fd935a1ad42014852b8bdae4a4ea6223783e686efa42357

  • \Users\Admin\AppData\Local\Temp\5bcd7ef71fac4386.exe

    Filesize

    456KB

    MD5

    b37b7cb0d855149fc56b7d76fa40d54f

    SHA1

    e402a250ec28e5d5c3f30dc706bdd729ac87b922

    SHA256

    2281727177c49d7f6519b62407d4de86911a773e3d2ebf63a2b9d9827ab8bc45

    SHA512

    08089b1e712061522edfa9e317bc44c6f7af474e3cf7adf56390f9131a9bbef14371319f25b613587fd935a1ad42014852b8bdae4a4ea6223783e686efa42357

  • \Users\Admin\AppData\Local\Temp\Error.dll

    Filesize

    1.7MB

    MD5

    6bde7211a233d168d3e1fdec55ed6e0e

    SHA1

    bb97c032c48989bbc10e1e0cff3c8d7c9f45b097

    SHA256

    37eec4edf943a97649b44461365a08ab128cefb12cbe9c92275794e3e9a5c721

    SHA512

    e728e99a1a369c4e8013061510c6e0bd543951cd05d315e7dd3c6a3597b8147462ad4e4c1195dc84763cd198fc2817b91f7702eea90dbfb7ee7d3e01b7d0a7cf

  • memory/1856-54-0x0000000010000000-0x0000000010575000-memory.dmp

    Filesize

    5.5MB

  • memory/1856-58-0x0000000002490000-0x00000000029E9000-memory.dmp

    Filesize

    5.3MB

  • memory/1856-68-0x0000000074580000-0x00000000748B3000-memory.dmp

    Filesize

    3.2MB