Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2023 19:30

General

  • Target

    f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe

  • Size

    786KB

  • MD5

    78014f73e8e8dcc028a618e4cb4435f7

  • SHA1

    b5477af280460bf5abaca216316ecbcba1182514

  • SHA256

    f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f

  • SHA512

    b6fb5ff57a8312408aff393c4ccbef66aac23dbf405aa98f82cbea2a4882cf954d5d49ef8c8aa0f76b92922c9aae40f82460098dda156cc23bf76f83c96f5864

  • SSDEEP

    12288:qwB2jOZqGbhqjW35Wb2xS94JZX0N3/5mTGPB5KZJ+8UCgH:1SOZqK351Y94JZX09/5mm5K1

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 18 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe
    "C:\Users\Admin\AppData\Local\Temp\f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-54-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-56-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-55-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-57-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2004-60-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-61-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-62-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-63-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-64-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-65-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-66-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-67-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-68-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-69-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-70-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-71-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-72-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-73-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2004-74-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB