Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2023 19:30

General

  • Target

    f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe

  • Size

    786KB

  • MD5

    78014f73e8e8dcc028a618e4cb4435f7

  • SHA1

    b5477af280460bf5abaca216316ecbcba1182514

  • SHA256

    f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f

  • SHA512

    b6fb5ff57a8312408aff393c4ccbef66aac23dbf405aa98f82cbea2a4882cf954d5d49ef8c8aa0f76b92922c9aae40f82460098dda156cc23bf76f83c96f5864

  • SSDEEP

    12288:qwB2jOZqGbhqjW35Wb2xS94JZX0N3/5mTGPB5KZJ+8UCgH:1SOZqK351Y94JZX09/5mm5K1

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 17 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe
    "C:\Users\Admin\AppData\Local\Temp\f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2700-133-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-135-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-136-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-134-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-137-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2700-140-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-141-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-142-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-143-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-144-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-145-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-146-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-147-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-148-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-149-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-150-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-151-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-152-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2700-153-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB