Analysis

  • max time kernel
    125s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    23-06-2023 15:04

General

  • Target

    netbri.exe

  • Size

    700KB

  • MD5

    a165e1db0ff449c3752a6959598d925f

  • SHA1

    f122e6063f883bd071d4eb19527fdb39ffbd8033

  • SHA256

    e3998468214b36f97454b9b8fb698cf8afa374522d7663ca979fcf7dd86e427e

  • SHA512

    9b7839e3e56039b62c0c94c8bcbd00f5c92f9613c1a605a3226d38646991d763c09787618314647c9dad94d39323bb1827710aa6eff43f85bd20e2a700b50455

  • SSDEEP

    12288:DLnnGUbSWxIDCBoOd1x29v2aDpB9gf3XgaFN9gX08Oujawx021njLgnJRv:PnnGDWxImBoOd1xIv2ad/s3Xg4YE8O6o

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\netbri.exe
    "C:\Users\Admin\AppData\Local\Temp\netbri.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-55-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-56-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-58-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-59-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-61-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-60-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-57-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-63-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-68-0x0000000003210000-0x0000000003368000-memory.dmp

    Filesize

    1.3MB

  • memory/1692-69-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-67-0x0000000003100000-0x0000000003210000-memory.dmp

    Filesize

    1.1MB

  • memory/1692-66-0x0000000010000000-0x000000001001A000-memory.dmp

    Filesize

    104KB

  • memory/1692-65-0x0000000002A60000-0x0000000002FDA000-memory.dmp

    Filesize

    5.5MB

  • memory/1692-64-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1692-62-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-71-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB

  • memory/1692-72-0x0000000006110000-0x0000000006615000-memory.dmp

    Filesize

    5.0MB

  • memory/1692-73-0x0000000002A60000-0x0000000002FDA000-memory.dmp

    Filesize

    5.5MB

  • memory/1692-74-0x0000000003210000-0x0000000003368000-memory.dmp

    Filesize

    1.3MB

  • memory/1692-75-0x0000000004380000-0x00000000045A2000-memory.dmp

    Filesize

    2.1MB