Analysis

  • max time kernel
    123s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 14:05

General

  • Target

    82151abe9fbda4bf09c23ed94.exe

  • Size

    476KB

  • MD5

    f1eed8c9913ba48d51b9c03e75e155f0

  • SHA1

    79bf7476a9f3ba427445cb27613a44a2e4b3cb7d

  • SHA256

    82151abe9fbda4bf09c23ed946fd56d6af7c4582ce49b9a2884b71780169abc6

  • SHA512

    d55e09caf26b67ed3cd53f751c314e7295b0dd70fb4c04011b923172651ad19173a1f45b789f3fa76d7ba27272f10f745db162f254ef783b480f2b2b158664bf

  • SSDEEP

    12288:64hsx/Zi0qBgAqEiRKI9A4C5CCC1CCCCXCCCCCwCCCCCCNCCCCCCCxCCCCCCCC5G:dOhi0qj

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Drops file in System32 directory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82151abe9fbda4bf09c23ed94.exe
    "C:\Users\Admin\AppData\Local\Temp\82151abe9fbda4bf09c23ed94.exe"
    1⤵
      PID:4660
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      PID:4304

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4660-133-0x0000000000400000-0x00000000004F6000-memory.dmp

      Filesize

      984KB

    • memory/4660-134-0x0000000000400000-0x00000000004F6000-memory.dmp

      Filesize

      984KB

    • memory/4660-135-0x0000000000400000-0x00000000004F6000-memory.dmp

      Filesize

      984KB

    • memory/4660-136-0x0000000000400000-0x00000000004F6000-memory.dmp

      Filesize

      984KB