Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2023 02:14

General

  • Target

    840990c302bde9e128238314c8ffb9c64a7317b728d4ff577d5f089998b07cf0.exe

  • Size

    18.5MB

  • MD5

    e15275e55b641d2edfdaf980dbd28cda

  • SHA1

    24865c4bf9793da9d22049208b5903396e6d3f57

  • SHA256

    840990c302bde9e128238314c8ffb9c64a7317b728d4ff577d5f089998b07cf0

  • SHA512

    39238e2547e652e2f690f0670d54e5cc7437db1f09219f75e3af73b4bf39c0fd5581fb03319f62460157a5433d9dcc2576398d8f364a92240fc68b723e6d9212

  • SSDEEP

    196608:ex4YIeJVSmi93ZjDHTQnOFDKpxOET0hmk00nSJdziGYhU0jatCTNX+wnRtOMGi+W:ney3Hz8pxrT0kHJdqi0e81xRtOMP

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 7 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\840990c302bde9e128238314c8ffb9c64a7317b728d4ff577d5f089998b07cf0.exe
    "C:\Users\Admin\AppData\Local\Temp\840990c302bde9e128238314c8ffb9c64a7317b728d4ff577d5f089998b07cf0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe
      C:\Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 284
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2884
    • C:\Users\Admin\AppData\Local\Temp\Containers.exe
      C:\Users\Admin\AppData\Local\Temp\\Containers.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Users\Admin\AppData\Roaming\nvgwl.exe
        C:\Users\Admin\AppData\Roaming\nvgwl.exe -n Containers.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Containers.exe

    Filesize

    14.6MB

    MD5

    0e7b5d11663d65bc4518103ad57b7a35

    SHA1

    eec123b1ae6325abb5ab319bdf9a0c9fa1b18767

    SHA256

    751aef0fa57a2cc5a3831eb4df342a006a326ff7deeb9f7eb7b91844d0babb21

    SHA512

    4e91d17cc68076ea3a85dacfc64a19c8e4ad4ed84bb6967764530b33b7de487361fc3b8b5e87ebea03e5581963ec06a7b390856b43b46a3360ef7a3cee3759c1

  • C:\Users\Admin\AppData\Local\Temp\Containers.exe

    Filesize

    14.6MB

    MD5

    0e7b5d11663d65bc4518103ad57b7a35

    SHA1

    eec123b1ae6325abb5ab319bdf9a0c9fa1b18767

    SHA256

    751aef0fa57a2cc5a3831eb4df342a006a326ff7deeb9f7eb7b91844d0babb21

    SHA512

    4e91d17cc68076ea3a85dacfc64a19c8e4ad4ed84bb6967764530b33b7de487361fc3b8b5e87ebea03e5581963ec06a7b390856b43b46a3360ef7a3cee3759c1

  • C:\Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe

    Filesize

    3.2MB

    MD5

    b9a6dde62126369e9fa342a7b7f168dd

    SHA1

    21c83f14f397a2d73af9573876876f452c3c2092

    SHA256

    7e8500a4d0d9937d48a7dfd33ba28c06e2d16e842141f1c02a68f73b6d087806

    SHA512

    1a86577ae2fff33b94f0242191ba1b1297e0b75ef96578b8ec18f294b62168835f57966e036b179661dcdf01e4d5891a2e62650e62ca643c41a7034312a2f4df

  • C:\Users\Admin\AppData\Roaming\nvgwl.exe

    Filesize

    642KB

    MD5

    5551b5f2a3f14636f8947f112a7ca6aa

    SHA1

    fad4b84c8c2d58f88e0013a10d02417097ff2e84

    SHA256

    c3bf1743cd48c6c3f8a705ffa96b7f005652f39fe359c25c443b2fb3f31f3858

    SHA512

    6a3dd4b9d97fce3aac31ec050b9b637e3b835d76e15c3ed9ee03241e80148c569a15e45489a023fb600373b7352b38034da84f47a5ad1f20e5baea7bc012ef8d

  • \Users\Admin\AppData\Local\Temp\Containers.exe

    Filesize

    14.6MB

    MD5

    0e7b5d11663d65bc4518103ad57b7a35

    SHA1

    eec123b1ae6325abb5ab319bdf9a0c9fa1b18767

    SHA256

    751aef0fa57a2cc5a3831eb4df342a006a326ff7deeb9f7eb7b91844d0babb21

    SHA512

    4e91d17cc68076ea3a85dacfc64a19c8e4ad4ed84bb6967764530b33b7de487361fc3b8b5e87ebea03e5581963ec06a7b390856b43b46a3360ef7a3cee3759c1

  • \Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe

    Filesize

    3.2MB

    MD5

    b9a6dde62126369e9fa342a7b7f168dd

    SHA1

    21c83f14f397a2d73af9573876876f452c3c2092

    SHA256

    7e8500a4d0d9937d48a7dfd33ba28c06e2d16e842141f1c02a68f73b6d087806

    SHA512

    1a86577ae2fff33b94f0242191ba1b1297e0b75ef96578b8ec18f294b62168835f57966e036b179661dcdf01e4d5891a2e62650e62ca643c41a7034312a2f4df

  • \Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe

    Filesize

    3.2MB

    MD5

    b9a6dde62126369e9fa342a7b7f168dd

    SHA1

    21c83f14f397a2d73af9573876876f452c3c2092

    SHA256

    7e8500a4d0d9937d48a7dfd33ba28c06e2d16e842141f1c02a68f73b6d087806

    SHA512

    1a86577ae2fff33b94f0242191ba1b1297e0b75ef96578b8ec18f294b62168835f57966e036b179661dcdf01e4d5891a2e62650e62ca643c41a7034312a2f4df

  • \Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe

    Filesize

    3.2MB

    MD5

    b9a6dde62126369e9fa342a7b7f168dd

    SHA1

    21c83f14f397a2d73af9573876876f452c3c2092

    SHA256

    7e8500a4d0d9937d48a7dfd33ba28c06e2d16e842141f1c02a68f73b6d087806

    SHA512

    1a86577ae2fff33b94f0242191ba1b1297e0b75ef96578b8ec18f294b62168835f57966e036b179661dcdf01e4d5891a2e62650e62ca643c41a7034312a2f4df

  • \Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe

    Filesize

    3.2MB

    MD5

    b9a6dde62126369e9fa342a7b7f168dd

    SHA1

    21c83f14f397a2d73af9573876876f452c3c2092

    SHA256

    7e8500a4d0d9937d48a7dfd33ba28c06e2d16e842141f1c02a68f73b6d087806

    SHA512

    1a86577ae2fff33b94f0242191ba1b1297e0b75ef96578b8ec18f294b62168835f57966e036b179661dcdf01e4d5891a2e62650e62ca643c41a7034312a2f4df

  • \Users\Admin\AppData\Local\Temp\w32vYCPrR2NMahTe.exe

    Filesize

    3.2MB

    MD5

    b9a6dde62126369e9fa342a7b7f168dd

    SHA1

    21c83f14f397a2d73af9573876876f452c3c2092

    SHA256

    7e8500a4d0d9937d48a7dfd33ba28c06e2d16e842141f1c02a68f73b6d087806

    SHA512

    1a86577ae2fff33b94f0242191ba1b1297e0b75ef96578b8ec18f294b62168835f57966e036b179661dcdf01e4d5891a2e62650e62ca643c41a7034312a2f4df

  • \Users\Admin\AppData\Roaming\nvgwl.exe

    Filesize

    642KB

    MD5

    5551b5f2a3f14636f8947f112a7ca6aa

    SHA1

    fad4b84c8c2d58f88e0013a10d02417097ff2e84

    SHA256

    c3bf1743cd48c6c3f8a705ffa96b7f005652f39fe359c25c443b2fb3f31f3858

    SHA512

    6a3dd4b9d97fce3aac31ec050b9b637e3b835d76e15c3ed9ee03241e80148c569a15e45489a023fb600373b7352b38034da84f47a5ad1f20e5baea7bc012ef8d

  • memory/1976-61-0x0000000010000000-0x00000000100B3000-memory.dmp

    Filesize

    716KB

  • memory/2536-72-0x0000000003260000-0x00000000040F0000-memory.dmp

    Filesize

    14.6MB

  • memory/2844-913-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-925-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-891-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-893-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-895-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-897-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-899-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-901-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-903-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-905-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-907-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-909-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-911-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-889-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-917-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-915-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-919-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-921-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-923-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-887-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-927-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-929-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-931-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-933-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-935-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-937-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-939-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-941-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-943-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-2622-0x0000000001500000-0x0000000001600000-memory.dmp

    Filesize

    1024KB

  • memory/2844-2623-0x0000000002EE0000-0x0000000003061000-memory.dmp

    Filesize

    1.5MB

  • memory/2844-4227-0x0000000001500000-0x0000000001600000-memory.dmp

    Filesize

    1024KB

  • memory/2844-8763-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-886-0x0000000003070000-0x0000000003181000-memory.dmp

    Filesize

    1.1MB

  • memory/2844-8765-0x0000000002DA0000-0x0000000002EA1000-memory.dmp

    Filesize

    1.0MB

  • memory/2844-8766-0x0000000001290000-0x0000000001331000-memory.dmp

    Filesize

    644KB

  • memory/2844-76-0x0000000075BE0000-0x0000000075C27000-memory.dmp

    Filesize

    284KB

  • memory/2844-74-0x0000000000400000-0x0000000001290000-memory.dmp

    Filesize

    14.6MB

  • memory/2844-8776-0x0000000000400000-0x0000000001290000-memory.dmp

    Filesize

    14.6MB