Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2023, 07:04

General

  • Target

    0dfdac421c42ab159a900fa1b7d08e74958a97a1aa86ab3e820996d8bf786eb7.dll

  • Size

    200KB

  • MD5

    82ec291fa3647b1b2d53d5b97282acef

  • SHA1

    79555facd6b891116639d0d3dfc3d23247a97462

  • SHA256

    0dfdac421c42ab159a900fa1b7d08e74958a97a1aa86ab3e820996d8bf786eb7

  • SHA512

    a14111c7424d1ef4211fccd9c3179edd4f57ed570da249fce0f5df81fc47c9fafa32805072f0cf4dcc982821d433251be02d53146b807deeb27daae9d57a8c4a

  • SSDEEP

    3072:kpzqxDDiuxeXWULk5+jJt6Gj3fZaXpygEUPexacpUotETUfB:sEDDiuxeXW4iCbopyqnZ

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0dfdac421c42ab159a900fa1b7d08e74958a97a1aa86ab3e820996d8bf786eb7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0dfdac421c42ab159a900fa1b7d08e74958a97a1aa86ab3e820996d8bf786eb7.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c C:&dir|find "ÐòÁкÅ">C:\Users\Admin\AppData\Local\Temp\5291.txt
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" dir"
          4⤵
            PID:2616
          • C:\Windows\SysWOW64\find.exe
            find "ÐòÁкÅ"
            4⤵
              PID:2440

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2028-0-0x0000000010000000-0x000000001004B000-memory.dmp

              Filesize

              300KB

            • memory/2028-1-0x0000000010000000-0x000000001004B000-memory.dmp

              Filesize

              300KB