Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2023, 20:33

General

  • Target

    9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll

  • Size

    66KB

  • MD5

    d73f8cd93189c46c1d4058ce9af4b752

  • SHA1

    5eff68604a537dae5afc193710402ed0219d12ea

  • SHA256

    9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75

  • SHA512

    43148e7c31859a6133c91fccf7eef3ebafee16e09fad298b3bb9a33597ac43f067a651af090d42e0329d50d5a88c45ce259c7e923d6229c72d2b4d5c10942fac

  • SSDEEP

    1536:wNjPUnRAumvCoCzPTYcV0rPXP4HsrIIOWXxoV:wNjENbMcVAPXPsVpWho

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll,#1
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\rundll32.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rundll32.txt

    Filesize

    120KB

    MD5

    3aea5b78bac5359a799c2714fecccd1a

    SHA1

    5d3203b328ecfc7a55c0ded1032d209e9f273367

    SHA256

    c05e763cab67cf9daf5be7a6a6cff2650223987a9693eaa119f69b2bbb6df6c3

    SHA512

    9513cc84a7ed3dd709d4affb03f6e286dcd43e82f33441c00a9d74d2b45449f2ee20baa8db46218d7a59d9e62fb7f95050ea305166e70f3e71dde39ccf07b6d3

  • C:\Users\Public\Documents\sjsw.log

    Filesize

    162B

    MD5

    0a2dcf199afc7f50d4e16fc0bee1e7ee

    SHA1

    16fbc549b74036b20bef29916b26485174334530

    SHA256

    a6e6abc5a24194e576e5bda08a632178e45ba5b5f23e06cadf3cc5e4a57e709c

    SHA512

    b456049077a6f9df393c4f12b9557da0bb67e69b4297a1828d3309f21d5f419bb81b3bb33ea7b1c1f84cba0e446aad6ada64a6676b56df60683230a6a12f366f

  • memory/1420-0-0x0000000010000000-0x0000000010067000-memory.dmp

    Filesize

    412KB

  • memory/1420-2-0x0000000010000000-0x0000000010067000-memory.dmp

    Filesize

    412KB

  • memory/1420-3-0x00000000000C0000-0x00000000000C3000-memory.dmp

    Filesize

    12KB

  • memory/1420-23-0x0000000010000000-0x0000000010067000-memory.dmp

    Filesize

    412KB