Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2023, 11:51

General

  • Target

    5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe

  • Size

    7.3MB

  • MD5

    9a886d5832674a83ed312c09410625b1

  • SHA1

    c7f23edf4e52b70b52794b5fe68fc88322888d8b

  • SHA256

    5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86

  • SHA512

    4a07a5b24dce4d2f6ef6e035eb5646ef06b3819563d7fd55c4b08361f4f64d2a365c120f081fa51f6050027b9463ac0b5e63b15e4824603105c728f81b8d7e3e

  • SSDEEP

    196608:ZJw+oDkc1GaCDuF9jxMxhiRl7DFBc4bq:A+oDkJKFiyjbb

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe
    "C:\Users\Admin\AppData\Local\Temp\5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2096-0-0x0000000000400000-0x0000000000F63000-memory.dmp

    Filesize

    11.4MB

  • memory/2096-1-0x0000000002940000-0x0000000002AE7000-memory.dmp

    Filesize

    1.7MB

  • memory/2096-3-0x0000000002940000-0x0000000002AE7000-memory.dmp

    Filesize

    1.7MB

  • memory/2096-4-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2096-6-0x0000000000400000-0x0000000000F63000-memory.dmp

    Filesize

    11.4MB

  • memory/2096-7-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2096-10-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2096-11-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2096-9-0x0000000000400000-0x0000000000F63000-memory.dmp

    Filesize

    11.4MB

  • memory/2096-13-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2096-15-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2096-18-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2096-20-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2096-23-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2096-25-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2096-28-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2096-30-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2096-33-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2096-35-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2096-39-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2096-42-0x0000000000400000-0x0000000000F63000-memory.dmp

    Filesize

    11.4MB

  • memory/2096-43-0x0000000002940000-0x0000000002AE7000-memory.dmp

    Filesize

    1.7MB

  • memory/2096-44-0x0000000000400000-0x0000000000F63000-memory.dmp

    Filesize

    11.4MB