Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2023, 02:49

General

  • Target

    2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll

  • Size

    6.5MB

  • MD5

    9c9e300f744ccd62a86831643b50c671

  • SHA1

    9aefecfb7073e537d48f422722aa48ac21faf19e

  • SHA256

    2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637

  • SHA512

    49abc183bc5f3e07ecc50a6de8d285313d2ff1883252faad92ccff69b69aab06c511625bd5c938d1f8fc69eef139d3241ce82c917335ed45bbc922c4b4707686

  • SSDEEP

    98304:iVEqNYiuw2c5kn3TcYifC3UW8xnufnRMqVe1mUr+EFxFMNEJNJxpWA74:Z+1z6n326EdleSkJUS6MkNJxMe4

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe C:\Windows\SysWOW64
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3764
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe C:\Windows\SysWOW64
        3⤵
        • Drops file in Windows directory
        PID:4976
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe C:\Windows\SysWOW64
        3⤵
        • Drops file in Windows directory
        PID:1108
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe C:\Windows\SysWOW64
        3⤵
        • Drops file in Windows directory
        PID:4884
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:3704
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:724
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:2640
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:3968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • C:\Windows\svchost.exe

          Filesize

          45KB

          MD5

          b7c999040d80e5bf87886d70d992c51e

          SHA1

          a8ed9a51cc14ccf99b670e60ebbc110756504929

          SHA256

          5c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e

          SHA512

          71ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309

        • memory/3444-6-0x0000000000E20000-0x0000000000E21000-memory.dmp

          Filesize

          4KB

        • memory/3444-9-0x0000000000E40000-0x0000000000E41000-memory.dmp

          Filesize

          4KB

        • memory/3444-16-0x0000000002710000-0x0000000002723000-memory.dmp

          Filesize

          76KB

        • memory/3444-4-0x0000000010000000-0x0000000010B68000-memory.dmp

          Filesize

          11.4MB

        • memory/3444-7-0x0000000000E30000-0x0000000000E31000-memory.dmp

          Filesize

          4KB

        • memory/3444-1-0x0000000010000000-0x0000000010B68000-memory.dmp

          Filesize

          11.4MB

        • memory/3444-5-0x0000000000E10000-0x0000000000E11000-memory.dmp

          Filesize

          4KB

        • memory/3444-3-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

          Filesize

          4KB

        • memory/3444-0-0x0000000000A60000-0x0000000000A61000-memory.dmp

          Filesize

          4KB

        • memory/3444-2-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

          Filesize

          4KB

        • memory/3764-13-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3764-14-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3764-17-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB