Analysis

  • max time kernel
    120s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 12:33

General

  • Target

    NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe

  • Size

    8.6MB

  • MD5

    3cd56bf11533629310b9606947ca6edb

  • SHA1

    1d3b6b81c93b6d99c48e84c1c0a87f8e918996d5

  • SHA256

    77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9

  • SHA512

    21aeff2bdfb88b887fd11d686a9109ba731a0ba32d03d372f645b8d0b36f418eab497250725615684921bd9552a003aca7357ac77d1d836f661fb8075984beaa

  • SSDEEP

    98304:mY6acVdq4KN0IaDOw7UY9mLW9+Ok0fdbIVhkl8usYU8ykT83n+CpwfMCO22ROTV/:mj/Z1ZNvYzhsch7stnbcEhz

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 6 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 dm.dll /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:2644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.4MB

    MD5

    4525af26f2e99162858e674262b5be54

    SHA1

    463200410611a673743f4f6d6377887033be2545

    SHA256

    80191c3e79819646017bc3053b04ee51b619a9ff93b70b76c6540da7d40cddd8

    SHA512

    6a4b225df7314dece89e0d2308b2871e23c89886bd565dc85a804f9137ba1b427ae4444280f9f1aac04a77f366cf917388da9573a9646af80bf5b2553ec0c715

  • \Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.4MB

    MD5

    4525af26f2e99162858e674262b5be54

    SHA1

    463200410611a673743f4f6d6377887033be2545

    SHA256

    80191c3e79819646017bc3053b04ee51b619a9ff93b70b76c6540da7d40cddd8

    SHA512

    6a4b225df7314dece89e0d2308b2871e23c89886bd565dc85a804f9137ba1b427ae4444280f9f1aac04a77f366cf917388da9573a9646af80bf5b2553ec0c715

  • memory/804-14-0x0000000000400000-0x0000000000CC8000-memory.dmp

    Filesize

    8.8MB

  • memory/804-31-0x00000000002D0000-0x00000000003D0000-memory.dmp

    Filesize

    1024KB

  • memory/804-1-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/804-15-0x0000000000400000-0x0000000000CC8000-memory.dmp

    Filesize

    8.8MB

  • memory/804-16-0x0000000000400000-0x0000000000CC8000-memory.dmp

    Filesize

    8.8MB

  • memory/804-12-0x0000000000400000-0x0000000000CC8000-memory.dmp

    Filesize

    8.8MB

  • memory/804-0-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/804-40-0x0000000000400000-0x0000000000CC8000-memory.dmp

    Filesize

    8.8MB

  • memory/804-37-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/804-13-0x0000000000400000-0x0000000000CC8000-memory.dmp

    Filesize

    8.8MB

  • memory/804-33-0x00000000002D0000-0x00000000003D0000-memory.dmp

    Filesize

    1024KB

  • memory/2644-35-0x00000000029A0000-0x000000000329A000-memory.dmp

    Filesize

    9.0MB

  • memory/2644-36-0x0000000000150000-0x0000000000166000-memory.dmp

    Filesize

    88KB

  • memory/2644-21-0x0000000002180000-0x000000000299B000-memory.dmp

    Filesize

    8.1MB

  • memory/2644-38-0x0000000000170000-0x0000000000172000-memory.dmp

    Filesize

    8KB

  • memory/2644-39-0x00000000029A0000-0x000000000329A000-memory.dmp

    Filesize

    9.0MB

  • memory/2644-20-0x0000000010000000-0x00000000104E0000-memory.dmp

    Filesize

    4.9MB