Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 07:24

General

  • Target

    内部-DH.exe

  • Size

    1.4MB

  • MD5

    f5cea550291c97309387a83766654a93

  • SHA1

    b5c6a35ece88b1dca3574f614f70e2ebd0bd73e3

  • SHA256

    311b95e7fe4168550ad3c3fec325e46e32521259ae72104e12ea019ff05f1395

  • SHA512

    0796b13c82238b4e5426c515b4caeb430ba4e2328d523294ff30186e65287e405493db3387cb681ad9f630111d7d5bcccbbde6fff453ed8f6d3beacca0c845f0

  • SSDEEP

    24576:554I247GqbFPYNsNgHeqmspYgxcUt+iLi/dK1nIj1/hAytuO6fUx8p1dqdUOkuOJ:554DOmmsROAdTuRKwmFgYZY5O

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\内部-DH.exe
    "C:\Users\Admin\AppData\Local\Temp\内部-DH.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1376

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1376-0-0x0000000000400000-0x000000000057A000-memory.dmp

          Filesize

          1.5MB

        • memory/1376-1-0x0000000000400000-0x000000000057A000-memory.dmp

          Filesize

          1.5MB