Analysis

  • max time kernel
    156s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 16:45

General

  • Target

    a4aead48c90df3cae46ea45e909ad6d8ebc87ccc75455e6b07e7302624711ace.exe

  • Size

    15.4MB

  • MD5

    2da8c4b8e832922633498af511147060

  • SHA1

    3ca21cf5bd3f02a091ab7ad33b3e02a8639499a1

  • SHA256

    a4aead48c90df3cae46ea45e909ad6d8ebc87ccc75455e6b07e7302624711ace

  • SHA512

    6ab904584c275406c96855536568cc2dff80a902a8d96d646e766f2bfdae5226d213b0a77a62a30c3f614111042e70d385fcf53ab7dc3a3033a46cd92542b06e

  • SSDEEP

    393216:rp8kJfML4vyJpSYTp5Ijhpe16uqB2fqgQyvKmmWTBB:r2CDyLTEVrucmqhRWTj

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4aead48c90df3cae46ea45e909ad6d8ebc87ccc75455e6b07e7302624711ace.exe
    "C:\Users\Admin\AppData\Local\Temp\a4aead48c90df3cae46ea45e909ad6d8ebc87ccc75455e6b07e7302624711ace.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4428-0-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/4428-1-0x0000000002990000-0x0000000002991000-memory.dmp

    Filesize

    4KB

  • memory/4428-2-0x00000000029A0000-0x00000000029A1000-memory.dmp

    Filesize

    4KB

  • memory/4428-3-0x0000000000400000-0x00000000023B6000-memory.dmp

    Filesize

    31.7MB

  • memory/4428-4-0x00000000029D0000-0x00000000029D1000-memory.dmp

    Filesize

    4KB

  • memory/4428-5-0x00000000029E0000-0x00000000029E1000-memory.dmp

    Filesize

    4KB

  • memory/4428-6-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/4428-7-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/4428-8-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/4428-10-0x0000000000400000-0x00000000023B6000-memory.dmp

    Filesize

    31.7MB

  • memory/4428-13-0x0000000000400000-0x00000000023B6000-memory.dmp

    Filesize

    31.7MB

  • memory/4428-17-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB

  • memory/4428-21-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB