Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 05:34

General

  • Target

    a520fa28c62a821d17f059e6a2e06ffbcf6e65a5a5aa28dc72ebee42b46ffca2.exe

  • Size

    2.9MB

  • MD5

    e42d1929b5179466c176cf2bae29f899

  • SHA1

    c88ff0b920cf5c818b183f7166503ee2b7eadcdb

  • SHA256

    a520fa28c62a821d17f059e6a2e06ffbcf6e65a5a5aa28dc72ebee42b46ffca2

  • SHA512

    002346d8590da139ce7838a4fc20668a7a55773fd5faf9d4fe961a2dddd88033eba33cb1c54ffc6dd8ef038f1b65a92c7c1926060dfd0007625d57d4b8eeafa7

  • SSDEEP

    24576:pCKzARimQzNe4Za8iX5FfrVjePHS1Q2d7VITbSAcQwKXo58OKIbs5ffzxGtm3qzx:pCQ1I5uPHE9xWnFItf/BTJBaQPGdwn5

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 5 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a520fa28c62a821d17f059e6a2e06ffbcf6e65a5a5aa28dc72ebee42b46ffca2.exe
    "C:\Users\Admin\AppData\Local\Temp\a520fa28c62a821d17f059e6a2e06ffbcf6e65a5a5aa28dc72ebee42b46ffca2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\Desktop\X52LG-1116A.exe
      "C:\Users\Admin\Desktop\X52LG-1116A.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\X52LG-1116A.exe
        C:\Users\Admin\AppData\Local\Temp\X52LG-1116A.exe |C:\Users\Admin\Desktop\X52LG-1116A.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\X52LG-1116A.exe

    Filesize

    2.9MB

    MD5

    4b25f6b60a020a2e451394a847a1a621

    SHA1

    44528c86a2eb418264dd54a80766e396c98403d2

    SHA256

    8f83e137919e56010692dcff407f4507b75cb1a0badb7f2201f4a791b4dd937d

    SHA512

    cced0b4be100b88df9873ede93a1a13a098d901b7e1acba180515565a711752f94137c928839fbaf4ea79caafd110bb7a1e106922a7db234c5c5edb8ae44302a

  • C:\Users\Admin\AppData\Local\Temp\X52LG-1116A.exe

    Filesize

    2.9MB

    MD5

    4b25f6b60a020a2e451394a847a1a621

    SHA1

    44528c86a2eb418264dd54a80766e396c98403d2

    SHA256

    8f83e137919e56010692dcff407f4507b75cb1a0badb7f2201f4a791b4dd937d

    SHA512

    cced0b4be100b88df9873ede93a1a13a098d901b7e1acba180515565a711752f94137c928839fbaf4ea79caafd110bb7a1e106922a7db234c5c5edb8ae44302a

  • C:\Users\Admin\Desktop\X52LG-1116A.exe

    Filesize

    2.9MB

    MD5

    4b25f6b60a020a2e451394a847a1a621

    SHA1

    44528c86a2eb418264dd54a80766e396c98403d2

    SHA256

    8f83e137919e56010692dcff407f4507b75cb1a0badb7f2201f4a791b4dd937d

    SHA512

    cced0b4be100b88df9873ede93a1a13a098d901b7e1acba180515565a711752f94137c928839fbaf4ea79caafd110bb7a1e106922a7db234c5c5edb8ae44302a

  • C:\Users\Admin\Desktop\X52LG-1116A.exe

    Filesize

    2.9MB

    MD5

    4b25f6b60a020a2e451394a847a1a621

    SHA1

    44528c86a2eb418264dd54a80766e396c98403d2

    SHA256

    8f83e137919e56010692dcff407f4507b75cb1a0badb7f2201f4a791b4dd937d

    SHA512

    cced0b4be100b88df9873ede93a1a13a098d901b7e1acba180515565a711752f94137c928839fbaf4ea79caafd110bb7a1e106922a7db234c5c5edb8ae44302a

  • C:\Users\Admin\Desktop\X52LG-1116A.exe

    Filesize

    2.9MB

    MD5

    4b25f6b60a020a2e451394a847a1a621

    SHA1

    44528c86a2eb418264dd54a80766e396c98403d2

    SHA256

    8f83e137919e56010692dcff407f4507b75cb1a0badb7f2201f4a791b4dd937d

    SHA512

    cced0b4be100b88df9873ede93a1a13a098d901b7e1acba180515565a711752f94137c928839fbaf4ea79caafd110bb7a1e106922a7db234c5c5edb8ae44302a

  • C:\Windows\SysWOW64\fktx.txt

    Filesize

    4B

    MD5

    605ac7e4c16b8a013b4779b81f883e66

    SHA1

    d494d9da2ea46248e528af1f4da8061e3f245369

    SHA256

    fbc1f6898b3fd1d2d806fcb944fe535ff5f4a1d973d8ef218558dd2e9ae526a3

    SHA512

    8c3338adba5c423598ef3eab334979e66e58e7524e28124431c0bec09270cc3cb50a1d8c57dd44b5f2a904d7d5c3b544d97380b0bbf37b7c72d84328c26b1b0f