Analysis

  • max time kernel
    119s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2023, 08:41

General

  • Target

    1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00.exe

  • Size

    3.2MB

  • MD5

    c9bdb940bc9ed1746b245b43e8819c02

  • SHA1

    cf8056d4c99a3edea964a4e034bd07630ea1573f

  • SHA256

    1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

  • SHA512

    ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

  • SSDEEP

    49152:KXl4mGyUJcXhNjkBJUm0tBuJ23w7oBW5nc2ToTJA8dSvU2rFMA:MlCyQUhNaf0toJ234oBWFc2kew2iA

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 25 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • VMProtect packed file 17 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00.exe
    "C:\Users\Admin\AppData\Local\Temp\1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00.exe"
    1⤵
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe
      433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C316630643833373733333866383634363761363332613038323765613332316633376539633365306334396261373433653133336535623430336431316330302E657865
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 1652
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1108
      2⤵
      • Program crash
      PID:1980

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\178BFBFF000306D2

          Filesize

          116B

          MD5

          61c25cd47bb49b979ef281c2f6a23fab

          SHA1

          b1093ed0fa7c04cbea49f522883a5a24e30122d6

          SHA256

          4f90b6ed4c55ef3ed6b4ace1575fce0cd8aa310cb01eea0f9f2bda4b62396c2d

          SHA512

          1a83dfcbda15b9878f18257304f3806e80f17a531012f13743605767f258c58467aa5d42268436c79059408b3fcecf4b5d361ee486227d13284bbd934ec55573

        • C:\Users\Admin\AppData\Local\Temp\1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00.data

          Filesize

          94B

          MD5

          fbc72a1d85bc111fbe36cf104c8abfd0

          SHA1

          e8983b6ed926098789913aba11d4a0d7cd3cbe79

          SHA256

          0b66883937f6fa851c80d42a5f9a527ee18a6661cfbad2d04552d53e4047101a

          SHA512

          3cc7759ee75b6e65a7dea32a0a17875dc9e97ced5863093234deb0ef98de1ed4ba566642de98ed07c1ec68cb9b3b648071e28ed1895f5b2a148fd59a39eb1163

        • C:\Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • C:\Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • \Users\Admin\AppData\Local\Temp\46C7RX15VP83J7XCMKZ9.exe

          Filesize

          3.2MB

          MD5

          c9bdb940bc9ed1746b245b43e8819c02

          SHA1

          cf8056d4c99a3edea964a4e034bd07630ea1573f

          SHA256

          1f0d8377338f86467a632a0827ea321f37e9c3e0c49ba743e133e5b403d11c00

          SHA512

          ec1f75764045a8feeb32675e9546b824eb979107bb485b07ef9c67b2d25fa868f5084b6d37b7c9cd21ee284da713eec211c9d7781f7cb01a58c93662820f3323

        • memory/2244-45-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-20-0x0000000000330000-0x0000000000331000-memory.dmp

          Filesize

          4KB

        • memory/2244-34-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-35-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-36-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-37-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-38-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-39-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-40-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-42-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-41-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-43-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-46-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-0-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2244-44-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-47-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-49-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-48-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-28-0x0000000000350000-0x0000000000351000-memory.dmp

          Filesize

          4KB

        • memory/2244-25-0x0000000000340000-0x0000000000341000-memory.dmp

          Filesize

          4KB

        • memory/2244-23-0x0000000000340000-0x0000000000341000-memory.dmp

          Filesize

          4KB

        • memory/2244-30-0x0000000000350000-0x0000000000351000-memory.dmp

          Filesize

          4KB

        • memory/2244-63-0x0000000000400000-0x0000000000E16000-memory.dmp

          Filesize

          10.1MB

        • memory/2244-2-0x0000000000400000-0x0000000000E16000-memory.dmp

          Filesize

          10.1MB

        • memory/2244-76-0x0000000000400000-0x0000000000E16000-memory.dmp

          Filesize

          10.1MB

        • memory/2244-3-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2244-6-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2244-96-0x0000000000EA0000-0x0000000000EF2000-memory.dmp

          Filesize

          328KB

        • memory/2244-5-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2244-18-0x0000000000330000-0x0000000000331000-memory.dmp

          Filesize

          4KB

        • memory/2244-15-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2244-8-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2244-10-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2244-13-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/2320-117-0x00000000002A0000-0x00000000002F2000-memory.dmp

          Filesize

          328KB

        • memory/2320-116-0x0000000000400000-0x0000000000E16000-memory.dmp

          Filesize

          10.1MB

        • memory/2320-115-0x0000000000400000-0x0000000000E16000-memory.dmp

          Filesize

          10.1MB

        • memory/2320-97-0x00000000002A0000-0x00000000002F2000-memory.dmp

          Filesize

          328KB

        • memory/2320-77-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2320-74-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2320-68-0x0000000000400000-0x0000000000E16000-memory.dmp

          Filesize

          10.1MB