Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 04:45

General

  • Target

    bf5fb857d70fe0b003d1e8ee2c2d760c6220f184aae4219ed1af9cf1b46e5136.exe

  • Size

    9.4MB

  • MD5

    4ac5e5145f8f5da4c9761d1edf139f84

  • SHA1

    189afc0a18c992bc52221a8e0ae31cef792ef6f0

  • SHA256

    bf5fb857d70fe0b003d1e8ee2c2d760c6220f184aae4219ed1af9cf1b46e5136

  • SHA512

    226f9a90e5a8c4977be73f8d5481e557967bd47776e98dc95f27eb402abbdf04531aa64bbf8f75a246d1bdae6f86039c873c2a83a55c304f0603a8a6242d70f0

  • SSDEEP

    196608:FHOQSWGXlEvUbkKDZVv+zibKA/K5z2wXUq3zFNqzn5uF6kinWbXBknBDhr:UQWXOcZj+zibxozbUizFNqdv582BDl

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf5fb857d70fe0b003d1e8ee2c2d760c6220f184aae4219ed1af9cf1b46e5136.exe
    "C:\Users\Admin\AppData\Local\Temp\bf5fb857d70fe0b003d1e8ee2c2d760c6220f184aae4219ed1af9cf1b46e5136.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ÏêϸʹÓÃ˵Ã÷.txt
      2⤵
        PID:2560
      • C:\Users\Admin\AppData\Local\Temp\aow_dr.exe
        C:\Users\Admin\AppData\Local\Temp\aow_dr.exe
        2⤵
        • Executes dropped EXE
        PID:2688

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\aow_dr.exe

            Filesize

            13KB

            MD5

            b5dd2ad618694048355e2e3c396d7860

            SHA1

            bceaf75cf61c51bf711cd9180d95d30355a99578

            SHA256

            5ff4970bd69b9f541ae61a56be0d87436ce6258ca87ffcea16b9bb4767846e91

            SHA512

            d1a01f35f84b1b3fde339d351a101bac8826365a26c597dfa76397d72a6378a89c43b64718ef71694cfa814b40e12309b5b31f47721301c6d7d9ca1497fb66ec

          • C:\Users\Admin\AppData\Local\Temp\dr.dll

            Filesize

            288B

            MD5

            58b22385c2f623508a8edf9bbe0e0c1a

            SHA1

            5c756be7de1f8de20b16616a72f709459024e00b

            SHA256

            fc6fedd40b6d824ecf51fe53b5bcaf052db4bb9be80149bfd6ffc3e23ac56dbe

            SHA512

            a098b05dd5cd4a408e0584f9c8e97de2713015f143e3c66d6f92a546d0f29edd4d60787788510f1fe15daaf5042f46842cd7e4ba5a3ec65b3cf185e1f01fd731

          • C:\Users\Admin\AppData\Local\Temp\ÏêϸʹÓÃ˵Ã÷.txt

            Filesize

            1KB

            MD5

            a84add5fa56d9791dbb5300e1938538a

            SHA1

            ee5510d9f21b8975af2b2a656be25f358b753b7d

            SHA256

            137cbdceee790d4166945d3c62080fa5145458769cd7bc44616b4fb799b44144

            SHA512

            e09d38e1413b9aa031cceb9fd5b14ca36a728e8115b0de8476161c8549f742cc00e7a3728475e8fffe65bbfafde01bfe788aca859d73552cadfd4f54d9c1dd4f

          • \Users\Admin\AppData\Local\Temp\aow_dr.exe

            Filesize

            13KB

            MD5

            b5dd2ad618694048355e2e3c396d7860

            SHA1

            bceaf75cf61c51bf711cd9180d95d30355a99578

            SHA256

            5ff4970bd69b9f541ae61a56be0d87436ce6258ca87ffcea16b9bb4767846e91

            SHA512

            d1a01f35f84b1b3fde339d351a101bac8826365a26c597dfa76397d72a6378a89c43b64718ef71694cfa814b40e12309b5b31f47721301c6d7d9ca1497fb66ec

          • \Users\Admin\AppData\Local\Temp\aow_dr.exe

            Filesize

            13KB

            MD5

            b5dd2ad618694048355e2e3c396d7860

            SHA1

            bceaf75cf61c51bf711cd9180d95d30355a99578

            SHA256

            5ff4970bd69b9f541ae61a56be0d87436ce6258ca87ffcea16b9bb4767846e91

            SHA512

            d1a01f35f84b1b3fde339d351a101bac8826365a26c597dfa76397d72a6378a89c43b64718ef71694cfa814b40e12309b5b31f47721301c6d7d9ca1497fb66ec

          • memory/2952-31-0x00000000002F0000-0x00000000002F1000-memory.dmp

            Filesize

            4KB

          • memory/2952-36-0x0000000000300000-0x0000000000301000-memory.dmp

            Filesize

            4KB

          • memory/2952-11-0x00000000002A0000-0x00000000002A1000-memory.dmp

            Filesize

            4KB

          • memory/2952-21-0x00000000002D0000-0x00000000002D1000-memory.dmp

            Filesize

            4KB

          • memory/2952-19-0x00000000002D0000-0x00000000002D1000-memory.dmp

            Filesize

            4KB

          • memory/2952-16-0x00000000002B0000-0x00000000002B1000-memory.dmp

            Filesize

            4KB

          • memory/2952-14-0x00000000002B0000-0x00000000002B1000-memory.dmp

            Filesize

            4KB

          • memory/2952-0-0x0000000000280000-0x0000000000281000-memory.dmp

            Filesize

            4KB

          • memory/2952-29-0x00000000002F0000-0x00000000002F1000-memory.dmp

            Filesize

            4KB

          • memory/2952-26-0x00000000002E0000-0x00000000002E1000-memory.dmp

            Filesize

            4KB

          • memory/2952-24-0x00000000002E0000-0x00000000002E1000-memory.dmp

            Filesize

            4KB

          • memory/2952-8-0x00000000002A0000-0x00000000002A1000-memory.dmp

            Filesize

            4KB

          • memory/2952-34-0x0000000000300000-0x0000000000301000-memory.dmp

            Filesize

            4KB

          • memory/2952-32-0x0000000000300000-0x0000000000301000-memory.dmp

            Filesize

            4KB

          • memory/2952-38-0x0000000077740000-0x0000000077741000-memory.dmp

            Filesize

            4KB

          • memory/2952-9-0x0000000000400000-0x00000000015AA000-memory.dmp

            Filesize

            17.7MB

          • memory/2952-6-0x00000000002A0000-0x00000000002A1000-memory.dmp

            Filesize

            4KB

          • memory/2952-4-0x0000000000400000-0x00000000015AA000-memory.dmp

            Filesize

            17.7MB

          • memory/2952-5-0x0000000000280000-0x0000000000281000-memory.dmp

            Filesize

            4KB

          • memory/2952-2-0x0000000000280000-0x0000000000281000-memory.dmp

            Filesize

            4KB

          • memory/2952-52-0x0000000000400000-0x00000000015AA000-memory.dmp

            Filesize

            17.7MB

          • memory/2952-53-0x0000000000400000-0x00000000015AA000-memory.dmp

            Filesize

            17.7MB