Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 02:30

General

  • Target

    000115c7b913353376679335880f8982.exe

  • Size

    4.5MB

  • MD5

    000115c7b913353376679335880f8982

  • SHA1

    ae7c1096980b474da7f0d6b516841675b0ebf2d6

  • SHA256

    136ea8d9f04fcc7c39957bd47c1c68f467b0e1777814038d876161dca439dcf3

  • SHA512

    7e9d6af745dd397ce22e3fc946226a114aeb372a16b0d301c50225c3645e395548c3cf8e71652826a45f0b21d5a4d693421ce3731537c0a1e04c7c93c0d2558f

  • SSDEEP

    49152:+lozaRGEgKs/5SP4cKgBhD1cK72HDPNUeFwbDQeq8Yy3FLpNGuoenW0Kno:WAaRGEfs/jxw77mPNU+SDQW9ceW0Ko

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\000115c7b913353376679335880f8982.exe
    "C:\Users\Admin\AppData\Local\Temp\000115c7b913353376679335880f8982.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    8KB

    MD5

    9dbcd64b514dfd8edaf017c1475533c7

    SHA1

    d0f8afa5db04fac733ff2ac4c549b2be3e1eae59

    SHA256

    d66c1dbf86614df14ae1726e808b6da3777f2d357403ca0ecf7a25ffb36d118e

    SHA512

    9d979795f5fcc0af70f8fee40a832b268d9d6adc59d476a1c8c25f3ac76fd992d92d8112d96d652ab28d0ad1b419078c42cd229b14f7d03c18afe1ff5b50d2dc

  • C:\Users\Admin\AppData\Local\Temp\Tar285D.tmp

    Filesize

    46KB

    MD5

    3794ed293c6dbf8085eb50d128826dd5

    SHA1

    8d9c4469f310fb87986d8fe1cc6a009a71e5c0fe

    SHA256

    0f76b1465b23790f89b0ab94fb6da7cc085976913a2f7d7927616830f0b84f10

    SHA512

    028348d15bd1f6f7b15cbb037fc48236222c92397152abe79048b347c4a404b1a0db4d51a7127e301fe605e1dbedcf4c5def64bd5e97e82af75dbdd302ba27bc

  • memory/2900-33-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-22-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-26-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-29-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-50-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-51-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-53-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-48-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-46-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-44-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-42-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-40-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-38-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-36-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-0-0x0000000000400000-0x000000000088A000-memory.dmp

    Filesize

    4.5MB

  • memory/2900-31-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-7-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-20-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-24-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-18-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-16-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-14-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-12-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-9-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-6-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-5-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-4-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-3-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-1-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-116-0x00000000009B0000-0x0000000000AB0000-memory.dmp

    Filesize

    1024KB

  • memory/2900-115-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2900-117-0x0000000000400000-0x000000000088A000-memory.dmp

    Filesize

    4.5MB

  • memory/2900-118-0x00000000009B0000-0x0000000000AB0000-memory.dmp

    Filesize

    1024KB