Analysis

  • max time kernel
    146s
  • max time network
    275s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/03/2024, 16:43

General

  • Target

    TK014DCC9651DB453FB3D969CBD4E397_P.exe

  • Size

    19.4MB

  • MD5

    856cde622a9a5f5f5ac3c0414dedf113

  • SHA1

    3f3fb2b95d557aee8b5478dbb8d7620e95bf2ef4

  • SHA256

    223d98ec145c21ce9ff222008bd9ee02a8aaa146600972bf806708d9d689bef1

  • SHA512

    c527d53823b7c191bbcd8be9da6863fb16d615dc9d58d97a2de50ec1e59bb0c022d5bffe957cddf7eb368e60512d40e2d5eb88b52220abed128a3fe0e9b05ba7

  • SSDEEP

    393216:dMQgUTcSyvrTV6cjQP6uOX1r3clzzSefpaFTCHLafb4DjZ539a+24EWI84goJ:drgedyvHV6cjkTO+BvfSHfb4DjZ59a+a

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TK014DCC9651DB453FB3D969CBD4E397_P.exe
    "C:\Users\Admin\AppData\Local\Temp\TK014DCC9651DB453FB3D969CBD4E397_P.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    PID:1376

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1376-0-0x0000000010000000-0x0000000011C94000-memory.dmp

          Filesize

          28.6MB

        • memory/1376-8-0x0000000010000000-0x0000000011C94000-memory.dmp

          Filesize

          28.6MB

        • memory/1376-11-0x0000000010000000-0x0000000011C94000-memory.dmp

          Filesize

          28.6MB

        • memory/1376-12-0x0000000000400000-0x0000000001799000-memory.dmp

          Filesize

          19.6MB

        • memory/1376-13-0x0000000000400000-0x0000000001799000-memory.dmp

          Filesize

          19.6MB