Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 01:31

General

  • Target

    3afc48d5b92da1948f3f112c4e896e476fe8858090c7001b955c2b459c742486.exe

  • Size

    447KB

  • MD5

    9dd5731762febf26965ea7e5356ac932

  • SHA1

    24328448a6ae4d25f4056a383d3c47e1429a9818

  • SHA256

    3afc48d5b92da1948f3f112c4e896e476fe8858090c7001b955c2b459c742486

  • SHA512

    93db702e93827bb32cd9726f8682b67e83f32a6f041bf4b29bbf839bda59ad33375c7a4f91e99f184bdb0cc3c720f9e3f618e01127ef72bd8900e17b1c05acb9

  • SSDEEP

    6144:sZrK+r+l0eNPBJrOxQD90saoTXWIg7mljhubc:sZ++qlRBBOxQDU2XWIg6Bic

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3afc48d5b92da1948f3f112c4e896e476fe8858090c7001b955c2b459c742486.exe
    "C:\Users\Admin\AppData\Local\Temp\3afc48d5b92da1948f3f112c4e896e476fe8858090c7001b955c2b459c742486.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\Syslemchgzu.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemchgzu.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Syslemchgzu.exe

    Filesize

    447KB

    MD5

    eca4aea09089b55672c53962ed755473

    SHA1

    5390a5ce020ad38bc79ac5dba0377d3bc76c58a6

    SHA256

    34d6fe6db990a3c266519282508cf7cf547b71972061e635b26c0ac625cc3b9a

    SHA512

    b1cd1b92f320c3b2875cfd92bc74db6a8cac90b3f64a9358a52bcdd0c47669324a79bd12d3d52e8e973057ac2d7f272507818e4a9d31eaad00a6e62bc147cf2c

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    102B

    MD5

    e9a96da6579a1b6725ad0681f9185eed

    SHA1

    233446d1e866c848c09df7e8e525e4cb62e04c92

    SHA256

    3d6a9bc8b127791206a13ccb144588a70edaa3c9f0093001f636ef0bf9e3b32d

    SHA512

    ecedbe9208c2929470f20649a9089bfea3998d6a6b0adb32583a24590f9df47e30430e0cec414855a946877f5167b3b5feeb27904beddad69b3d12d530076b81

  • memory/2112-0-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2112-21-0x0000000003AC0000-0x0000000003B32000-memory.dmp

    Filesize

    456KB

  • memory/2112-20-0x0000000003AC0000-0x0000000003B32000-memory.dmp

    Filesize

    456KB

  • memory/2112-23-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2724-22-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2724-45-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB