Analysis

  • max time kernel
    187s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 16:31

General

  • Target

    1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe

  • Size

    4.3MB

  • MD5

    a900f8aaed039d568de5049cdbdf5323

  • SHA1

    9574d69c3460c3619dd1123cb2d8572263275c72

  • SHA256

    1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928

  • SHA512

    0c538ee5f61d39a129ec772011cd773a43696ef61706dbd054fedc9c028769abef79029620bcf945337e366d15fbd273e5a56e614d282cf3917df20ae91db0d0

  • SSDEEP

    49152:qDj7mIDaT72MPRd8mWo+QRin27xZu2XHf27ayr/AEulITRvXm6ybJB4GGC9z:vQa/hfWodooi2X/27aclX9T27Gw

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe
    "C:\Users\Admin\AppData\Local\Temp\1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http:///
      2⤵
        PID:4680
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3680,i,107393453197044369,3794435770200482906,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:8
      1⤵
        PID:3604
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=4256,i,107393453197044369,3794435770200482906,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:8
        1⤵
          PID:680

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2896-0-0x0000000000400000-0x00000000008CB000-memory.dmp

          Filesize

          4.8MB

        • memory/2896-1-0x0000000002BA0000-0x0000000002D41000-memory.dmp

          Filesize

          1.6MB

        • memory/2896-6-0x0000000000400000-0x00000000008CB000-memory.dmp

          Filesize

          4.8MB

        • memory/2896-7-0x0000000002BA0000-0x0000000002D41000-memory.dmp

          Filesize

          1.6MB