Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 08:28

General

  • Target

    84c57e22fb8dfff46dd2aa6c717b6a3ef68f5b81f38aedf7983cfc3eeaf8ea96.exe

  • Size

    840KB

  • MD5

    887bb35ea41b7bfe23502479ea6bb4f9

  • SHA1

    86d37181f8bbd355429caae8d41bcff7c842b5bc

  • SHA256

    84c57e22fb8dfff46dd2aa6c717b6a3ef68f5b81f38aedf7983cfc3eeaf8ea96

  • SHA512

    0a42ceda7401940a4561815d35e6c59fb36e883f9c980a2c2ec14026c9175199fc62675484dfe3e519277622de3e658275c04b4b15bb090ee3f98b2f1d0eb2ab

  • SSDEEP

    24576:CdCdB8Jp78mOP5rFcXnR7GuJXGLfmL4dg:CdCdmHOJCGi2fm8

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 5 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84c57e22fb8dfff46dd2aa6c717b6a3ef68f5b81f38aedf7983cfc3eeaf8ea96.exe
    "C:\Users\Admin\AppData\Local\Temp\84c57e22fb8dfff46dd2aa6c717b6a3ef68f5b81f38aedf7983cfc3eeaf8ea96.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2208

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2208-0-0x0000000000400000-0x0000000000709000-memory.dmp
    Filesize

    3.0MB

  • memory/2208-1-0x0000000000400000-0x0000000000709000-memory.dmp
    Filesize

    3.0MB

  • memory/2208-2-0x0000000000400000-0x0000000000709000-memory.dmp
    Filesize

    3.0MB

  • memory/2208-3-0x0000000000400000-0x0000000000709000-memory.dmp
    Filesize

    3.0MB

  • memory/2208-5-0x0000000000400000-0x0000000000709000-memory.dmp
    Filesize

    3.0MB

  • memory/2208-8-0x0000000000400000-0x0000000000709000-memory.dmp
    Filesize

    3.0MB