Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 01:36

General

  • Target

    25319d2f46a945944462a20eeb31a0d5f83ad6246a39b04d9e33ee035656257e.exe

  • Size

    837KB

  • MD5

    c57970f4dc0fca663ffea4c73e764186

  • SHA1

    3add0a81686d6d9a6153d245f8eeb3114d2fbaff

  • SHA256

    25319d2f46a945944462a20eeb31a0d5f83ad6246a39b04d9e33ee035656257e

  • SHA512

    cccf0c81c2bbb122b709b6c8583c7b93ad10f8fcf92d24cdbdf224736e6eeb1bbafc1e691e68c86cb417e161916292cd07b23c4502572f7574f836df228441bb

  • SSDEEP

    24576:vdJtCf7SebJ4U0PDKL4PXQMoNwqe1hQCc5AgfukxAmD9/7s0eZXn9WvHxp:vdyJCyuB3un

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Modifies Control Panel 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25319d2f46a945944462a20eeb31a0d5f83ad6246a39b04d9e33ee035656257e.exe
    "C:\Users\Admin\AppData\Local\Temp\25319d2f46a945944462a20eeb31a0d5f83ad6246a39b04d9e33ee035656257e.exe"
    1⤵
    • Sets file execution options in registry
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    PID:4604

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4604-0-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/4604-4-0x00000000776E3000-0x00000000776E4000-memory.dmp

          Filesize

          4KB

        • memory/4604-3-0x00000000776E2000-0x00000000776E3000-memory.dmp

          Filesize

          4KB

        • memory/4604-2-0x0000000010000000-0x0000000010009000-memory.dmp

          Filesize

          36KB

        • memory/4604-1-0x000000006F6D0000-0x000000006F6E0000-memory.dmp

          Filesize

          64KB