Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 03:42

General

  • Target

    bf924b598e2dfba94954d1a982bff917d28637f819cae124befdfac8f23a8d84.exe

  • Size

    87KB

  • MD5

    63173cc80d964d6d908e0899bf489086

  • SHA1

    5a8b7d20531ed7925177604720ffd190b61edd98

  • SHA256

    bf924b598e2dfba94954d1a982bff917d28637f819cae124befdfac8f23a8d84

  • SHA512

    3e9f60e85d9f68389225c21b5e70260c6b123f05c35fc7a8500e52634b3d9535bcb71a996e0f59ac09b360e24bb01bf9a538242cb53c21a436be603c64dfb42c

  • SSDEEP

    1536:Lxos1lS77S/87BJM2pThWf9DcqZmR8/bMxnONDjYseXPmo06/i/XdVw/iA:jjfbcRkbMVu7EqQ/j

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf924b598e2dfba94954d1a982bff917d28637f819cae124befdfac8f23a8d84.exe
    "C:\Users\Admin\AppData\Local\Temp\bf924b598e2dfba94954d1a982bff917d28637f819cae124befdfac8f23a8d84.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\Systemgebrb.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemgebrb.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\path.ini

          Filesize

          102B

          MD5

          d574e68bb731e343e68ddf05598d9e44

          SHA1

          33e898fc366b554bee461f683fc242f77bd78742

          SHA256

          f643b9be83543526b2bb390330fd84b70ee8e100a4be868c5508ee17385bf622

          SHA512

          14fff900f54f3d2ce419979e7d9a048f53bba9e9a83279c71398cb35f366c08e3a059aa87a7f4a3cef76fa5753728e6c5a8aaee23be6b85c2e7b84e32b29931b

        • \Users\Admin\AppData\Local\Temp\Systemgebrb.exe

          Filesize

          87KB

          MD5

          b3b97387a78fa2a9d55b76ed8accbc8f

          SHA1

          373f21b58c86b7ed1d4b34b95b0523aa45cf3948

          SHA256

          944a337a38c28d17ffe9764476ba29e561388d81b8c91a046dac339833d4a010

          SHA512

          43106b40dae034eaa6007a772feded6bb9881e817c5ceaa883bca634e1de6b2ce559189d8ec4bf5ca7b8302431aee1ac8f0f6159c0c62564b9c07e185c0aa08f

        • memory/1304-0-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1304-15-0x0000000003590000-0x000000000360E000-memory.dmp

          Filesize

          504KB

        • memory/1304-10-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/2712-17-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/2712-21-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB