Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 15:26

General

  • Target

    c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe

  • Size

    11.6MB

  • MD5

    58b618c282892c058f1763158565e58b

  • SHA1

    fe6f24f9ffe31b35b8800fe14a1caebac5b225e3

  • SHA256

    c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0

  • SHA512

    eee434f6890ea722259e8b758b3944190f53a0ddd2f246d75482390fe0bafe34f28927c8bf75d93b468efe6439ea409f148f4cdedf6d88cc691a66b95182e477

  • SSDEEP

    196608:jwgKTiEsbyVJVCpBHY8RchssmUBVPLn+YSLgOQQabVmkO1oVmHRan7e1:8b8yVTCNGFmUjnWC5FOPxcC1

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe
    "C:\Users\Admin\AppData\Local\Temp\c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3188-3-0x00000000019F0000-0x00000000019F1000-memory.dmp
    Filesize

    4KB

  • memory/3188-7-0x0000000001A70000-0x0000000001A71000-memory.dmp
    Filesize

    4KB

  • memory/3188-6-0x0000000001A50000-0x0000000001A51000-memory.dmp
    Filesize

    4KB

  • memory/3188-11-0x0000000000400000-0x0000000001855000-memory.dmp
    Filesize

    20.3MB

  • memory/3188-5-0x0000000001A40000-0x0000000001A41000-memory.dmp
    Filesize

    4KB

  • memory/3188-4-0x0000000001A30000-0x0000000001A31000-memory.dmp
    Filesize

    4KB

  • memory/3188-2-0x00000000006E1000-0x0000000000CC2000-memory.dmp
    Filesize

    5.9MB

  • memory/3188-1-0x00000000019E0000-0x00000000019E1000-memory.dmp
    Filesize

    4KB

  • memory/3188-0-0x00000000019C0000-0x00000000019C1000-memory.dmp
    Filesize

    4KB

  • memory/3188-12-0x0000000000400000-0x0000000001855000-memory.dmp
    Filesize

    20.3MB

  • memory/3188-13-0x0000000000400000-0x0000000001855000-memory.dmp
    Filesize

    20.3MB

  • memory/3188-14-0x0000000000400000-0x0000000001855000-memory.dmp
    Filesize

    20.3MB

  • memory/3188-15-0x0000000003B70000-0x0000000003BA6000-memory.dmp
    Filesize

    216KB

  • memory/3188-16-0x0000000000400000-0x0000000001855000-memory.dmp
    Filesize

    20.3MB

  • memory/3188-17-0x0000000000400000-0x0000000001855000-memory.dmp
    Filesize

    20.3MB

  • memory/3188-18-0x0000000003B70000-0x0000000003BA6000-memory.dmp
    Filesize

    216KB

  • memory/3188-19-0x00000000006E1000-0x0000000000CC2000-memory.dmp
    Filesize

    5.9MB