Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 04:43

General

  • Target

    31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817.exe

  • Size

    9.5MB

  • MD5

    7757ee8cf24323b67fb5a40802fb2f36

  • SHA1

    8e9625603b39809eeadcc68ff533c1fe9a7ed010

  • SHA256

    31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817

  • SHA512

    ed49d5f68be598e88bd56985ce0cd806b098b487337e04173773f8c90d5a7be608f856e17af1a8126c2b44bbf76e744ee3bec0f32cfd7e95dc04a70e67b01c21

  • SSDEEP

    196608:ZjVJcDKlFBqkwDxURK8vyqByLdlf3hRQIgLKNc:ZxODKlFBqHayOclfhRQIG2c

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817.exe
    "C:\Users\Admin\AppData\Local\Temp\31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Roaming\ÀíÏëħÓò\31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817.exe
      "C:\Users\Admin\AppData\Roaming\ÀíÏëħÓò\31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Roaming\ÀíÏëħÓò\ÀíÏëħÓò.exe
        "C:\Users\Admin\AppData\Roaming\ÀíÏëħÓò\ÀíÏëħÓò.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2848

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\ÀíÏëħÓò.lnk
    Filesize

    1KB

    MD5

    5742615f75b6ea2f3b7c2545f96c7b15

    SHA1

    3e5f3a378d2a4b7f760990cd0290d3730fda2088

    SHA256

    beabb4b53b3f47b24805879ef94a519dbbc13db32bc54b8fba2b4aaac8089998

    SHA512

    8c5b4d91e70d3d1c7aa4a80858fd5a94e3b838ac5e6f9378907019df8b39b21f9f5a357f9a8fc57abdce2dbdd86ced400694d1b9d4c6de19bb2f1951b81574fe

  • \Users\Admin\AppData\Roaming\ÀíÏëħÓò\31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817.exe
    Filesize

    9.5MB

    MD5

    7757ee8cf24323b67fb5a40802fb2f36

    SHA1

    8e9625603b39809eeadcc68ff533c1fe9a7ed010

    SHA256

    31e2172058613e443b473c2f3311a208d9b68ba84a8f53315200baa8cc076817

    SHA512

    ed49d5f68be598e88bd56985ce0cd806b098b487337e04173773f8c90d5a7be608f856e17af1a8126c2b44bbf76e744ee3bec0f32cfd7e95dc04a70e67b01c21

  • \Users\Admin\AppData\Roaming\ÀíÏëħÓò\ÀíÏëħÓò.exe
    Filesize

    9.0MB

    MD5

    d796dca47874d2848f19ba80859a1dbb

    SHA1

    7a6def1eab1a93ef93a4182f22c0a7eedb2f0314

    SHA256

    413ca8a2b0be9632c2f626f9e8b630e3985adf011102e563462fc9d092f18ef6

    SHA512

    506c6d3e41bc5e212068383ff790bc4a871af36008d47c956528e5901e85a5df21002cdb665f967f6f5b690dc961ac7d65a11b61a8527a98b025507c3dfd1734