Resubmissions

02-06-2024 00:06

240602-ad8l9acd48 10

02-06-2024 00:04

240602-acz9gsbf6z 10

Analysis

  • max time kernel
    74s
  • max time network
    80s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-06-2024 00:06

General

  • Target

    1992cf9a67fb4425.exe

  • Size

    337KB

  • MD5

    50280002e4fde1433c6c80a1178c2774

  • SHA1

    27b3a07a5dd9edaeb7f3379e2fd023f72f779586

  • SHA256

    d9aab9d934e3cce61759da398a607b7a2280b592269cae62a4ca2530b5bf4833

  • SHA512

    8b9d2b96c7d4362d75656e108e7809d6bcad083f978a9b8d3aae00eedab029bffbbd03b756afc8c4a984d37f2a97361e99cac0f6e724cfa2b82f448949073271

  • SSDEEP

    6144:udxWxRzGrfgHtJ7Z1taVeEL0BJDYaS76Faf/1rGbqjSSmjeP:udURzhbftA4HsaS7x/JGb1SmCP

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1992cf9a67fb4425.exe
    "C:\Users\Admin\AppData\Local\Temp\1992cf9a67fb4425.exe"
    1⤵
    • Sets file execution options in registry
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1936-0-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1936-1-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/1936-3-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1936-4-0x00000000022F0000-0x00000000022FA000-memory.dmp

    Filesize

    40KB

  • memory/1936-5-0x000000006FA80000-0x000000006FA90000-memory.dmp

    Filesize

    64KB

  • memory/1936-6-0x0000000077A92000-0x0000000077A93000-memory.dmp

    Filesize

    4KB

  • memory/1936-8-0x00000000022F0000-0x00000000022FA000-memory.dmp

    Filesize

    40KB

  • memory/1936-7-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB