Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 04:58

General

  • Target

    CB.exe

  • Size

    171KB

  • MD5

    5b3b12934e1317b5b1b86b0950d1956c

  • SHA1

    098b2eecf841cefd12a45acc858a4fd25e4d28bb

  • SHA256

    458181628f771015a0e20679d91fe85b34345610e303bfc2f912b84fb3dc6e1a

  • SHA512

    3c84bb665922757e62c039959779903244d95078e36df5f4deea9c046824d3ab3245c9a4c4d624bba3e78657c95ddb16ba10e17dc26b929b4b4bb62ac335d47f

  • SSDEEP

    3072:uvVCDDyoPd+XRvNC2x6P+Xv+jHahFy97AJ3xEzD1oyM/TRFmq1Uoutw:UCa2+XRl1x6P3jHahm7Ok8/9FtUoSw

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CB.exe
    "C:\Users\Admin\AppData\Local\Temp\CB.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-0-0x0000000000400000-0x00000000004D3000-memory.dmp
    Filesize

    844KB

  • memory/2168-1-0x0000000000400000-0x00000000004D3000-memory.dmp
    Filesize

    844KB

  • memory/2168-3-0x0000000000400000-0x00000000004D3000-memory.dmp
    Filesize

    844KB