Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 06:54

General

  • Target

    2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe

  • Size

    1.6MB

  • MD5

    49ed775e66e2cd74be732cc95bab5ef0

  • SHA1

    9b10b9e0ec21e85e2c0ec8a07c774488abb58cdb

  • SHA256

    3464397fe5b97bef1dedab8818a3f0679d555b3f0264ce6c539f45941f0b5881

  • SHA512

    c290e2bdd9e920378a4698b276e3d43269066ce3d157cb5d16562714715abd5e9903218d0160da18ee145621eb597220d7acc4baf1b028f7ddaa6dbb26462563

  • SSDEEP

    24576:kEoD7eAzxG0Jc0a1VjXsIQRJ5OTJ7hIVymFNlMtRVblP9PIjo3rSAp0sUPYud9m4:kZzju1VbsIQe/I07SAp0sUPYu7Uo7

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 10 IoCs
  • UPX dump on OEP (original entry point) 11 IoCs
  • Drops startup file 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_49ed775e66e2cd74be732cc95bab5ef0_mafia.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1460-10-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-12-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-11-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-9-0x0000000000750000-0x0000000000768000-memory.dmp

    Filesize

    96KB

  • memory/1460-13-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-15-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-14-0x0000000000A30000-0x0000000000A89000-memory.dmp

    Filesize

    356KB

  • memory/1460-16-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-18-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-8-0x0000000000F3B000-0x0000000000F3C000-memory.dmp

    Filesize

    4KB

  • memory/1460-19-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-6-0x00000000003C0000-0x00000000003EB000-memory.dmp

    Filesize

    172KB

  • memory/1460-0-0x0000000010000000-0x0000000010109000-memory.dmp

    Filesize

    1.0MB

  • memory/1460-21-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-24-0x0000000000EE0000-0x000000000109B000-memory.dmp

    Filesize

    1.7MB

  • memory/1460-22-0x0000000000A30000-0x0000000000A89000-memory.dmp

    Filesize

    356KB