Analysis

  • max time kernel
    144s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 04:21

General

  • Target

    3198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768.exe

  • Size

    13.0MB

  • MD5

    49a208ed1a98ec041de65f882163f62b

  • SHA1

    9f9790c7d3856820bccc916a0cf9285ef3abf6b0

  • SHA256

    3198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768

  • SHA512

    8516d04f526c9064ee3e425d8b8be44f1d535716c0315ba225fcbdb7c5225f58e0bbd7aa65deebb258bf0cfdb822f570ae0c4458f5397a1e8b4e96ec1364d9d3

  • SSDEEP

    393216:iOzlFbN6yWADGyULN7HCP4kvfTSUa1/Lt:1z7UyWAa7L9shT1a1zt

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768.exe
    "C:\Users\Admin\AppData\Local\Temp\3198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\ìiýˆ¤£[רÊô]\123063198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768.exe
      C:\ìiýˆ¤£[רÊô]\123063198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3636
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:8
    1⤵
      PID:4648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\51ba5ce08ce7f251dbe5e62856b62c9c.txt

      Filesize

      16B

      MD5

      b8b58d71b6bc52fbb90a6e40822bc040

      SHA1

      2b4c17ca0ff4afbbdc2f767c55e712daed280e7d

      SHA256

      5086c8342e3a6bfd4f5446a3ef599ab4191f604d7eafd1f74af77278d0bd15da

      SHA512

      1a267ed99fabc69eb4a6c63d21567b5f38420705f2a10bf44e3c85b52d594cb45b2c4fbe2a5b14b3e544496dc4dbd7a5cbc3c1138e59a78fbd4a61c515078ba7

    • C:\ìiýˆ¤£[רÊô]\123063198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768.exe

      Filesize

      13.0MB

      MD5

      49a208ed1a98ec041de65f882163f62b

      SHA1

      9f9790c7d3856820bccc916a0cf9285ef3abf6b0

      SHA256

      3198e481262bb4723ca43dd6740240b40429b44bdb775195f94342aff17dc768

      SHA512

      8516d04f526c9064ee3e425d8b8be44f1d535716c0315ba225fcbdb7c5225f58e0bbd7aa65deebb258bf0cfdb822f570ae0c4458f5397a1e8b4e96ec1364d9d3

    • memory/3108-0-0x0000000000400000-0x00000000009FA000-memory.dmp

      Filesize

      6.0MB

    • memory/3108-1-0x0000000000AE0000-0x0000000000AE3000-memory.dmp

      Filesize

      12KB

    • memory/3108-7-0x00000000041C0000-0x00000000041C1000-memory.dmp

      Filesize

      4KB

    • memory/3108-6-0x0000000003C40000-0x0000000003C41000-memory.dmp

      Filesize

      4KB

    • memory/3108-5-0x00000000041B0000-0x00000000041B1000-memory.dmp

      Filesize

      4KB

    • memory/3108-15-0x0000000000400000-0x00000000009FA000-memory.dmp

      Filesize

      6.0MB

    • memory/3108-16-0x0000000000AE0000-0x0000000000AE3000-memory.dmp

      Filesize

      12KB

    • memory/3636-14-0x0000000000A10000-0x0000000000A13000-memory.dmp

      Filesize

      12KB

    • memory/3636-45-0x0000000000400000-0x00000000009FA000-memory.dmp

      Filesize

      6.0MB

    • memory/3636-47-0x0000000000A10000-0x0000000000A13000-memory.dmp

      Filesize

      12KB