Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 13:11

General

  • Target

    10d8bcf7e4090a921c0abf5879e22da0N.exe

  • Size

    192KB

  • MD5

    10d8bcf7e4090a921c0abf5879e22da0

  • SHA1

    594904a707bc4979e9ab0dff6b5f448f36c8dfb2

  • SHA256

    12df6d028773d3b6c5feec03f7a5eea62117121c4896df1504ff0d0377570446

  • SHA512

    8c77f43bd5b4a7812b584d728e1b9d428a413d69259a31c641c81b7daee7208878bccfd808d74f53bad192c9e5981865a3eac46d2fdd0907c345c14528371e8f

  • SSDEEP

    1536:/s2OpUqBA6pkuTHQ0cIrf+7LYsF03RYSYhM9l8yDI15XygDiuuuuuH:/ImRWTTpc627LXFm6+9l8nygDiuuuuuH

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe
    "C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\Systemmwaah.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemmwaah.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fpath.ini

    Filesize

    71B

    MD5

    7133bea92f9a736dc16c48298cc6346e

    SHA1

    6c87a5e640285cd6f39675054ac6c7b43c6bc49c

    SHA256

    376777878b3224d9572128a272ffc084e62980194429cc67b3404cea19b6768b

    SHA512

    603b8bbc4972f1bcc3aa575b36119abdb8eda480a593b1e58b00547192a803a56d1cbb069886973be33f4b112a5c983428049accd41b146f86e8c9efc5f8b1c6

  • \Users\Admin\AppData\Local\Temp\Systemmwaah.exe

    Filesize

    192KB

    MD5

    81a35902e863515a3f3166f6cca2dd54

    SHA1

    498badbe3bd9e73e0c7f938280c42e023c7a3c75

    SHA256

    ec90d0dab34ed481b5cc93bc772af495ecae0f0d85b6ca82cc738c58589ad3af

    SHA512

    40665479ebd72534392908123085daad1511b6351a33a04497f2625deab2025781bf280758c5ce576ef38adc03d8ccfc1ab66deea191ccf6d3748d3094d377cf

  • memory/2572-0-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2572-2-0x0000000000220000-0x0000000000232000-memory.dmp

    Filesize

    72KB

  • memory/2868-20-0x0000000000220000-0x0000000000232000-memory.dmp

    Filesize

    72KB