Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 13:11

General

  • Target

    10d8bcf7e4090a921c0abf5879e22da0N.exe

  • Size

    192KB

  • MD5

    10d8bcf7e4090a921c0abf5879e22da0

  • SHA1

    594904a707bc4979e9ab0dff6b5f448f36c8dfb2

  • SHA256

    12df6d028773d3b6c5feec03f7a5eea62117121c4896df1504ff0d0377570446

  • SHA512

    8c77f43bd5b4a7812b584d728e1b9d428a413d69259a31c641c81b7daee7208878bccfd808d74f53bad192c9e5981865a3eac46d2fdd0907c345c14528371e8f

  • SSDEEP

    1536:/s2OpUqBA6pkuTHQ0cIrf+7LYsF03RYSYhM9l8yDI15XygDiuuuuuH:/ImRWTTpc627LXFm6+9l8nygDiuuuuuH

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe
    "C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\Systemtpbqo.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemtpbqo.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2388

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Systemtpbqo.exe
    Filesize

    192KB

    MD5

    676176383693f16a713132be7e0291f6

    SHA1

    a4daeee600297bc0aadb083c025c4956439a9d3e

    SHA256

    9c9c6ee23ef4e9cdddd850ff5dc2f602c609342a0278e651cf73e4d59f9cdf3c

    SHA512

    1873f89aac3f1da82127e093f25fd5220702462f0e98c104c8fb8c06ce3bd8fcbc547bd94c26609a1e58f2e0ab2672ea9f52b6927c9e311598cb204306d1eea6

  • C:\Users\Admin\AppData\Local\Temp\fpath.ini
    Filesize

    71B

    MD5

    7133bea92f9a736dc16c48298cc6346e

    SHA1

    6c87a5e640285cd6f39675054ac6c7b43c6bc49c

    SHA256

    376777878b3224d9572128a272ffc084e62980194429cc67b3404cea19b6768b

    SHA512

    603b8bbc4972f1bcc3aa575b36119abdb8eda480a593b1e58b00547192a803a56d1cbb069886973be33f4b112a5c983428049accd41b146f86e8c9efc5f8b1c6

  • memory/1376-0-0x0000000000400000-0x0000000000468000-memory.dmp
    Filesize

    416KB

  • memory/1376-2-0x0000000000540000-0x0000000000552000-memory.dmp
    Filesize

    72KB

  • memory/1376-19-0x0000000000540000-0x0000000000552000-memory.dmp
    Filesize

    72KB

  • memory/2388-18-0x00000000004F0000-0x0000000000502000-memory.dmp
    Filesize

    72KB