Analysis

  • max time kernel
    118s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 09:21

General

  • Target

    ad02957f57989db23295419fe6b9c770N.exe

  • Size

    88KB

  • MD5

    ad02957f57989db23295419fe6b9c770

  • SHA1

    feefc096fa3412dc50efeb837ad1cab250c874d4

  • SHA256

    aecf8e34f39dfd4ddfeba4380f3a1c11d765b8151d777e8faf8e4931f2a02937

  • SHA512

    63d2d140f8ce0abf61828ee2e91981cfd5d171888284f298a4edb07c7378c04b0105bfaa83c0c97c903ff43cbe032de212b0049f904f69ab975362c8ecc12ebf

  • SSDEEP

    1536:/s2OpUqBA6pkuTHQ0cIrf+7LYsF03RYSYhM9l8yDI15XygDSC:/ImRWTTpc627LXFm6+9l8nygDSC

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad02957f57989db23295419fe6b9c770N.exe
    "C:\Users\Admin\AppData\Local\Temp\ad02957f57989db23295419fe6b9c770N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\Systempicnq.exe
      "C:\Users\Admin\AppData\Local\Temp\Systempicnq.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Systempicnq.exe

    Filesize

    88KB

    MD5

    02f5cdd8c48684840e7d6c3122b20c57

    SHA1

    f1027f3f3d51ef388a966bb6adf39757f4a9cf65

    SHA256

    33f75a1ce6fb057d693e2a66a25c347c3ca94192fa76359a390fc26956f42f86

    SHA512

    c8a774a2e2b92acc10bdd76daab7ef1143e44323273c0686fa3d76ce8c6a9efe2e280bba08ebf009f61a1060b18fa7d6c7cb08e7f29031874fa176b71906b7b7

  • C:\Users\Admin\AppData\Local\Temp\fpath.ini

    Filesize

    71B

    MD5

    9beeb3846d6b5b216a8db105ee3a0dc4

    SHA1

    fa58206bbe79482a7e7a78ef49d52884e04a8ba9

    SHA256

    1ea6f1c273563d8e34f8646dcf9e43b9b4af77f12c5e25e50a476eaec1ccd3e3

    SHA512

    9ba0310f4314517dfd57ab29e925b724ffb2ebed59d9d9e8a15d7cc5cf00e08490f04317a85ec3a2b6390eb9e29c535fde6640dfd1afa7f9cbcf0a5cd18f7426

  • memory/2744-17-0x0000000000220000-0x0000000000232000-memory.dmp

    Filesize

    72KB

  • memory/2968-0-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2968-3-0x0000000000230000-0x0000000000242000-memory.dmp

    Filesize

    72KB