Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 18:54

General

  • Target

    57b29979bc53108480fe9fb175134c4c0d057708bda40abe728389699eaf4915.exe

  • Size

    649KB

  • MD5

    e7d0c6a06d363b02e644f8fbd1eeff2f

  • SHA1

    13efa1ee7dc0699ca2b57162b788191452045f2d

  • SHA256

    57b29979bc53108480fe9fb175134c4c0d057708bda40abe728389699eaf4915

  • SHA512

    a0864f033a33d0454075d0470f20f542d8ec50b332ae2932fe4a35ea729c9dc470fcc8641febb0ca22b3cbac1c266b11c94f454fb1752436122ae948237224b2

  • SSDEEP

    12288:vQKNqX2zl06OYihLFVMf1owHQLBRF8rX2lVCrv17Xika6mCrviPTvInttkwSsMoS:TNqU06OjL8NoBRKGCrBika6r2Psntt/S

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57b29979bc53108480fe9fb175134c4c0d057708bda40abe728389699eaf4915.exe
    "C:\Users\Admin\AppData\Local\Temp\57b29979bc53108480fe9fb175134c4c0d057708bda40abe728389699eaf4915.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2696-0-0x0000000000400000-0x00000000006CB000-memory.dmp

    Filesize

    2.8MB

  • memory/2696-1-0x0000000000400000-0x00000000006CB000-memory.dmp

    Filesize

    2.8MB