Analysis

  • max time kernel
    142s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 05:24

General

  • Target

    c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4.exe

  • Size

    14.6MB

  • MD5

    71a5bdbba9459a53a4a576b128caeac3

  • SHA1

    b864162ee63d7712455e658ac6df0134cc37806c

  • SHA256

    c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4

  • SHA512

    78a77aa4fda4c052e3edd15ee5828815e828f4f092b4d77c6d5238d107e7ace2c8ed00501ed49d7cec913cce377bd551964c475c6f505f6c418ef81a48a1ea20

  • SSDEEP

    393216:iOpL7YRun1xp78qLoRWSYgbr559P93cQFWoK8tCxfprHHKe:1pLqiLp+YCr9PJZWQt495

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4.exe
    "C:\Users\Admin\AppData\Local\Temp\c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\¾ÅÎå±ùÑ©\31326c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4.exe
      C:\¾ÅÎå±ùÑ©\31326c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\30d61cfece3826febcffbf48de2ec298.txt

    Filesize

    12B

    MD5

    d09e7a02312d181840b479f6bf390bcb

    SHA1

    2ec49315372528c0adac753e42c88aadc97151cf

    SHA256

    616555e441a721acf674d017c71eec5b43707e3164e444cf22109af2d660f4c1

    SHA512

    0fe4d312571f9e58998187c07056718f44c90677e5e139b5c788c73c552890d08b978fb0687274a7248ac86449b18d99c27e6e19160f11d9bf8399475c34afbc

  • C:\¾ÅÎå±ùÑ©\31326c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4.exe

    Filesize

    14.6MB

    MD5

    71a5bdbba9459a53a4a576b128caeac3

    SHA1

    b864162ee63d7712455e658ac6df0134cc37806c

    SHA256

    c3f3b6d9d9c9cf28b1da9f6d36700e1018abe1bcf95e052879978786fd47e8b4

    SHA512

    78a77aa4fda4c052e3edd15ee5828815e828f4f092b4d77c6d5238d107e7ace2c8ed00501ed49d7cec913cce377bd551964c475c6f505f6c418ef81a48a1ea20

  • memory/2504-16-0x0000000000B30000-0x0000000000B33000-memory.dmp

    Filesize

    12KB

  • memory/2504-47-0x0000000000B30000-0x0000000000B33000-memory.dmp

    Filesize

    12KB

  • memory/2504-46-0x0000000000400000-0x00000000009FA000-memory.dmp

    Filesize

    6.0MB

  • memory/3784-0-0x0000000000400000-0x00000000009FA000-memory.dmp

    Filesize

    6.0MB

  • memory/3784-1-0x0000000000AE0000-0x0000000000AE3000-memory.dmp

    Filesize

    12KB

  • memory/3784-7-0x0000000003DB0000-0x0000000003DB1000-memory.dmp

    Filesize

    4KB

  • memory/3784-6-0x0000000003D40000-0x0000000003D41000-memory.dmp

    Filesize

    4KB

  • memory/3784-5-0x0000000003DA0000-0x0000000003DA1000-memory.dmp

    Filesize

    4KB

  • memory/3784-17-0x0000000000400000-0x00000000009FA000-memory.dmp

    Filesize

    6.0MB

  • memory/3784-15-0x0000000000AE0000-0x0000000000AE3000-memory.dmp

    Filesize

    12KB