Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 08:45

General

  • Target

    93d6b0f5ae6efa4e5bae7c1299bbbc45f56e6fc98e0c920d2c403ed6d1b3061fN.exe

  • Size

    1.6MB

  • MD5

    d65cb0200ab0c58bdac3c83727f8bb00

  • SHA1

    418f7071f1b36c96db4573c6b477de8572af631e

  • SHA256

    93d6b0f5ae6efa4e5bae7c1299bbbc45f56e6fc98e0c920d2c403ed6d1b3061f

  • SHA512

    843b4fc6bc7423eb6eac4109e314f88878a483fbf370d54ce4d242297e264703fdcba060c55798ae571517c8711d5f568f531035a612d2bdd071e621f4911eb0

  • SSDEEP

    24576:CrtSzyNr05PcgOzXQleqH7jJ34vNkzU9DbdYrN/IyX5iICqBh3SWgSklWnyu:CY60WXkTjF4veUUrN/IycI7BST1Wnyu

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93d6b0f5ae6efa4e5bae7c1299bbbc45f56e6fc98e0c920d2c403ed6d1b3061fN.exe
    "C:\Users\Admin\AppData\Local\Temp\93d6b0f5ae6efa4e5bae7c1299bbbc45f56e6fc98e0c920d2c403ed6d1b3061fN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\FNNMOFF.UGU
      "C:\Users\Admin\AppData\Local\Temp\FNNMOFF.UGU"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\FNNMOFF.UGU

    Filesize

    1.6MB

    MD5

    cfab20af91a9bf185b7e5ffe5f0928dc

    SHA1

    13ae927af26d4d33b38c97e629b41e695beaf5cf

    SHA256

    c03fd756b259a7d9a735b0b35f4c81b565be2f0de8c0e72f9ccf8b5e8caa5de3

    SHA512

    309fdac807195ca81750f802accccf07a7699d94b6cc92a0a9b078b01aac2528d3553d743bf5a1eb602fc83b631f3577200b815844038c1b3336d0f55d18df9b