Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2024, 21:30

General

  • Target

    a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe

  • Size

    3.8MB

  • MD5

    787a9834382da76353da50d1f3457a20

  • SHA1

    efac79372ddce4fd32330755c832bc350a9474f3

  • SHA256

    a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafed

  • SHA512

    f08f7b4424740b74bdde00a4ff963e02a8c65ddfaee03dcb0c18737fa79fcc5a388024c6df956cbd18033b4dac99a79aed7c0588adafb65e72467d12adf058b1

  • SSDEEP

    49152:SGCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98jm:X6XLq/qPPslzKx/dJg1ErmNL

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe
    "C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2628
    • \??\c:\s4680.exe
      c:\s4680.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 36
        3⤵
        • Program crash
        PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\s4680.exe

    Filesize

    3.8MB

    MD5

    434873904c1c49777b6f6f20f4a8c092

    SHA1

    f56489b4d64f0cce0e83e3b852704525bf28fc54

    SHA256

    0eeb13b3ffdd57ee4a13de4ab40d39eadd9ba94c5f4ac3d4c4ec1962ec4449b3

    SHA512

    263b6c0d51109368fc5fc5bc060923971968beef9ec96762e1eae9869fdcfb2530ac242cf1cd971cd1fd1e86ad57d4d1e9aec91055751caee4d418b2daee45d6

  • memory/1704-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-7-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB