Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2024, 21:30

General

  • Target

    a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe

  • Size

    3.8MB

  • MD5

    787a9834382da76353da50d1f3457a20

  • SHA1

    efac79372ddce4fd32330755c832bc350a9474f3

  • SHA256

    a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafed

  • SHA512

    f08f7b4424740b74bdde00a4ff963e02a8c65ddfaee03dcb0c18737fa79fcc5a388024c6df956cbd18033b4dac99a79aed7c0588adafb65e72467d12adf058b1

  • SSDEEP

    49152:SGCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98jm:X6XLq/qPPslzKx/dJg1ErmNL

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe
    "C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3988
    • \??\c:\bnbhbn.exe
      c:\bnbhbn.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 224
        3⤵
        • Program crash
        PID:3564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3932 -ip 3932
    1⤵
      PID:2236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\bnbhbn.exe

      Filesize

      3.8MB

      MD5

      60c9a090ac4c721c5b5957b1f28702a4

      SHA1

      2a6be33b0d603fddde5ece4e4e6c8f8f80e666e4

      SHA256

      209823ee20969938659332f4c91e5d720911bfaf9c8120151ecce0d378a414fa

      SHA512

      b94f859a3f07bef9a357115cb8c88e7a4ff9dfe8e3b0f9dc0bc4dba9b3a9816eb2f70d062ab3a12f7f45b7f08d17ad678a5887b2df7b11bdecd5c4540344894f

    • memory/3932-6-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3988-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3988-5-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB