Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 03:18

General

  • Target

    b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe

  • Size

    2.1MB

  • MD5

    16ab871e0952598f3f1568904a63554b

  • SHA1

    3bc709c6dd7b18ffeabc2fb7921f9282949b13fa

  • SHA256

    b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a

  • SHA512

    25d73140935d08dc33fbcc534867a23ac5229be2db2f50c935185d65ab5d4aa436df142d36878661acb9d67671b6069ba1930fb0b8ed71826e558c99688cef32

  • SSDEEP

    24576:3qzIIUgC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PPsbb1hwRM:3sCOfN6X5tLLQTg20ITS/PPs/1kM

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe
    "C:\Users\Admin\AppData\Local\Temp\b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3272
    • \??\c:\nnnbtt.exe
      c:\nnnbtt.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 224
        3⤵
        • Program crash
        PID:3476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2148 -ip 2148
    1⤵
      PID:1140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\nnnbtt.exe

      Filesize

      2.1MB

      MD5

      3fb05b02dd385ff869340f8f98e4ed3a

      SHA1

      10ad65de72034d09d5814a4b33b0b3fb8fd4b9f8

      SHA256

      b9a4ddf21bca272804c3ae3b4d0a397f363726fae8c84b4ff09ed35b5b90546f

      SHA512

      f37f49b9ab45eae673949486ce59ec62fdb01aeb15f8f20581ba7e99c37baab449f692c2082c5dea4c8a6998b93615ebb101010218eca5bc6779791742c6cdbe

    • memory/2148-4-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3272-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3272-5-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB