Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2024, 06:34

General

  • Target

    e7a3e19805a91aa43c6f8f51f6876ce519ecdd87f7d744dbff4d5bf99e44aba3N.exe

  • Size

    2.1MB

  • MD5

    a2df606598320e14f6e722ff23b9dfb0

  • SHA1

    3bd628a57b717a78148cce337b4b2edcd693598c

  • SHA256

    e7a3e19805a91aa43c6f8f51f6876ce519ecdd87f7d744dbff4d5bf99e44aba3

  • SHA512

    bf243d8c0246c7c928e645a02e5f94c075ec41599d4b8100ea45d8cc420268cb4d84b15f82a030719f064a01a594457e9e7a5d3558e59da5bcfcca800efc812b

  • SSDEEP

    24576:3qzIIUgC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PPsbb1hwR/:3sCOfN6X5tLLQTg20ITS/PPs/1k/

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a3e19805a91aa43c6f8f51f6876ce519ecdd87f7d744dbff4d5bf99e44aba3N.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a3e19805a91aa43c6f8f51f6876ce519ecdd87f7d744dbff4d5bf99e44aba3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1220
    • \??\c:\vvvjd.exe
      c:\vvvjd.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 36
        3⤵
        • Program crash
        PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\vvvjd.exe

    Filesize

    2.1MB

    MD5

    c6dfaa5b1cc9472c71e8f19ab472e343

    SHA1

    6feb5476214098681c631416b3a9c92865450199

    SHA256

    15902abe3b3af81c3d3446c854161491a72266aaf9b7496298f65e878b6aaa17

    SHA512

    5a53937fb98d1b79ce5087a00a5dc5bc9cbf5301a27fc9c98faac3e0fe1f8e28b9f8d6c123d306ca5381a5eb97a7f584cc724a13898364a77ace84b00dbf73ad

  • memory/1220-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1220-6-0x0000000000220000-0x0000000000248000-memory.dmp

    Filesize

    160KB

  • memory/1220-9-0x0000000000220000-0x0000000000248000-memory.dmp

    Filesize

    160KB

  • memory/1584-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB