Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 02:18

General

  • Target

    98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe

  • Size

    74KB

  • MD5

    f2af8847b5640678ce7ec6a255eea4e2

  • SHA1

    2fdef85efb0caaa68c1efd60162cbb876d54169e

  • SHA256

    98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45

  • SHA512

    3186599c50efa0bff4052d6e667afa6704de3d093f7f450b734f288447b1e2975e01f314bac30600a70fed8497d7d2b18bc9bb70867b4661c1df5d3a3de01c0d

  • SSDEEP

    1536:IyfIcT9U1tPrgQvhLopacl1TsQk0NJP/PAjgas/3VUN0YWZPnouy8z:VfIS2vhLoz5sQkqgjg1YWZfoutz

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe
    "C:\Users\Admin\AppData\Local\Temp\98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\Syslemiobpd.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemiobpd.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Syslemiobpd.exe

    Filesize

    74KB

    MD5

    ffe576b5ca0fb08f14dc1d376e8f1ba3

    SHA1

    9e43fe6bbcec5c54492ab19532b666d107cc01ba

    SHA256

    41a23aee2600a5914c357b13d2fd37d5cb249521adaeb8d26c1dac94e47433c1

    SHA512

    1ad106570765f644f532dcb589160b792aafe8541338dcab9bdc21d61b5711c3f0295a4ee7c29eb59d97b0574ba38c92944d3224a5fb45a57b1693b10cd1cba2

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    102B

    MD5

    91f943d31f3a1793759a6e00c959c988

    SHA1

    d9c5a1b94c85ef6f38e216814586de55849c298f

    SHA256

    0617ef87c6efe92ba4d54e49c5d1701e031b8c21089d9af472847004f6934eb4

    SHA512

    7ea6777e2cfc71aac177fe57141d1465f716ec629d8d01acd18061630716d7b54926ec7bb65fcc5c268e16c037a9fdde599f0ccd111689b25699abbf2fd39f3d

  • memory/1996-16-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/4864-0-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/4864-14-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB