Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 03:12

General

  • Target

    58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe

  • Size

    408KB

  • MD5

    1d9e4bc56c15d5a5e4c8649a1c5dbf19

  • SHA1

    d49a7dccc32e95b83bf8e32261c305e67a82f668

  • SHA256

    58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e

  • SHA512

    9ca27f6eb510f51fe58ba6bbb74ed44a057841bed1a21af1e2b993686029c1b17f15a38616c38fd63871c34aba25afcff11ee77167ad0ec863c9a5617e8834fd

  • SSDEEP

    6144:K5/YZ58drqrhGcbLhmvjSN6jZhixVK/B/zIydenCG:K5/Q58drihGiLhmGNiZsx0B/zIkenCG

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe
    "C:\Users\Admin\AppData\Local\Temp\58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\Sysceamakyul.exe
      "C:\Users\Admin\AppData\Local\Temp\Sysceamakyul.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475

    Filesize

    1KB

    MD5

    3aff13f0f493f6f5aa948bc6c4c596f5

    SHA1

    ec06ad3561d5603b15e26280513ed5a0604630af

    SHA256

    aa4fe3439351d9f7df0804b9eabfb001ba08e9cbd32de78d0159f9941f4826c8

    SHA512

    d4f18751b3da048884c5334c48a777202582627ef05208247f08eef6639a4b94b266ecbab89235b1184579b24a525c090062cd690f84f332d15ab1402eaa8886

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

    Filesize

    471B

    MD5

    9caf7a3f2e9656525e95e3b84282ccef

    SHA1

    4a1f2a4ab3c0618811a4ea98256247710449a105

    SHA256

    2b775f163168fb6fb5ed11f9f105471ae96b0c9a01bad98e28ddc9b74371fa97

    SHA512

    dcf4979e058e8481a2bd25210e601dc7f7dd6c19adbffebb4217bf95909c34a84988cbc9fe648a5381428b7609a01baad8c7e920dfda7835e663d658a73d773e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2

    Filesize

    471B

    MD5

    b5f07da0c85c2974f7f4aacf4e7e8ed3

    SHA1

    47f94874fc9cfcb224c382058d51ac083f3f56a1

    SHA256

    aa39f84f77a8c354dfc742914351fa5eaffc591e5f98615265ddc001125f0e2f

    SHA512

    1971cf9f25e81d126606ab33ed9a27857cee2a47396654bb8f0c9d780fbb209742ec87c45e6efb37d3095afa67e50ac23e2ae7066a417945f92da43807b31143

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_54BE0F4A529F65D13ED30F3AD0874E58

    Filesize

    1KB

    MD5

    5b5533ddecafdf4ef445a2b3f739729d

    SHA1

    3990e39b3605b20fa7aed18d1175f9f2d6790fa0

    SHA256

    8526258f10c3e3af4db5388c1123826ff70d9cd83e32f6f2e04804a7337e28f8

    SHA512

    f4864eec33285b06445c0640f62a0261231a7cb4e9241ee00d81f0f8bbfc7040ab000d23fe0472ec17506e03c98911545bfac44fd45eb6d05d15ed176a5c7daa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475

    Filesize

    500B

    MD5

    0e78171126c065705b0c9fe80696670b

    SHA1

    729918facb34add15276eadaefe1f6a2f82374b0

    SHA256

    b12639e047ac338e92f57380c41f3b80dc7db36f081697e31f0fe251ba1299b9

    SHA512

    59650fde3b4517357da5618e9abf94fcc5c19ae90e2fa6c6531bf83b3f000c50fd3ff29b75167a9803c08ec7734ed6d629e4b5ae1b91eafd1246028f54af6653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

    Filesize

    398B

    MD5

    5837f4dd07abfd5d4c714f4f1bdb8103

    SHA1

    fc570c3d12a8ce9add88d4fff02c224d3d9b51f2

    SHA256

    2d2a5c2d5185a82646baedd03f116722d37eed53f0bf47f301a474a9893b17d3

    SHA512

    2ac233794118d083255509c86109196938d4aba4e291e1c679d582b25cc2d19d913c853babba783fb157791f44c6c926f807c926ef11510f3603fcb4f04cfb69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2

    Filesize

    410B

    MD5

    ec4ad61113c03d383ef7cd738d3591a1

    SHA1

    444a8468bbe9b15e927b26bb5ceaed9a8baf1155

    SHA256

    7745f210c9c541575cdc73d67a8c3b5f6b83761fc4cffebf7f636e6747001e5d

    SHA512

    60e900e4c5d629d0afafd649d3eafd0d24340adb07a339cad607426950a8f9e69407909b578296672a75592c011b25a5e903deaefb669304ba6d7e82c0a5ed18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_54BE0F4A529F65D13ED30F3AD0874E58

    Filesize

    536B

    MD5

    af47ac9dc14744732be530615ac6db17

    SHA1

    2493a19c6843ea12fc9caa052b26bb4748aeeddc

    SHA256

    7de1f28f69edc205ca5cdf36316eee8188ed27ad057aa09fe8bb16910226671b

    SHA512

    abceac6e86d15495dffc1e904b9534e09461c110e2ad99c396f7e684859119825c757d0f10eddabf62b5f9f909dbfff2335ce82fb70f2cf08464cdfb8b3ff6aa

  • C:\Users\Admin\AppData\Local\Temp\CabC755.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Sysceamakyul.exe

    Filesize

    408KB

    MD5

    3138a2a1d4eb284e029254f5cf976537

    SHA1

    58865942dfa1b3897d566037a89a23abd7dfeed5

    SHA256

    1fa2a34e0cdb246848ed29601efafb450ff495c0527af5c798443919d962d8ce

    SHA512

    7c9d3ae51e5e1642456a59024592592844f2dd59d95c855f85632dc68612a15ab86f061f1755598005410b72a41c2ffd2c69a6b1c28a76e477a69bba624accf9

  • C:\Users\Admin\AppData\Local\Temp\cpath.ini

    Filesize

    102B

    MD5

    e7a9fb06912b813ced3a5267c0cb0aa7

    SHA1

    901ceb47a6c80271faebc4f356f725d5b80f2d36

    SHA256

    ef8bc7fe2cac4fc2a798977b1c4e5e88c09023c1e23f37b85c126a32a238b96f

    SHA512

    957cae831856084a46dd7a24dc560ffd996f5393bbf8eab86f3ee81f2aebbbcb640be76a437d86c8e6dd6d4d26979861228a8df69b14d539ab1108434a53457b

  • memory/2484-58-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2484-0-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2484-40-0x0000000004080000-0x00000000040E9000-memory.dmp

    Filesize

    420KB

  • memory/2484-27-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2484-42-0x0000000004080000-0x00000000040E9000-memory.dmp

    Filesize

    420KB

  • memory/2704-43-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2704-66-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB