Analysis

  • max time kernel
    111s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 03:09

General

  • Target

    74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe

  • Size

    44KB

  • MD5

    a65996395f7618cb6b99fee5f7f15d40

  • SHA1

    cb5d3f86f16ac97a11e2af5dd6161b9c506ce8c9

  • SHA256

    74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402

  • SHA512

    3b4c3c3047c83c28094d8dda9f32cc7e1f0283d3a4c07f4da7d688af8349842eb504ac1c499bca9cf6254dffc7dd6a0c096d498d73f56098f261a2ac1e61f084

  • SSDEEP

    768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97D9:Kf2V2IOSXQoMUHFhSYr+DQLytpFJ

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe
    "C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1232
    • \??\c:\blvdl.exe
      c:\blvdl.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\blvdl.exe

    Filesize

    44KB

    MD5

    a4f8ee211c64eef96c7b909fe2ff2d87

    SHA1

    cc0c919c85b4d6d9d0b2d7eeb4d9d4a14c51b40c

    SHA256

    e82f88ce5f5db12393d825e31f6a3d109bef844570de6adf1b7a0a78ae9d6b35

    SHA512

    9638b4a31b445e9f4c16c3d5b5947fa85d5fd51e36ad025761698385ca4fad54bd7f52c6c4a26fde59f5cf9a19feac63286344b5af8bf3a8f1776f7f51fea20f

  • \??\c:\jl

    Filesize

    103B

    MD5

    03f9ff8f681da516eaa255120a97a699

    SHA1

    c248ab7a5906dffba2d9304409aa262f83f164e0

    SHA256

    8cbd28c822e7f08ea7344482d17dd97f91f160fca48e333076c323802b18c201

    SHA512

    eca273c8c61bc35841b4a9a0c75f6776f5dbc3c294e7b8d824b9ff2b993367ef202c0a9ad5d5f8ff1f6742ccf25954f8e6d20e8b0fbe865e32cf260f758d011e

  • memory/1232-3-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1232-4-0x0000000000220000-0x000000000024A000-memory.dmp

    Filesize

    168KB

  • memory/1232-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2152-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB