Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 03:09

General

  • Target

    74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe

  • Size

    44KB

  • MD5

    a65996395f7618cb6b99fee5f7f15d40

  • SHA1

    cb5d3f86f16ac97a11e2af5dd6161b9c506ce8c9

  • SHA256

    74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402

  • SHA512

    3b4c3c3047c83c28094d8dda9f32cc7e1f0283d3a4c07f4da7d688af8349842eb504ac1c499bca9cf6254dffc7dd6a0c096d498d73f56098f261a2ac1e61f084

  • SSDEEP

    768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97D9:Kf2V2IOSXQoMUHFhSYr+DQLytpFJ

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe
    "C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3996
    • \??\c:\3frrffr.exe
      c:\3frrffr.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\3frrffr.exe

    Filesize

    44KB

    MD5

    9fda155ab53b811dfe8305809321c976

    SHA1

    f996011c05d327957f0778afb8edf898460dc223

    SHA256

    3859219ef0d88a203a457d21590d5673dd7bb5937d6cc97d519bed6f7b3534dd

    SHA512

    720e1a20b412884f9705c4a9e0e59b795d8eca00c0b3806b1478188219461469f0c08f913afd1bf97ef614ebb95e75136e04d90ce481805abafc98d3c253b448

  • \??\c:\jl

    Filesize

    103B

    MD5

    03f9ff8f681da516eaa255120a97a699

    SHA1

    c248ab7a5906dffba2d9304409aa262f83f164e0

    SHA256

    8cbd28c822e7f08ea7344482d17dd97f91f160fca48e333076c323802b18c201

    SHA512

    eca273c8c61bc35841b4a9a0c75f6776f5dbc3c294e7b8d824b9ff2b993367ef202c0a9ad5d5f8ff1f6742ccf25954f8e6d20e8b0fbe865e32cf260f758d011e

  • memory/3284-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3996-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3996-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB