Resubmissions

22-12-2024 05:26

241222-f44c4svqcy 10

22-12-2024 05:18

241222-fzr5aavqhp 10

Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-12-2024 05:18

General

  • Target

    tfd.zip

  • Size

    6.6MB

  • MD5

    44da30588e79926aa259c03796820e6d

  • SHA1

    37bc83fe0487e8c1f7f309983af78a3b3dab24f2

  • SHA256

    fcf54eaf0f05dae2521ce9a53b67a0ac8a72c98f9f8b25a9258fbe1261f0be5e

  • SHA512

    1ff5a5e9f840fdf7713375c9294149f5265d1b09645eb00c2cc2d1ed07847a7bc990cc3aca8aaaf4205f9415153f9563be630268d28335a85bd1808cba3d8e0d

  • SSDEEP

    98304:Nkm/OuBU0P2VJEgdGuTzUlD4JWX++gLCrK6UjqHiL7y3qF+Ok+K6QppKOU:KmWXXEgEuTzcOpuGDqCK3q0Xkt

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\tfd.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4324
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4540
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\tfd\run me as admin.bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\Desktop\tfd\GF.DATA,Win10
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4444
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\Desktop\tfd\GF.DATA,Win10
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\tfd\GF.DATA

      Filesize

      6.9MB

      MD5

      c6e29164ff238c1f3a538722c7ab9871

      SHA1

      8e3c981e9dcd9d71c2128811652b4a62acd2622b

      SHA256

      4848cd7fd555e5551d94a1b8df19d19a9cf65727c0d8badbe2457516ee19ead7

      SHA512

      f9e736d37d83ad38255e22ec282ca6d137471a640981f5bcd039d04ddd3151e4036920d3d182230d1f442f8410ebdc4dc8ef95f7264450a517c4fa9ad3308a31

    • C:\Users\Admin\Desktop\tfd\run me as admin.bat

      Filesize

      111B

      MD5

      32ebd1b51e027f5eb86c7cd3bf98f661

      SHA1

      9f94f463b0c60e73cb6d9a221feb86da05bf5582

      SHA256

      49941008e16ca6b79cc4949da034da2696d7f78d6664b74afcd11902eb76c3c9

      SHA512

      4540c9d9ea0e58e889d29d50cb22bb4e0d5c401475127c529d9abacf9ea0c3a9aa8b22ca1b13fd6da98f0452b8e7d22111b59bc520b57601e3d6e606c0d48b35

    • memory/2368-10-0x00000000027B0000-0x00000000027B1000-memory.dmp

      Filesize

      4KB

    • memory/2368-9-0x0000000000F70000-0x0000000000F71000-memory.dmp

      Filesize

      4KB