Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 01:26

General

  • Target

    5e2960679917c00e4a4803ca5dea67b21ce5be7701331ffe10cfd27e384a72fbN.exe

  • Size

    3.8MB

  • MD5

    402e0377e52fe6aad63ae265f23eba50

  • SHA1

    3dc39f443d98cd151ec24d25721d4dda8d538a1c

  • SHA256

    5e2960679917c00e4a4803ca5dea67b21ce5be7701331ffe10cfd27e384a72fb

  • SHA512

    d5917af9d3218d4911f9d4cf538680ba9f3d79969af9731f8dd3df88f2943b085f3f8de660fd61812b0aee91d8c5fdd63ac8cb15cad79e66b219d00818084088

  • SSDEEP

    49152:3sCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98a:Q6XLq/qPPslzKx/dJg1ErmNH

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e2960679917c00e4a4803ca5dea67b21ce5be7701331ffe10cfd27e384a72fbN.exe
    "C:\Users\Admin\AppData\Local\Temp\5e2960679917c00e4a4803ca5dea67b21ce5be7701331ffe10cfd27e384a72fbN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • \??\c:\nnnttb.exe
      c:\nnnttb.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 36
        3⤵
        • Program crash
        PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\nnnttb.exe

    Filesize

    3.8MB

    MD5

    d61fbce88ab9f6cb2d9964d305b30aab

    SHA1

    57a651349923053f7930f31cf0d5d05c9f599e95

    SHA256

    f6052b4a33f6a149c7ad17c94ee26983aa9c14212cdbf13a704b48ebb0325b35

    SHA512

    dc9a371fa2511e083d21fc406ab039f0cec93af87e3b46e37ad73d6f0ab6a7ab91e9e4d739a4ed898d8bd88c578ece2aef7dd96d95ac50d48191fb4be0a8f1b1

  • memory/2972-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3056-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3056-6-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB