Analysis

  • max time kernel
    118s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 04:32

General

  • Target

    5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe

  • Size

    366KB

  • MD5

    b2791d470ef60f08a129fcfc6c03d610

  • SHA1

    1055e343bf6ec8daf26d8727401b99a39eeb0e37

  • SHA256

    5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19

  • SHA512

    60ba9d5c7b248ddcd024a89fb22adbdf43bc3c96570323e8e20171475ce9b585bbbba70995cca2a41a37fd713ad6889d8194d0a08fd1ddb0c4db70bbda45a63b

  • SSDEEP

    6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1t:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1t

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe
    "C:\Users\Admin\AppData\Local\Temp\5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\Syslemmclue.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemmclue.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    103B

    MD5

    f50998ea60d43818881a0cdc3644e64f

    SHA1

    3d369feeb21d5f5ac68cfaba8463107909fa0021

    SHA256

    3f09dae953213f704b7503c7350fe9f00cc17020c9bdbb0b06a06a8619d3a86f

    SHA512

    1d6f3ecbd58a867f398ba446472cf0923c3ee45b43e93b5a00d91cf96ac86fa9effd4e17203b4fdd4430554cd17a9e554dccdeaf1aa752085b7d34abe9c271c1

  • \Users\Admin\AppData\Local\Temp\Syslemmclue.exe

    Filesize

    366KB

    MD5

    eb1b8361c5e3654be20d8b8ee54cd79c

    SHA1

    824b148fad1f1f2e70f098cb0ad75cf4a0d742cf

    SHA256

    3c2767dbf1e5404ace2fde34b7890e0b431811d72323c7a19b3c19d18c5dd8a5

    SHA512

    faa452d2df80a2746b5721f5211c4701dd136f2a32711ad514d78bf4d9d9d468ead2c8b82d0063cd1aeae35f4d77e5cc70d522c52f466052dd7f35e76061ae5b