Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 06:47

General

  • Target

    86524fc456c0a5f64e7ae05e55abde5a199a2bcb9467582324a82162d3908962.exe

  • Size

    1.2MB

  • MD5

    12f9f5d92b8dfcb11b2ebd6e617c1d21

  • SHA1

    00e9fc560baf35ebdb19a81c4e06cf12e2627e37

  • SHA256

    86524fc456c0a5f64e7ae05e55abde5a199a2bcb9467582324a82162d3908962

  • SHA512

    59cd2900097871ea37799aabff94d12a6b7f1a282a5edfe1a4adc184ca3a24d912912b2404d8e7016efda8d7550cd54284158f9a16b8b282e0bb2ca0d1be3cf3

  • SSDEEP

    24576:9AgkQy8jlwe53JEa5rTTXyphMYLxUjBBIg6knugiuk6FSjZ3YO0F:p08jlwY5Xr34hRhgeP56FSjN5

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86524fc456c0a5f64e7ae05e55abde5a199a2bcb9467582324a82162d3908962.exe
    "C:\Users\Admin\AppData\Local\Temp\86524fc456c0a5f64e7ae05e55abde5a199a2bcb9467582324a82162d3908962.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2668-0-0x0000000000400000-0x000000000076C000-memory.dmp

    Filesize

    3.4MB

  • memory/2668-1-0x0000000000400000-0x000000000076C000-memory.dmp

    Filesize

    3.4MB