Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/12/2024, 03:35

General

  • Target

    dcc883aaa9a4296c66fde80882e4ee25df52d5a8da344a6ab8faa2ef7b0b01b0.exe

  • Size

    464KB

  • MD5

    789d9cb067ec4e9dc5ce7f82310e780c

  • SHA1

    16255ccae649b3d48138528f8dc6fe1e9661a181

  • SHA256

    dcc883aaa9a4296c66fde80882e4ee25df52d5a8da344a6ab8faa2ef7b0b01b0

  • SHA512

    ad461821cb0e6f34ee1fce4acb864e41f3e7a6495c183514a3fccfa2b617317d7b276f727b1ceb90c9670cd1a5fc96409088b2f835ecfd5c8965d6675405d6e7

  • SSDEEP

    12288:2pbnCZw4vSBlja02ro/YyVOVZ1Eh06b/DTr57b+j0//ShbWn:6Dow4klja028FOVZ1EG6bbJn+SObWn

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 18 IoCs
  • Executes dropped EXE 20 IoCs
  • UPX packed file 38 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcc883aaa9a4296c66fde80882e4ee25df52d5a8da344a6ab8faa2ef7b0b01b0.exe
    "C:\Users\Admin\AppData\Local\Temp\dcc883aaa9a4296c66fde80882e4ee25df52d5a8da344a6ab8faa2ef7b0b01b0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • \??\c:\hbbbtt.exe
      c:\hbbbtt.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2980
      • \??\c:\btbtbb.exe
        c:\btbtbb.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2492
        • \??\c:\jjdvd.exe
          c:\jjdvd.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2440
          • \??\c:\dvpjv.exe
            c:\dvpjv.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3584
            • \??\c:\pvvjj.exe
              c:\pvvjj.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:748
              • \??\c:\lffrllx.exe
                c:\lffrllx.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3964
                • \??\c:\5xfrlfx.exe
                  c:\5xfrlfx.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2348
                  • \??\c:\rlrlffr.exe
                    c:\rlrlffr.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2104
                    • \??\c:\5dvpd.exe
                      c:\5dvpd.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1524
                      • \??\c:\9rrfrlf.exe
                        c:\9rrfrlf.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:3300
                        • \??\c:\hthbtt.exe
                          c:\hthbtt.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4428
                          • \??\c:\bbhbnh.exe
                            c:\bbhbnh.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:1480
                            • \??\c:\rxffxrl.exe
                              c:\rxffxrl.exe
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:4800
                              • \??\c:\tnbthb.exe
                                c:\tnbthb.exe
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:232
                                • \??\c:\5jvpj.exe
                                  c:\5jvpj.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of WriteProcessMemory
                                  PID:3960
                                  • \??\c:\3fxrffr.exe
                                    c:\3fxrffr.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of WriteProcessMemory
                                    PID:3100
                                    • \??\c:\frxrllf.exe
                                      c:\frxrllf.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:1224
                                      • \??\c:\3nbbhh.exe
                                        c:\3nbbhh.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of WriteProcessMemory
                                        PID:2072
                                        • \??\c:\tthhtt.exe
                                          c:\tthhtt.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of WriteProcessMemory
                                          PID:2876
                                          • \??\c:\9vvpj.exe
                                            c:\9vvpj.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\3fxrffr.exe

    Filesize

    464KB

    MD5

    53b358c3199d6b10458f626f1be726eb

    SHA1

    4845b0b6fc7546682b69509606bc2a5eec76fe18

    SHA256

    28e3679d770673f5c959247a0c401fb8b431fbed6eca988e13a3693068d3df45

    SHA512

    04ea881295c12b82c14d00aefe5c9182a88e246d25531c1887ed8b2fad169baa18c896da43e2e615babed66484d1b3e3fb6e9d46522fbb7153f47cd4f8b8b124

  • C:\3nbbhh.exe

    Filesize

    464KB

    MD5

    9940c9236ae60dfcf57b85fe699294cb

    SHA1

    a814e3db8b410617fa503558ba0feef4f07d2167

    SHA256

    d4790d6ebe2c0d757df0ab8beb792bf7370a3d952eee190b90f9ccf4821d862a

    SHA512

    0864a1228f9484e3ea2e3315402ee55a3ebe368bad7b4f29a78c3c1843e431e7d7062035441c637d74c429568925668bb23fc0c53d1b7f0d6f6d15d2c67cd58d

  • C:\5dvpd.exe

    Filesize

    464KB

    MD5

    2d427cbd461400f812fe3e8d36adf414

    SHA1

    85f1a8ab8e87f3f5fe9f46475c57fbde42ecf919

    SHA256

    e7fab34a1a9708ded50ab0c51199a57fe4d1250089b085a9530c50b878809683

    SHA512

    ef5ccc79404ffc2db439a8c78232cf13f19bdece867c176c4092acb5f29be143f14d70961a9b33eb69fcb7b9ad2bc5e4f8d26d3e01a645f00b565e33cb339200

  • C:\5jvpj.exe

    Filesize

    464KB

    MD5

    f7f278d8e3df0d48d5c9dc6850d9231d

    SHA1

    c8682e2f04581a09caf9030a08fc849fa8b94029

    SHA256

    287affd3c39f9d561049b660c489ba9b40c1fdabd5d2f798cbcee0c1ff23b510

    SHA512

    9385716608133fc3abe37377c3f39466dfd5ef64b82560a21afb488583994267f8944135b92d038fc862ae415c99099c024572816d5a17abe1cc56f0a7f28b01

  • C:\5xfrlfx.exe

    Filesize

    464KB

    MD5

    b9dcb2744f46a873f12bfbcf5007f46b

    SHA1

    8d6c67d4aa34d86609e05b5a333dcd7095f1fac8

    SHA256

    e0b1de83f194ddfe045e451afbf0b0aa9e94af7794435bc37743f3030eb255c3

    SHA512

    3c708d056c0ba5858b4a1836ddf1a56ea41230f308cc05a43300048ed361670484590b77ecb003f4033e3a7fc27a66657c1a55021737eb5bb9bbf82c59bc20ca

  • C:\9rrfrlf.exe

    Filesize

    464KB

    MD5

    8eb39d0719412fe09b67404154c40b6b

    SHA1

    a16dc73fb7b391b2a6bac9eba386e00b69fe6bfd

    SHA256

    07cfb964cd16fb86888ddf9b8fcbfe79f59e726f3b3105a95b60adfd548645ad

    SHA512

    55442680865e11065f1e3b4c4efd9506a976dbb5e066167b25dd8b3cfeb2c8f0a33a5927e53802f52be732ecc77c3657dc2672c693374e1d7fda91e6c225aa13

  • C:\9vvpj.exe

    Filesize

    465KB

    MD5

    4e0f5020b40159114d98c8a4e7c2e58f

    SHA1

    2258e63dcd6e58a44632b401454192ba46c93e8d

    SHA256

    2a9e137913724722d5f1a7dfa11b705dc284a89aa3d12618bedec97c7eca978e

    SHA512

    58cb8bcb7baddc8ad994425cb7a0d8a1dda2517538bcb9c9034de6050e56b8394076232c256dce6a090d47ac178cc0bd6a297bcb9477722a46dfc0ee28373364

  • C:\btbtbb.exe

    Filesize

    464KB

    MD5

    cf4c5c883dd392d2ae4ba1d488a05ff1

    SHA1

    5276e293f630b2ae722f4620dcb9e683d0f4174a

    SHA256

    c65408b30d331c5bd38cda4e6afb79716b06270592d62296ee08eea36b64d43d

    SHA512

    c6f06452ac33c42e52c014f20bfc02a70b2164609d62f7a01a9d2efbeee8a535a6074d9d0aa786541bfaeaac790e1d78f49944a11adface7eb111ea1d308b7c7

  • C:\dvpjv.exe

    Filesize

    464KB

    MD5

    fe19c9bb70841fd0d153de9a37cee66a

    SHA1

    6019ffda3923ad7f66e126a2a4a717b5c1485984

    SHA256

    634a5efd738df37fbbf613ff942323ae19a05f651a9639ea8ef0ddbc1775355f

    SHA512

    dbc6e1331562a89f3f3b063ae566a7b7f3b1b4120b90c2fdd0edc18b056056966e73fe27b608ebf837f8ef9a03ef92b41ba466647f891937fbc1ae69144198b9

  • C:\frxrllf.exe

    Filesize

    464KB

    MD5

    8e89029609c3c0539191abffa25971f0

    SHA1

    d7544d6d28047b05a16c374a069ed1db0f9e41cc

    SHA256

    6260da85d2ed96a585eb73b78c626935926090e23bf2ab679622c7893b88f14a

    SHA512

    15ddc964bf5d25ce58d4bc5c39d250d53c62335a5cf153c50be926901516dd3c867271e06f54d50b342abf0b9388bbf4b3cf560aa11ca622c2af4839d9c5d29f

  • C:\hbbbtt.exe

    Filesize

    464KB

    MD5

    d218c1ddc62199941d64568e0adbfaf7

    SHA1

    8ed790953ae8e758602c16b11ef1d479dfc5f8f6

    SHA256

    871f62dd32d2b0e6e5b915a62facf743fe727491e90b4c886243c30b409ef4ce

    SHA512

    3e93cad2bfec68bf2ab65020ae1668566eacaf1de185030881b3a22ca0e639a4ee015040f0b6f134d7139d18396169dde0a71350fc8bc8a7c4c81983d45ec7a8

  • C:\hthbtt.exe

    Filesize

    464KB

    MD5

    4bd764e2d511bf7b3ab18cf5c1d91e7f

    SHA1

    c68af6e707713a967832c64cd0f95b6cdf311482

    SHA256

    15402982c03414cb80a2f36082789d5b518034813c2b46933ceff046b7201e0b

    SHA512

    ff896b705906692707fd85676eedb4acfd78cdc314ec6d683da826432cf7d9bbd7e5d1bd3740690ad9c9dda391f5af9c41b8024896c7c550988e435324b6a186

  • C:\jjdvd.exe

    Filesize

    464KB

    MD5

    9cd969c431dbdc298c6688b74896d5f0

    SHA1

    a36d0b27cf7365b888ccf39112e27e11649c759b

    SHA256

    7c73092235466c6a130c2815548c3f5c4999cfadb19f02d4a206bd7dfdbd7820

    SHA512

    4d035e82dfd286a29afc11a4f323041d101f4b40c0843204bbe3979b4ae0f41e91287177f0e183d090f7f2096e25d9ea1f40f356d8a0eeeac52518ec70f4e912

  • C:\lffrllx.exe

    Filesize

    464KB

    MD5

    eac3709e4a2372ba095bdae09412cb7e

    SHA1

    7d335764830e4d81df3582f2d752c7f3c1fcf233

    SHA256

    7460eaf5f301ab665392cf9e98d871df814231b3da4b41e7606849238d093255

    SHA512

    707a4f6c9b697ebf9f559d1bec9bc9b3edb8a6da3baa316648fcdffed9312c10d051f02252e6df1360ad3d09a420661d49addbcee1a3ed85c7591ae982dd9fc7

  • C:\pvvjj.exe

    Filesize

    464KB

    MD5

    23c649a233b8ab160f015a2595fd9116

    SHA1

    bb10acc75bb3dcdc12888681c707620ab4c3da97

    SHA256

    48602221e1704fbd4cd4d6bc0ac1ce6032b10b47dba7e269b63613a9513c4847

    SHA512

    4f1c8e0dbdfbc94e25f387add6ef4807d9356289582333a454ce29b22472c69fd0e67a32b7c5757a7313cfd25ddf416b0f2a3e0bcaa615da8a3f9754f551ad98

  • C:\rlrlffr.exe

    Filesize

    464KB

    MD5

    e3a042d0f2390cfa3fcd23faa3bc41e0

    SHA1

    038fab1b6ffdad99add812d7da17335cb9794991

    SHA256

    e45612438940a61e9480a4a26db36d5c5064654b615a8eb5dcb1430657845822

    SHA512

    435468984b8004b4ddef801155b1070a017d3479325e40015b4e3500ddbe39ed8a83d80a64f2d3ecc4298c74808b539ab84d33bb3621f94b5356c145a40f40bf

  • C:\rxffxrl.exe

    Filesize

    464KB

    MD5

    149c426209bba9ff59e1f1cd12c67a77

    SHA1

    5b0cad9fde15eeca1032023338887175ac4a3593

    SHA256

    12290d5eb377a6bd8f65daaffd18724a1d86662aa0be825aa9e4ed519500f78c

    SHA512

    183e4372bc335f3bdc982bf8c6b7d0ee8d386efcf9e9930178087a087c983e2bd83ac7f0c50a42347a324e4675914c7964a607e34e70b4df5db9816691bcd967

  • C:\tnbthb.exe

    Filesize

    464KB

    MD5

    b6216346c3c931562ab7ded4d1c1a09f

    SHA1

    7c90b387a99d09f94854304e521d3c63698eab7e

    SHA256

    59b1c91b1b90531f86e05ac617615ab46f485bfa5ef14dad6dd078e3c032e24e

    SHA512

    349178b9f5caedf308d5afe323512002944694f6a190213d153d9015742541554a2bd8955aa8731dc0e89e0198e40671d93972314057e9fc2cf481cbc724d569

  • C:\tthhtt.exe

    Filesize

    464KB

    MD5

    74502a95ac19b6426ce138e1814481e3

    SHA1

    17c210016566593bd07f5ab553726105e7e8d178

    SHA256

    ad8eb36da803a0c8d2d73b82e8843f0330dd0dd9f6795a34d6c90c409d672f69

    SHA512

    474b0ed9d5fedd92fbf4b7bb5103e8de76f7719856745925c910ca1dada16e2a6f618340e012542be8c75a1c755e440dd6b7006c50023f3715d4529ebae078ff

  • \??\c:\bbhbnh.exe

    Filesize

    464KB

    MD5

    0c162c6d530186621465c811d50fbc76

    SHA1

    87219e1e7f74bb4012d01c834de724b29556b270

    SHA256

    abca10c41a2eb520baea8a3a0d5fa7b2b349f2eb3ec0067d7a912ee305c62be6

    SHA512

    1da815e5910549e74dd740af7ea2e542321d206d2c6c1784ddc92975513ec56ce71c9d2fba614dd6ee1840caee6e117010194b8adbb0fea8091f554985fa8ec7

  • memory/232-140-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/748-55-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/748-54-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/1524-101-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/1524-95-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/1524-96-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/1524-97-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2072-168-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2104-84-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2104-92-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2104-85-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2104-86-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2324-1-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2324-3-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2324-4-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2324-8-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2324-2-0x000000000042B000-0x0000000000442000-memory.dmp

    Filesize

    92KB

  • memory/2324-9-0x000000000042B000-0x0000000000442000-memory.dmp

    Filesize

    92KB

  • memory/2348-75-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2348-73-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2348-81-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2348-74-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2440-35-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2440-39-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2440-33-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2440-34-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2492-23-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2492-24-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2492-30-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2980-15-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2980-14-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2980-13-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3100-154-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3300-107-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3300-112-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3300-106-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3584-43-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3584-45-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3584-51-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3584-44-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3960-147-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3964-69-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3964-63-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3964-64-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4428-118-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4800-133-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB