Resubmissions

17-01-2025 07:46

250117-jl9c7axkfx 10

24-12-2024 10:56

241224-m13qqsvrew 10

Analysis

  • max time kernel
    1640s
  • max time network
    1643s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 07:46

General

  • Target

    c75e1a5d3149f33efb090d9f1106ed75d09a5570b3f56a0669f4f13cc3728bcc.exe

  • Size

    546KB

  • MD5

    d76ee42b3f0213dff456133d3f49a828

  • SHA1

    9b08f2f5ba94f5c2dec40b999d6d37e2a3f39d45

  • SHA256

    c75e1a5d3149f33efb090d9f1106ed75d09a5570b3f56a0669f4f13cc3728bcc

  • SHA512

    fc5b386a17114ca1ef55aa19fd4e3825a1830fadf889d0e8e6a54b38a1ce62fee788ecf26b07ce688dd54041a9cde0bf82598ac897d95d445f31fa812f606956

  • SSDEEP

    12288:eag9hsVdB1WUTYw6DgjfgOhWpUpytE5O03BFgGr3DODTZ7M:1g96dTYTDgjf2EDBmGg1M

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 55 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\c75e1a5d3149f33efb090d9f1106ed75d09a5570b3f56a0669f4f13cc3728bcc.exe
        "C:\Users\Admin\AppData\Local\Temp\c75e1a5d3149f33efb090d9f1106ed75d09a5570b3f56a0669f4f13cc3728bcc.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2276
        • \??\c:\windows\DBk1\jrS4.exe
          "c:\windows\DBk1\jrS4.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4884
        • \??\c:\windows\DBk1\8cCJgEh5.exe
          "c:\windows\DBk1\8cCJgEh5.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3952
        • \??\c:\windows\DBk1\d4sdu.exe
          "c:\windows\DBk1\d4sdu.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:3572
        • \??\c:\windows\DBk1\5mtY8xynD0.exe
          "c:\windows\DBk1\5mtY8xynD0.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3116
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9gSU4.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3636
            • C:\Windows\system32\PING.EXE
              ping -n 2 127.1
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\9gSU4.bat

      Filesize

      261B

      MD5

      9da449770233dcc0930e79fa92e35fa8

      SHA1

      27390794cda59d793299fc5dd1f9af32354b7c6a

      SHA256

      83d658cf1d4a3e77bd17d92cbe84b49bcb5a8552d2f121def209f02eb33f267e

      SHA512

      7cedc8a5540c458efdd9ba17b407e955d1e5aa8bfcc788471dda51d90b350133fe786f76fa4d0a3b1de71da5e293fb44ced020107f656ed8f2079b78af9468c7

    • C:\Windows\DBk1\5mtY8xynD0.exe

      Filesize

      222KB

      MD5

      ee3c611f967fdd8851ee4fc221bdf93e

      SHA1

      46510f3c0d6ebd9a0cc9acc7575de48b4d742f5e

      SHA256

      10658ce66569d17333f9906971561baf756782968b668bdde327f843a6fe4d66

      SHA512

      c89b94f9d9c00b4711fe8edf33d7ee1a412f17e6f509f38ce266395c0829483ead7b4f066e09247a623a4859c92addf2a3e9d4ee58beb850523ed7d93cd50992

    • C:\Windows\DBk1\d4sdu.exe

      Filesize

      142KB

      MD5

      dc6cc33dad4b384d48acf2f5481646e0

      SHA1

      d5131a9654e6659b3aae2d20a1ceba307a9e8fb9

      SHA256

      5deb987014348b358c682772d14688587474afd53a62dc322fe469aa8408b913

      SHA512

      160a0797b4b6f5b4aa136fe0b532f9e64c51f41225bf6d1c39265df56d1fe386eb998a4ee456192ba7a29fd5925f6e1fdd181d36e5949946cc5dfc22bb215df3

    • C:\Windows\DBk1\jrS4.exe

      Filesize

      232KB

      MD5

      ba06d28e7a25f562be83c4002a71fbb9

      SHA1

      83ce04bdbdc55e047985ded9907e1431c25abb0d

      SHA256

      4abe302409209a52b23658d51c6521470b8131c53553f42d0d05da87ab5bace3

      SHA512

      4164f1c88fe9cbb35330f0755f155f5d7c7ae67e5eb17b7385a72c44c1493d1ebef50306ce65d0f8db1000774c50b586d248d7e807246e0aad584fc9f046c8a9

    • \??\c:\windows\DBk1\8cCJgEh5.exe

      Filesize

      268KB

      MD5

      dc654e9dedf0ea917fb0953ea155bbb6

      SHA1

      d64a5830c251dd98aa21b6e72bfd9c829909b735

      SHA256

      2504899f223e49eaa584e7f4af14e694d2bab43272bc0a62c9f34ee7c53dd7e1

      SHA512

      26c55f6987438fbbd4e80f781feda0e588f0835201215971caa8318c83453c915001531f93a34c96bcc94eb6139f3b5a944523c39faa4b1c006f72cf50ffea41

    • memory/3468-18-0x0000000000FF0000-0x0000000001017000-memory.dmp

      Filesize

      156KB

    • memory/3572-33-0x0000000000CB0000-0x0000000000D05000-memory.dmp

      Filesize

      340KB

    • memory/3572-16-0x0000000000CB0000-0x0000000000D05000-memory.dmp

      Filesize

      340KB

    • memory/3572-26-0x0000000000CB0000-0x0000000000D05000-memory.dmp

      Filesize

      340KB

    • memory/3952-54-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-58-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-24-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-34-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-35-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-36-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-37-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-38-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-39-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-40-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-41-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-42-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-43-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-44-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-45-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-46-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-47-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-48-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-49-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-50-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-51-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-52-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-53-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-12-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-55-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-56-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-57-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-29-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-59-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-60-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-61-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-62-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-63-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-64-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-65-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-66-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-67-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-68-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-69-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-70-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-71-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-72-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-73-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-74-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-75-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-76-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-77-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-78-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-79-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-80-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-81-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-82-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-83-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-84-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/3952-85-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB