Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
c0ce35fff000de18c1922abd07dfa15dcf1b454f9731f1dbc54b4dacce10372c.exe
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
c0ce35fff000de18c1922abd07dfa15dcf1b454f9731f1dbc54b4dacce10372c.exe
-
Size
346KB
-
MD5
4380c94ac08b875164099bf823718977
-
SHA1
6e2c02f8f7239db3457a99922e7bf0debe7e7a34
-
SHA256
c0ce35fff000de18c1922abd07dfa15dcf1b454f9731f1dbc54b4dacce10372c
-
SHA512
ef06913d1179795201cb7525ab31022a7c2505d23edfc385f0fd2f04fd7547b45a831f3b09d7877d2d31d7f8e81c15e1fe5500ecb36b25a1e0326f8f2afc6a23
-
SSDEEP
6144:xbyPoGLeYLNQW6edPkQNDyECguGYzEcDiryKyGbG+0zJ7QljOsO8VfVxc9UpIlry:xyPPLn76alN3B7YzRDe4GarJ7QljR1Vv
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2028-55-0x0000000000400000-0x0000000000558000-memory.dmp family_blackmoon behavioral1/memory/2028-57-0x0000000000400000-0x0000000000558000-memory.dmp family_blackmoon behavioral1/memory/2028-58-0x0000000000400000-0x0000000000558000-memory.dmp family_blackmoon -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2028 c0ce35fff000de18c1922abd07dfa15dcf1b454f9731f1dbc54b4dacce10372c.exe 2028 c0ce35fff000de18c1922abd07dfa15dcf1b454f9731f1dbc54b4dacce10372c.exe