Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-03-2023 12:39
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
415KB
-
MD5
8c456071f65a494d6ffc4cf3c22465b9
-
SHA1
34de7eef30cab988b7d3b8c1b54ec19fe2988b33
-
SHA256
7491116404ca737831c8b970495d601a657bd508bbcb2c2d3e8b811ec117d72c
-
SHA512
fe7019939313bbd47ef5a53c6281835e922cc68bb985ae2b6dbe80715597c03305065a985574792098f3f92144f514035a8f6537dbfb18e647f7197007305f65
-
SSDEEP
6144:LwF71LiF/jPwhlJg7Qm7Md8sLGmKgirZHMiZyQzMrAXdFRn8BMJ87NnlFL7JMR8I:LQ12ihl47MdFGJgi5tZT4rsrApn33OW
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1632-97-0x0000000000400000-0x0000000000592000-memory.dmp family_blackmoon behavioral1/memory/1632-99-0x0000000000400000-0x0000000000592000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/1632-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-97-0x0000000000400000-0x0000000000592000-memory.dmp upx behavioral1/memory/1632-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1632-99-0x0000000000400000-0x0000000000592000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 1632 tmp.exe Token: SeDebugPrivilege 1632 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
tmp.exepid process 1632 tmp.exe