Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2023 19:30
Behavioral task
behavioral1
Sample
f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe
-
Size
786KB
-
MD5
78014f73e8e8dcc028a618e4cb4435f7
-
SHA1
b5477af280460bf5abaca216316ecbcba1182514
-
SHA256
f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f
-
SHA512
b6fb5ff57a8312408aff393c4ccbef66aac23dbf405aa98f82cbea2a4882cf954d5d49ef8c8aa0f76b92922c9aae40f82460098dda156cc23bf76f83c96f5864
-
SSDEEP
12288:qwB2jOZqGbhqjW35Wb2xS94JZX0N3/5mTGPB5KZJ+8UCgH:1SOZqK351Y94JZX09/5mm5K1
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/2700-135-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-136-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-134-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-140-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-141-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-142-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-143-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-144-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-145-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-146-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-147-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-148-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-149-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-150-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-151-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-152-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/2700-153-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exepid process 2700 f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe 2700 f13b006f2ffc415ebe4648a8740235c27ee2ff6764050aba4de3bc224c42f88f.exe