Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2023 19:15
Behavioral task
behavioral1
Sample
f61798e822a1f5e2185cd19063967042d0b9aeffe0f05119d41e7c7ddebbe3c2.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f61798e822a1f5e2185cd19063967042d0b9aeffe0f05119d41e7c7ddebbe3c2.exe
-
Size
785KB
-
MD5
52570d69c17a305934a4955dc880ea28
-
SHA1
e23096111436eccee4b562a2d787f19140d2cb5e
-
SHA256
f61798e822a1f5e2185cd19063967042d0b9aeffe0f05119d41e7c7ddebbe3c2
-
SHA512
84f55e676610ec25e0f0af28db3775205c7695f2aea405f06a505876115becca542ff9359a00193218e205e65223fe15a92d6ccc1117ce84f53d5336c4362d80
-
SSDEEP
12288:C6mPprWUiYhvqJKUk8ItiaCmQu/7CMtvp0UCgH:grWUimyJe8QXCTu/7CMtvG
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/2000-134-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-135-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-136-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-140-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-141-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-142-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-143-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-144-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-145-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-146-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-147-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-148-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-149-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-150-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-151-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-152-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon behavioral2/memory/2000-153-0x0000000000400000-0x000000000061C000-memory.dmp family_blackmoon -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f61798e822a1f5e2185cd19063967042d0b9aeffe0f05119d41e7c7ddebbe3c2.exepid process 2000 f61798e822a1f5e2185cd19063967042d0b9aeffe0f05119d41e7c7ddebbe3c2.exe 2000 f61798e822a1f5e2185cd19063967042d0b9aeffe0f05119d41e7c7ddebbe3c2.exe