Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2023 20:07
Behavioral task
behavioral1
Sample
f8d45865942239cc5f6ae965da4db996657c63f85f45376a07d52431785eb79e.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f8d45865942239cc5f6ae965da4db996657c63f85f45376a07d52431785eb79e.exe
-
Size
785KB
-
MD5
68d245d303e5b95d0d46ef024c8b1cb0
-
SHA1
6ad709c325bf78ffc93ac3176b06cbcdddd78808
-
SHA256
f8d45865942239cc5f6ae965da4db996657c63f85f45376a07d52431785eb79e
-
SHA512
ba65d2d932671f8310be3df31115a254ee18fbeec338b3d8d09a53bb9db2a55ac1cb931b570f2292912200a728308656ce59236fe4973a7eb57793c85c2883a8
-
SSDEEP
12288:d6IZNik0eAMp0PpXcD0pvkbLu/NMI9btnZJ+8UCgH:pok0e1peQ0pvkPu/NM+n1
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/4112-135-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-134-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-136-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-140-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-141-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-142-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-143-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-144-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-145-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-146-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-147-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-148-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-149-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-150-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-151-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-152-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon behavioral2/memory/4112-153-0x0000000000400000-0x000000000061D000-memory.dmp family_blackmoon -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f8d45865942239cc5f6ae965da4db996657c63f85f45376a07d52431785eb79e.exepid process 4112 f8d45865942239cc5f6ae965da4db996657c63f85f45376a07d52431785eb79e.exe 4112 f8d45865942239cc5f6ae965da4db996657c63f85f45376a07d52431785eb79e.exe