Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
LeoMoon CPU-V.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
LeoMoon CPU-V.exe
Resource
win10v2004-20230703-en
General
-
Target
LeoMoon CPU-V.exe
-
Size
1.5MB
-
MD5
af757df1cf001bb6dabc6f50761df70c
-
SHA1
d2eb3bd455df43503dbef2728dab9861c4dabfdc
-
SHA256
3c2c79738c6eea93535057a49c8f7d2236fc4866e1a2ab97c4f8ba0b7723ce4f
-
SHA512
c66879f92ea9797057c57998e55c05ab05ccf0c35d460c030e1c16af5c24156fa81ccce8a0636c54723e797d8cc68c1a351aaaa6518aea5ffb7863c0c64e3ff4
-
SSDEEP
49152:7TvC/MTQYxsWR7a5/Z7mL9msPkNqbAMMMg:vjTQYxsWRCmnknMMMg
Malware Config
Signatures
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:{impersonationLevel=Impersonate}!\root\cimv2 LeoMoon CPU-V.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3720 LeoMoon CPU-V.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5c324caacf1859269a6d0e7465644891d
SHA13b962eeebdcad3f99d1d74d417186b9e24417d84
SHA25662cce2c15b1b06e3f7cc89c6707b437b010163d93ece7d40c349103d097987fb
SHA51251a631092201de03e144e9a7112ae0af095379c9139fc309a043f8b71e593453230ba75d2089be82c59e5a62d353b0dc2294d850d42645d398e9e6ac08c238d7
-
Filesize
11KB
MD571aeb97dda8b98fb3dd0eccde3610b73
SHA148dbad3303ffc7814a8e1c5962f3058f0b298257
SHA256ba2267e8aa29108d63fd826e1fd3481bf905b4f1ec6f5de87ecce49378f8dc5b
SHA512317ff8c725a72ed8d9f065b8e78c62193bae3a66d4ac8f7e163f04fb5b26ce98b6343639dd5d91481a9f44fdc49ea350baf7947858425b250c18a4d00c59b3fe