Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 16:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a3c46e5254c70_JC.exe
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7a3c46e5254c70_JC.exe
-
Size
6.4MB
-
MD5
7a3c46e5254c70a363b1cac4bb6df99c
-
SHA1
32ec44ad2d71afb1839de877cc294843fceb3496
-
SHA256
9c6cfe60e81454adcd54eafdbfd78f810af26a5889762e1e517aed281be8d6d2
-
SHA512
84073d66443946ac48bf3e86830820bf5aa661267a21889ad9ababf5710827c73cb95ecd7b4aebc33f34303641b4f4d594edf5c25048aeb8347b694289b122e5
-
SSDEEP
98304:CTp+Ri4kmboPYYRnAccWv1lV3gEuaOO1xwTRmIVGxTpce/vxSHuFLOAkGkzdnEVG:Nkmbc3AgV376q/vxSHuFLOyomFHKnPv
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2412-56-0x0000000010000000-0x00000000117BB000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/2412-55-0x0000000010000000-0x00000000117BB000-memory.dmp upx behavioral1/memory/2412-56-0x0000000010000000-0x00000000117BB000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7a3c46e5254c70_JC.exepid process 2412 7a3c46e5254c70_JC.exe 2412 7a3c46e5254c70_JC.exe