Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 16:58
Static task
static1
Behavioral task
behavioral1
Sample
7a3c46e5254c70_JC.exe
Resource
win7-20230712-en
General
-
Target
7a3c46e5254c70_JC.exe
-
Size
6.4MB
-
MD5
7a3c46e5254c70a363b1cac4bb6df99c
-
SHA1
32ec44ad2d71afb1839de877cc294843fceb3496
-
SHA256
9c6cfe60e81454adcd54eafdbfd78f810af26a5889762e1e517aed281be8d6d2
-
SHA512
84073d66443946ac48bf3e86830820bf5aa661267a21889ad9ababf5710827c73cb95ecd7b4aebc33f34303641b4f4d594edf5c25048aeb8347b694289b122e5
-
SSDEEP
98304:CTp+Ri4kmboPYYRnAccWv1lV3gEuaOO1xwTRmIVGxTpce/vxSHuFLOAkGkzdnEVG:Nkmbc3AgV376q/vxSHuFLOyomFHKnPv
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3092-138-0x0000000010000000-0x00000000117BB000-memory.dmp family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Gods.dll acprotect -
Loads dropped DLL 1 IoCs
Processes:
7a3c46e5254c70_JC.exepid process 3092 7a3c46e5254c70_JC.exe -
Processes:
resource yara_rule C:\Gods.dll upx behavioral2/memory/3092-137-0x0000000010000000-0x00000000117BB000-memory.dmp upx behavioral2/memory/3092-138-0x0000000010000000-0x00000000117BB000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7a3c46e5254c70_JC.exepid process 3092 7a3c46e5254c70_JC.exe 3092 7a3c46e5254c70_JC.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
881KB
MD57f195f4097a5b7ad55bd2df8d464a6ce
SHA1e56ff1fb5bd95b518aaa041c10255f807a181ce4
SHA256f2b5da37af92c681a2ae585cfeef0fabb87093c7189a13c75a9812bbc995c844
SHA512c8a998df4b680a19ac16ebe67ceaf86173f5845f89d0e3ffb01547fa31075b2723c236f870690f9b688fd3c5f6b331f4672c2b1da591d6e30f25ef01f2a41bfb