Analysis
-
max time kernel
127s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 21:26
Behavioral task
behavioral1
Sample
0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe
Resource
win7-20230712-en
4 signatures
150 seconds
General
-
Target
0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe
-
Size
1.7MB
-
MD5
e4e84ee523f14902b2e1ce640cb8c686
-
SHA1
109cffce89ed67135a298e85ead5d22c5fd38655
-
SHA256
0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9
-
SHA512
0c1ee01b33de22ec666ab938f1a4a23b89d0eaae03747825a4c19af2146c7ab1a7597c0268f35da137c8c8e57319f1dbd3598af9a224bbaf8a689554140e834c
-
SSDEEP
24576:5RvhW1IVhBqMLyeMHaBFgb8TQYI97puDM2pRbycsFw0i7OVvI9J2G31WYaKnHiP:5RBmek8T2QQ2vucsFw0i7OropaKCP
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/764-45-0x00000000024A0000-0x00000000024B3000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/764-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/764-48-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 764 0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe 764 0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe 764 0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe 764 0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe 764 0e30f289b2896d2814c41dd03329492428f0ff10fe0322ff0e9ba568a962c9e9.exe