Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 23:45
Behavioral task
behavioral1
Sample
93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c.exe
Resource
win7-20230712-en
5 signatures
150 seconds
General
-
Target
93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c.exe
-
Size
863KB
-
MD5
9e7929a9d0c06b563ebfdaae9b85a42b
-
SHA1
db1c04f5feab8a94dacf460d09358c949928c76f
-
SHA256
93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c
-
SHA512
7ef0e3f101cb01847c8e5154815b3d3f18c2dea17ff5b7f25b294c8b776c646d3a2d02b41733c6dd8a5c91173ab90002467dcb6c68c02750c0d1842ab19f71d8
-
SSDEEP
24576:Bo/Ut+yo31LrQCC40VNA28Gu2LMId7xPcQDCXPOIsxhN:Buhyo313Qd4F+ueZc6CXPOrxhN
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2480-0-0x0000000000400000-0x00000000006D5000-memory.dmp family_blackmoon behavioral1/memory/2480-6-0x0000000000400000-0x00000000006D5000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/2480-0-0x0000000000400000-0x00000000006D5000-memory.dmp upx behavioral1/memory/2480-6-0x0000000000400000-0x00000000006D5000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\libexdui.dll 93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2480 93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c.exe 2480 93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c.exe 2480 93b5bc908b2e18d7176ba2090ed2ac190ff853de08c5b37bb55e55b9fa43905c.exe