Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 08:30
Behavioral task
behavioral1
Sample
3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
General
-
Target
3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe
-
Size
2.5MB
-
MD5
8051fdc91b7540944dae23776ad1f0d6
-
SHA1
2ae92a8ccc15e7443149495b89d1f335a39b3298
-
SHA256
3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29
-
SHA512
6904675edaab6d200fd99ca7ac9c3e1d000f577c5d5cb7ece388389873ac594d24a89b9d982fdd5c3d4ab6ad335d35db54a9471c4e777d04483b1f8cb64f8687
-
SSDEEP
49152:ZXgDaJFfhSU0Nmpm8006rYzhU0H3AGM2BnQ/cHBPv1ruxM:Zv5ImELzr8hTwKzZ1E
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/4432-1-0x0000000000400000-0x0000000000791000-memory.dmp family_blackmoon behavioral2/memory/4432-2-0x0000000000400000-0x0000000000791000-memory.dmp family_blackmoon behavioral2/memory/4432-3-0x0000000000400000-0x0000000000791000-memory.dmp family_blackmoon behavioral2/memory/4432-5-0x0000000000400000-0x0000000000791000-memory.dmp family_blackmoon -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4432 3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe"C:\Users\Admin\AppData\Local\Temp\3074deea2130d266588503aa3d214928ab1ec0ba330a014152b14dd0fe1e5c29.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:4432