Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 11:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe
-
Size
7.3MB
-
MD5
9a886d5832674a83ed312c09410625b1
-
SHA1
c7f23edf4e52b70b52794b5fe68fc88322888d8b
-
SHA256
5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86
-
SHA512
4a07a5b24dce4d2f6ef6e035eb5646ef06b3819563d7fd55c4b08361f4f64d2a365c120f081fa51f6050027b9463ac0b5e63b15e4824603105c728f81b8d7e3e
-
SSDEEP
196608:ZJw+oDkc1GaCDuF9jxMxhiRl7DFBc4bq:A+oDkJKFiyjbb
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral2/memory/2000-8-0x0000000000400000-0x0000000000F63000-memory.dmp family_blackmoon behavioral2/memory/2000-12-0x0000000000400000-0x0000000000F63000-memory.dmp family_blackmoon behavioral2/memory/2000-18-0x0000000000400000-0x0000000000F63000-memory.dmp family_blackmoon behavioral2/memory/2000-20-0x0000000000400000-0x0000000000F63000-memory.dmp family_blackmoon behavioral2/memory/2000-21-0x0000000000400000-0x0000000000F63000-memory.dmp family_blackmoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2000 5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe 2000 5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2000 5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe 2000 5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe"C:\Users\Admin\AppData\Local\Temp\5aa73af1f46c8fb94620c5ad326e534f634deb3c8f166e29ff56970d8b096e86.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2000