Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-10-2023 06:59
Behavioral task
behavioral1
Sample
fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe
Resource
win7-20230831-en
General
-
Target
fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe
-
Size
4.3MB
-
MD5
2fa71a120e9581d30a0fae98815a0940
-
SHA1
57e7c5ca6534e6f9dfafc47753ff7ab5ac419f9c
-
SHA256
fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d
-
SHA512
b4bacb6bb41dcd169043ecb28a2f3711cf84cfc0c2fe5541d4cff04548d34479cf559ef6ba36530949707ca76ae99051947f0341333627ca73bc28fba2d639d2
-
SSDEEP
98304:ZiSKMbPs4ZcvDXGsUgG1/Q/g+ZmiPDC+kAE:TGDZHFg+ZTrnkJ
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2412-4-0x0000000002AA0000-0x0000000002B54000-memory.dmp family_blackmoon behavioral1/memory/2412-21-0x0000000002AA0000-0x0000000002B54000-memory.dmp family_blackmoon -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe 2412 fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe"C:\Users\Admin\AppData\Local\Temp\fcf8b274dd864065afd2e39d96dde5a967b7f7fe62b21698e7c945429a35d52d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD5750d1e62d281091d5120890a82eb2542
SHA1159dbe6b56d8f9fd6457d4c3f4d5bdcd58078c28
SHA256e478f0b3c195f14daaf4982550f0d68ca64f12588ee993c9d1644effc095233e
SHA512100497c5d8d05fdff91a905f6836597131f4b3bda303f6e63b7ab894b9a5da1a77320357ce8fb56237ca6f966fc60153df2a3ab7ed0924ec3f15ff8b580daa5e