Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 22:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe
-
Size
3.9MB
-
MD5
d967948bd5c7ce06294efbb62a7d0eb4
-
SHA1
82a98715d1bbf834bcf9f94adadf86d17c2ac410
-
SHA256
98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84
-
SHA512
91287cd752a271aa57bc5c3913e64cf41d23f655a2524b4b1d57bf176acc5b08e0402363359065cd35de63b939903a54969bfa5590f74f6e6e6bb5fc7111e0f8
-
SSDEEP
49152:T1fScVOBk4woL1GucqSDksBOFcTI+EYAAgs2HI5jO8NeFB7daOYKM:xfJVOBk4wCGASDBO+EQgtcIP
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/1376-55-0x0000000002980000-0x0000000002BFD000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/1376-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-51-0x0000000002980000-0x0000000002BFD000-memory.dmp upx behavioral1/memory/1376-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1376-55-0x0000000002980000-0x0000000002BFD000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1376 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe 1376 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe 1376 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe