Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 22:34
Static task
static1
Behavioral task
behavioral1
Sample
98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe
Resource
win7-20230831-en
General
-
Target
98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe
-
Size
3.9MB
-
MD5
d967948bd5c7ce06294efbb62a7d0eb4
-
SHA1
82a98715d1bbf834bcf9f94adadf86d17c2ac410
-
SHA256
98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84
-
SHA512
91287cd752a271aa57bc5c3913e64cf41d23f655a2524b4b1d57bf176acc5b08e0402363359065cd35de63b939903a54969bfa5590f74f6e6e6bb5fc7111e0f8
-
SSDEEP
49152:T1fScVOBk4woL1GucqSDksBOFcTI+EYAAgs2HI5jO8NeFB7daOYKM:xfJVOBk4wCGASDBO+EQgtcIP
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/4196-52-0x0000000002DF0000-0x000000000306D000-memory.dmp family_blackmoon behavioral2/memory/4196-54-0x0000000002DF0000-0x000000000306D000-memory.dmp family_blackmoon behavioral2/memory/4196-57-0x0000000002DF0000-0x000000000306D000-memory.dmp family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023085-48.dat acprotect behavioral2/files/0x0007000000023085-46.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 4196 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe 4196 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe -
resource yara_rule behavioral2/memory/4196-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/files/0x0007000000023085-48.dat upx behavioral2/files/0x0007000000023085-46.dat upx behavioral2/memory/4196-51-0x0000000002DF0000-0x000000000306D000-memory.dmp upx behavioral2/memory/4196-52-0x0000000002DF0000-0x000000000306D000-memory.dmp upx behavioral2/memory/4196-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4196-54-0x0000000002DF0000-0x000000000306D000-memory.dmp upx behavioral2/memory/4196-57-0x0000000002DF0000-0x000000000306D000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4196 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe 4196 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe 4196 98ce2617736d98ead85881e39816ec9745b66c874c3b76ed8e84952839432f84.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5aff289b05070a41980c4f76447fb3ea1
SHA15740990a555639ccc9002d1f71825d2508d9c10e
SHA256757bfccbf0a50cada6289bbf77cdce9bb7bcc3d91140aeedc37799933dbfa87d
SHA5120b3d60943f0713ce32e4623988868baf0b268982a9a3445932c7b9aa41b7ecc94ede9059ed764e18e7f9e44135c7a22a2278d3f6b4fe0d60fc7b67463e5dce84
-
Filesize
109KB
MD5aff289b05070a41980c4f76447fb3ea1
SHA15740990a555639ccc9002d1f71825d2508d9c10e
SHA256757bfccbf0a50cada6289bbf77cdce9bb7bcc3d91140aeedc37799933dbfa87d
SHA5120b3d60943f0713ce32e4623988868baf0b268982a9a3445932c7b9aa41b7ecc94ede9059ed764e18e7f9e44135c7a22a2278d3f6b4fe0d60fc7b67463e5dce84