Analysis
-
max time kernel
25s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 15:06
Behavioral task
behavioral1
Sample
05f9674f369397c9c67a8541407296c86c0aed2a26d2733fa3ffe9a256ad37db.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
05f9674f369397c9c67a8541407296c86c0aed2a26d2733fa3ffe9a256ad37db.exe
-
Size
484KB
-
MD5
265f9744bc871ecbac1f576b53fc4b70
-
SHA1
2e28afaff34a36af22c4081473ddd67e22da2b22
-
SHA256
05f9674f369397c9c67a8541407296c86c0aed2a26d2733fa3ffe9a256ad37db
-
SHA512
4242273ac84ceaa19dba0e98868739d04dd0a3c29c43007d8ad3bcd72173536e9544685097b1bb619d52ffb9707b8189f9991122931c62efdc8074e2499bfab8
-
SSDEEP
12288:m667NO5rh27dVAxZfIjpXxgBLeE8tRc5kDUkLLwbpcRGI:mB7E5VcQZf82hezc5ZkLLwbmb
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/1580-1-0x0000000000400000-0x00000000004EA000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/1580-0-0x0000000000400000-0x00000000004EA000-memory.dmp upx behavioral1/memory/1580-1-0x0000000000400000-0x00000000004EA000-memory.dmp upx -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zunlan 05f9674f369397c9c67a8541407296c86c0aed2a26d2733fa3ffe9a256ad37db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zunlan\Errortext = "bwAAAAa9BY/XXg2wEl0vE1GPAlikJl717E2LWgFaexVYejo8G7T00HgbRQAAABU=" 05f9674f369397c9c67a8541407296c86c0aed2a26d2733fa3ffe9a256ad37db.exe