Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
29/10/2023, 18:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe
Resource
win7-20231020-en
4 signatures
150 seconds
General
-
Target
f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe
-
Size
742KB
-
MD5
5ec4a9cc8d41914236a09f83e6068f71
-
SHA1
ebce39e812bec1c509393caca2f700870e3ec186
-
SHA256
f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9
-
SHA512
8b87a70b678bbf6b484997224ac149dbacc826d3b365dd0be19d1d5801c9a637758902fd51c17377694f1054feb39a3fa897119d6b8d8a9e0f47157e3bb3495f
-
SSDEEP
12288:0dpD5zKw9T46uOSRCVCLeXyZJvf2g8zs2+go5q5qvu7f9LaOwb9L9fmUQo5K:0dpDNKwB5utwVRMJvu3ABgoI5/iL9fm7
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
resource yara_rule behavioral1/memory/2376-1-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-15-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-16-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-17-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-18-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-19-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-20-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-21-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-22-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-23-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-24-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-25-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-26-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-27-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-28-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-29-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon behavioral1/memory/2376-30-0x0000000000400000-0x00000000005CD1AD-memory.dmp family_blackmoon -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2376 f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe 2376 f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe 2376 f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe 2376 f5d7f3526905c490e20e5341e0ced82b5e405869ceccfecfcfe88506cee94ba9.exe