Analysis
-
max time kernel
119s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:56
Behavioral task
behavioral1
Sample
cede6ac238893e42da9d3df998429d991ff02cdcd018f7de4e7b379c3d5fdc6a.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
cede6ac238893e42da9d3df998429d991ff02cdcd018f7de4e7b379c3d5fdc6a.exe
-
Size
84KB
-
MD5
bc6da13176887a094ff712a2e2a58ba4
-
SHA1
e67aff93f62eaf757b3167d86936cb71d653c8cf
-
SHA256
cede6ac238893e42da9d3df998429d991ff02cdcd018f7de4e7b379c3d5fdc6a
-
SHA512
555a7898693be4d4c5b265a6ed14656515efafd1f03beeb248e6aafafe3638095d39d5eb60589f74b5ca46a2fd835f182ca54ed0e1ad600c53098b57f57ed016
-
SSDEEP
1536:qZye8psDhdvoYIflDvf+RBe50UE8Feu6JsuDTpU0WyTwJg:6vdvYlDvWRBeiUDTBwVU0H8O
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/3372-1-0x0000000000400000-0x0000000000454000-memory.dmp family_blackmoon behavioral1/memory/3372-3-0x0000000000400000-0x0000000000454000-memory.dmp family_blackmoon behavioral1/memory/3372-5-0x0000000000400000-0x0000000000454000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/3372-0-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3372-1-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3372-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/3372-5-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3372 cede6ac238893e42da9d3df998429d991ff02cdcd018f7de4e7b379c3d5fdc6a.exe