Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 23:14
Behavioral task
behavioral1
Sample
27aeda6aade8846f8f575576b81818044352142819ab45f5f683f0340357277b.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
27aeda6aade8846f8f575576b81818044352142819ab45f5f683f0340357277b.exe
-
Size
4.8MB
-
MD5
ecceab2016b2dd72a91e6fd6beda9922
-
SHA1
d69bc5f256b4b395b66d8aee049ac7e13b4a65b4
-
SHA256
27aeda6aade8846f8f575576b81818044352142819ab45f5f683f0340357277b
-
SHA512
73c911f431dd10ca44952814762cb96f7ecafbe89792a06da17cac91ade4abb95537579fc1fa503607aad8af83023f02b7c0e15bfe4363fd5be9ac1f3fe6308e
-
SSDEEP
98304:BnTQ1u4sWhuZ0j+wFyra4m5Yzy57pG6fTjRjz/gehMN+dzjvE:BnTh4skuZU+Za1H57zp/ghEzjvE
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1740-1-0x0000000000400000-0x00000000018B7000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/1740-0-0x0000000000400000-0x00000000018B7000-memory.dmp upx behavioral1/memory/1740-1-0x0000000000400000-0x00000000018B7000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
27aeda6aade8846f8f575576b81818044352142819ab45f5f683f0340357277b.exepid process 1740 27aeda6aade8846f8f575576b81818044352142819ab45f5f683f0340357277b.exe