Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 13:06
Behavioral task
behavioral1
Sample
3c116ca915fc6f79ca2f2a9c5bccadd6880481be73b20b39244474ce45de5f8c.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3c116ca915fc6f79ca2f2a9c5bccadd6880481be73b20b39244474ce45de5f8c.exe
-
Size
5.6MB
-
MD5
daca548db4d2704a5e7d761935ca2059
-
SHA1
c511e7d9139fd5c444096a92b5e493ccedf8c5f5
-
SHA256
3c116ca915fc6f79ca2f2a9c5bccadd6880481be73b20b39244474ce45de5f8c
-
SHA512
a8b10c151ab8ce816dd28cb488f86c50c5eb5d23b7ce7292a92d782f2c649f7714c2a314c852a452d818b5e7838b91492280d7be3e1a276437875ba67d13e5b6
-
SSDEEP
98304:BnTQ1u4sWhuZ0j+wFyra4m5Yzy57pG6fTjRjz/gehMN+dzjv0GBRFtX1cwOFbMq5:BnTh4skuZU+Za1H57zp/ghEzjv0G56IA
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2184-1-0x0000000000400000-0x00000000018B7000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/2184-0-0x0000000000400000-0x00000000018B7000-memory.dmp upx behavioral1/memory/2184-1-0x0000000000400000-0x00000000018B7000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3c116ca915fc6f79ca2f2a9c5bccadd6880481be73b20b39244474ce45de5f8c.exepid process 2184 3c116ca915fc6f79ca2f2a9c5bccadd6880481be73b20b39244474ce45de5f8c.exe