Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 20:21
Behavioral task
behavioral1
Sample
c8d104a9fbf894becdddabaac05f337c095356f029a906640d7f78e16cb00afb.exe
Resource
win7-20240419-en
windows7-x64
4 signatures
150 seconds
General
-
Target
c8d104a9fbf894becdddabaac05f337c095356f029a906640d7f78e16cb00afb.exe
-
Size
952KB
-
MD5
e5124377d40a3fad7f5f49573c534dbc
-
SHA1
0ffadf46b686118358d0be577157ddbacf63c2f0
-
SHA256
c8d104a9fbf894becdddabaac05f337c095356f029a906640d7f78e16cb00afb
-
SHA512
54282840ef311d18bb978dbdf0f9ead89a4bb864d0eeb97900982383c263d884cc51f7533554d507d577ac28a9527f61942f2e272e9e6bd5527d524c1027495b
-
SSDEEP
12288:OPZPhbnG+t5ATcbSDh4akGhWvPPrmnrCItW5Zyhc7nOv6jNFqn0ZiCI8r:OvGaIONakD3jmlUj5z9o7O
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2748-3-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-2-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-0-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-49-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-37-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-50-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-51-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-52-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-54-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-55-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-56-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-57-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-58-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-59-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-60-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-61-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-62-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-63-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon behavioral1/memory/2748-64-0x0000000000400000-0x000000000064B000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/2748-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-13-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2748 c8d104a9fbf894becdddabaac05f337c095356f029a906640d7f78e16cb00afb.exe 2748 c8d104a9fbf894becdddabaac05f337c095356f029a906640d7f78e16cb00afb.exe 2748 c8d104a9fbf894becdddabaac05f337c095356f029a906640d7f78e16cb00afb.exe