Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/05/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
sgiusd表格文件dhu2 .exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
sgiusd表格文件dhu2 .exe
-
Size
294KB
-
MD5
358e8aca62af3968c2468ea48ab51666
-
SHA1
f56a9aeac008bbb6b7f55ab2724fb62ecf7141cf
-
SHA256
b71ed1f09e16ce89c7ea9b64feba1e8d39b8103191062ec3f85dc8a689ac3525
-
SHA512
c930f4d75ec28cbb3284e94133c727bd4dd3dc55ba1fc765b5c7bfd1a910289eec6e66345b936713f3ccb079675a137f6ddc941d15a678c1c85e6d71499d0f63
-
SSDEEP
6144:CDm7mfz+SOkynqxlZw3wWTEYZvjBNbGagbE567V9KKSwhOg:CDm7W+WpHZw3wYlZvNwK6B9K3w3
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/1952-0-0x00000000003B0000-0x00000000003DE000-memory.dmp family_blackmoon behavioral1/memory/1952-1-0x00000000003B0000-0x00000000003DE000-memory.dmp family_blackmoon -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1952 sgiusd表格文件dhu2 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 sgiusd表格文件dhu2 .exe