Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe
Resource
win7-20240221-en
General
-
Target
c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe
-
Size
11.6MB
-
MD5
58b618c282892c058f1763158565e58b
-
SHA1
fe6f24f9ffe31b35b8800fe14a1caebac5b225e3
-
SHA256
c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0
-
SHA512
eee434f6890ea722259e8b758b3944190f53a0ddd2f246d75482390fe0bafe34f28927c8bf75d93b468efe6439ea409f148f4cdedf6d88cc691a66b95182e477
-
SSDEEP
196608:jwgKTiEsbyVJVCpBHY8RchssmUBVPLn+YSLgOQQabVmkO1oVmHRan7e1:8b8yVTCNGFmUjnWC5FOPxcC1
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3188-11-0x0000000000400000-0x0000000001855000-memory.dmp family_blackmoon behavioral2/memory/3188-12-0x0000000000400000-0x0000000001855000-memory.dmp family_blackmoon behavioral2/memory/3188-13-0x0000000000400000-0x0000000001855000-memory.dmp family_blackmoon behavioral2/memory/3188-14-0x0000000000400000-0x0000000001855000-memory.dmp family_blackmoon behavioral2/memory/3188-16-0x0000000000400000-0x0000000001855000-memory.dmp family_blackmoon behavioral2/memory/3188-17-0x0000000000400000-0x0000000001855000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/3188-15-0x0000000003B70000-0x0000000003BA6000-memory.dmp upx behavioral2/memory/3188-18-0x0000000003B70000-0x0000000003BA6000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exepid process 3188 c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe 3188 c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exepid process 3188 c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe 3188 c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe"C:\Users\Admin\AppData\Local\Temp\c86b89cc6492930514b8ae3ec7c9daf8e121598094adee97c78bb883dd9dccf0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3188-3-0x00000000019F0000-0x00000000019F1000-memory.dmpFilesize
4KB
-
memory/3188-7-0x0000000001A70000-0x0000000001A71000-memory.dmpFilesize
4KB
-
memory/3188-6-0x0000000001A50000-0x0000000001A51000-memory.dmpFilesize
4KB
-
memory/3188-11-0x0000000000400000-0x0000000001855000-memory.dmpFilesize
20.3MB
-
memory/3188-5-0x0000000001A40000-0x0000000001A41000-memory.dmpFilesize
4KB
-
memory/3188-4-0x0000000001A30000-0x0000000001A31000-memory.dmpFilesize
4KB
-
memory/3188-2-0x00000000006E1000-0x0000000000CC2000-memory.dmpFilesize
5.9MB
-
memory/3188-1-0x00000000019E0000-0x00000000019E1000-memory.dmpFilesize
4KB
-
memory/3188-0-0x00000000019C0000-0x00000000019C1000-memory.dmpFilesize
4KB
-
memory/3188-12-0x0000000000400000-0x0000000001855000-memory.dmpFilesize
20.3MB
-
memory/3188-13-0x0000000000400000-0x0000000001855000-memory.dmpFilesize
20.3MB
-
memory/3188-14-0x0000000000400000-0x0000000001855000-memory.dmpFilesize
20.3MB
-
memory/3188-15-0x0000000003B70000-0x0000000003BA6000-memory.dmpFilesize
216KB
-
memory/3188-16-0x0000000000400000-0x0000000001855000-memory.dmpFilesize
20.3MB
-
memory/3188-17-0x0000000000400000-0x0000000001855000-memory.dmpFilesize
20.3MB
-
memory/3188-18-0x0000000003B70000-0x0000000003BA6000-memory.dmpFilesize
216KB
-
memory/3188-19-0x00000000006E1000-0x0000000000CC2000-memory.dmpFilesize
5.9MB