Analysis
-
max time kernel
129s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 02:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe
Resource
win7-20240508-en
7 signatures
150 seconds
General
-
Target
f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe
-
Size
9.4MB
-
MD5
1e13a2c8658c586222fc60facdc50e19
-
SHA1
b695c2cf8beb572fb2783742298b62d1a034efae
-
SHA256
f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077
-
SHA512
e490daf6063068f3fb27372d857c3d51677f4d744982a4a8d5e0fd3b3444287e5d67b91623baa16f21267262148ec0c5c5b4a27b54fbb37f90ef054356c702c3
-
SSDEEP
196608:R7bREPzZXyZ+n25iBtIzqNwmpOdRTK6lr3fimWDLlEQVZbtV:R7bSPzZCZaI4ImSg0xlZW3XZb
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral2/memory/2156-12-0x0000000000400000-0x0000000001BC1000-memory.dmp family_blackmoon behavioral2/memory/2156-13-0x0000000000400000-0x0000000001BC1000-memory.dmp family_blackmoon behavioral2/memory/2156-17-0x0000000000400000-0x0000000001BC1000-memory.dmp family_blackmoon behavioral2/memory/2156-18-0x0000000000400000-0x0000000001BC1000-memory.dmp family_blackmoon behavioral2/memory/2156-20-0x0000000000400000-0x0000000001BC1000-memory.dmp family_blackmoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1504 2156 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe 2156 f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe"C:\Users\Admin\AppData\Local\Temp\f7e42a889c38d190fe6ab19b6b2fe5214faaa6d7358906f4dffdd9ef32a60077.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 10722⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2156 -ip 21561⤵PID:1120