Analysis
-
max time kernel
74s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02-06-2024 00:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1992cf9a67fb4425.exe
Resource
win10-20240404-en
windows10-1703-x64
5 signatures
600 seconds
Behavioral task
behavioral2
Sample
1992cf9a67fb4425.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
600 seconds
Behavioral task
behavioral3
Sample
1992cf9a67fb4425.exe
Resource
win11-20240508-en
windows11-21h2-x64
4 signatures
600 seconds
General
-
Target
1992cf9a67fb4425.exe
-
Size
337KB
-
MD5
50280002e4fde1433c6c80a1178c2774
-
SHA1
27b3a07a5dd9edaeb7f3379e2fd023f72f779586
-
SHA256
d9aab9d934e3cce61759da398a607b7a2280b592269cae62a4ca2530b5bf4833
-
SHA512
8b9d2b96c7d4362d75656e108e7809d6bcad083f978a9b8d3aae00eedab029bffbbd03b756afc8c4a984d37f2a97361e99cac0f6e724cfa2b82f448949073271
-
SSDEEP
6144:udxWxRzGrfgHtJ7Z1taVeEL0BJDYaS76Faf/1rGbqjSSmjeP:udURzhbftA4HsaS7x/JGb1SmCP
Score
10/10
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/1936-3-0x0000000000400000-0x0000000000552000-memory.dmp family_blackmoon behavioral1/memory/1936-7-0x0000000000400000-0x0000000000552000-memory.dmp family_blackmoon -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1992cf9a67fb4425.exe 1992cf9a67fb4425.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\1992CF9A67FB4425.EXE 1992cf9a67fb4425.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Control Panel\Desktop 1992cf9a67fb4425.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Control Panel\Desktop\LanguageConfiguration 1992cf9a67fb4425.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1936 1992cf9a67fb4425.exe Token: SeRestorePrivilege 1936 1992cf9a67fb4425.exe