Analysis
-
max time kernel
141s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 05:39
Behavioral task
behavioral1
Sample
Nu1.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
Nu1.exe
-
Size
4.5MB
-
MD5
97f60a83a6a9a2507eb6fb3175a03804
-
SHA1
d7efc2bf9f0c63b8259cbb1be7739bcc36b9a44d
-
SHA256
d6fbec3011306520d888e0a3f8e91b982cd10ee0b711970197ed2d05433bb3ed
-
SHA512
c8934140f4f0a2e8ca6c992f980168a5cbbb2d335812ac9bf1b5638fe66f256d9aa5d6b8b76cc05cf1c43d44cdffce8869e6d22f0a92315f5063e1aa9f9b9ce6
-
SSDEEP
98304:xraZu0na7kEEgrO9au4GwrckswBW1OqQsRv2U6jbN4Jca69ttKisVlbPGBNt:x8u0a7kEEgr8aptQrOdGvO4J8tKiURuB
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3484-1-0x0000000000400000-0x000000000097C000-memory.dmp family_blackmoon behavioral2/memory/3484-3-0x0000000000400000-0x000000000097C000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/3484-0-0x0000000000400000-0x000000000097C000-memory.dmp upx behavioral2/memory/3484-1-0x0000000000400000-0x000000000097C000-memory.dmp upx behavioral2/memory/3484-3-0x0000000000400000-0x000000000097C000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Nu1.exepid process 3484 Nu1.exe