Analysis
-
max time kernel
52s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:42
Behavioral task
behavioral1
Sample
PQ1.exe
Resource
win7-20231129-en
4 signatures
60 seconds
General
-
Target
PQ1.exe
-
Size
4.5MB
-
MD5
cb003bbeea2b07a7736ffae165a8563d
-
SHA1
68e2d0168d3c9115f3f47572c8098a564236a1d7
-
SHA256
344247795680662bfc3249718825f42fd5f6250fc4d872b9b01ae761d1500c60
-
SHA512
2e2324fcc0092451eb661ac46bc85d9087b214cc19e764045939bcf69914c3772d882cff6daf458e93b464953b85c8aec92ccca06f01312f979c1adea14ec453
-
SSDEEP
98304:ICpfSpog2Lw8EGMIQt8gUb9m8K6BCpaDuMGCz9HTDK2n0:ICpmOw8J+t8nbc8Ktpa6MH5HPn0
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4160-1-0x0000000000400000-0x000000000097C000-memory.dmp family_blackmoon behavioral2/memory/4160-3-0x0000000000400000-0x000000000097C000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/4160-0-0x0000000000400000-0x000000000097C000-memory.dmp upx behavioral2/memory/4160-1-0x0000000000400000-0x000000000097C000-memory.dmp upx behavioral2/memory/4160-3-0x0000000000400000-0x000000000097C000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
PQ1.exepid process 4160 PQ1.exe