Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 09:30
Behavioral task
behavioral1
Sample
b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe
-
Size
13.2MB
-
MD5
b6e081ba084c6b4cc7840554729e9c84
-
SHA1
699f38e2a7503242d1329726fb9133e196d8bec4
-
SHA256
b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690
-
SHA512
8a42b7ffd3c75273eff9172a1b149cb6988883948bd71a0f11e53d45c3f5f841cdaf4fffae28cbe761c24214114d1b4924e0bcc28b37ca2c7a5521885d4377fe
-
SSDEEP
196608:W2TEKrPk/nY2L73dUXnEK9KW9J/Rn8ZbEvtmImY0jjhyq0ShCoWJSB:Pz2pX32Xn7kW93CuNr0HysgM
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/3164-27-0x0000000010000000-0x00000000111C3000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/3164-30-0x0000000006380000-0x000000000640A000-memory.dmp upx -
resource yara_rule behavioral2/memory/3164-11-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect behavioral2/memory/3164-12-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect behavioral2/memory/3164-17-0x0000000010000000-0x00000000111C3000-memory.dmp vmprotect behavioral2/memory/3164-20-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect behavioral2/memory/3164-27-0x0000000010000000-0x00000000111C3000-memory.dmp vmprotect behavioral2/memory/3164-33-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect behavioral2/memory/3164-34-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect behavioral2/memory/3164-35-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect behavioral2/memory/3164-37-0x0000000000400000-0x0000000001D3D000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe Token: SeDebugPrivilege 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe 3164 b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe"C:\Users\Admin\AppData\Local\Temp\b0ae3cd0ab2497282cc17a2d386775e827510bf6dc257d773d08afdd100c7690.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3164