Analysis
-
max time kernel
140s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 10:17
Behavioral task
behavioral1
Sample
2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe
Resource
win7-20240729-en
7 signatures
150 seconds
General
-
Target
2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe
-
Size
848KB
-
MD5
bf8ab2ae9de6100f43e3eb2982598848
-
SHA1
7d63a25067172b4ce315fe180e3ec8a35b4cd6dc
-
SHA256
2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73
-
SHA512
97d0bad3d0907d83c1b4adf73ec2b50392f8bf42afb5db30ff407401fd3cc34621c847f1111fdcbd17b76f8e47ea8b2fa8871d700ef640a8676c035525da7423
-
SSDEEP
12288:36tv5qt7ito/3NpAgjbM9mPMjjoZOrAF2WHBBiT4W/jSn13e7N1Tk:36txqRiKv3AWbswIoZOjImT4QjsOfo
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/1548-7-0x00000000003B0000-0x00000000003DF000-memory.dmp family_blackmoon behavioral1/memory/1548-1-0x0000000010000000-0x0000000010013000-memory.dmp family_blackmoon behavioral1/memory/1548-13-0x0000000000400000-0x0000000000654000-memory.dmp family_blackmoon behavioral1/memory/1548-14-0x0000000000400000-0x0000000000654000-memory.dmp family_blackmoon behavioral1/memory/1548-18-0x0000000000400000-0x0000000000654000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/1548-0-0x0000000000400000-0x0000000000654000-memory.dmp upx behavioral1/memory/1548-13-0x0000000000400000-0x0000000000654000-memory.dmp upx behavioral1/memory/1548-14-0x0000000000400000-0x0000000000654000-memory.dmp upx behavioral1/memory/1548-18-0x0000000000400000-0x0000000000654000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1548 2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe 1548 2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1548 2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1548 2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe 1548 2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe"C:\Users\Admin\AppData\Local\Temp\2a7f62c121f15935cfb80537c6762663677b431949688ac5d7f38dc9aa0a4d73.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1548