Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 15:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
FYefDDd/pGBQFXr.exe
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
General
-
Target
FYefDDd/pGBQFXr.exe
-
Size
129KB
-
MD5
7ea6be30e745e9556c017439c5e83273
-
SHA1
4e36ae4f8bb1c6a438f8cc6952ec840415b5d9f2
-
SHA256
5a3e4e68ffa8e8796ec0ff3d01473ceafa070dc533a1c268d073ee7abd6c8021
-
SHA512
0a17f4e6e60932282cb28823a77c5ebef7a8c8ee472f00c9ef9eebb0481886647faa698f2c2e193db095c6467f6e41307aff96030fadd3072ba700c1e1e45724
-
SSDEEP
1536:SVgl8I1rieO+EEDmKUKbQJnH8BYOuKIawQzWbfTMxW6oaZd7/Pxr:Vl8dsEKbqcBYOhIa6LTMaazLxr
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2548-15-0x0000000010000000-0x0000000010966000-memory.dmp family_blackmoon -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: pGBQFXr.exe File opened (read-only) \??\N: pGBQFXr.exe File opened (read-only) \??\Q: pGBQFXr.exe File opened (read-only) \??\T: pGBQFXr.exe File opened (read-only) \??\V: pGBQFXr.exe File opened (read-only) \??\Z: pGBQFXr.exe File opened (read-only) \??\K: pGBQFXr.exe File opened (read-only) \??\M: pGBQFXr.exe File opened (read-only) \??\G: pGBQFXr.exe File opened (read-only) \??\H: pGBQFXr.exe File opened (read-only) \??\J: pGBQFXr.exe File opened (read-only) \??\O: pGBQFXr.exe File opened (read-only) \??\S: pGBQFXr.exe File opened (read-only) \??\X: pGBQFXr.exe File opened (read-only) \??\B: pGBQFXr.exe File opened (read-only) \??\E: pGBQFXr.exe File opened (read-only) \??\Y: pGBQFXr.exe File opened (read-only) \??\P: pGBQFXr.exe File opened (read-only) \??\R: pGBQFXr.exe File opened (read-only) \??\U: pGBQFXr.exe File opened (read-only) \??\I: pGBQFXr.exe File opened (read-only) \??\L: pGBQFXr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2548 pGBQFXr.exe 2548 pGBQFXr.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pGBQFXr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe 2548 pGBQFXr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 pGBQFXr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 pGBQFXr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FYefDDd\pGBQFXr.exe"C:\Users\Admin\AppData\Local\Temp\FYefDDd\pGBQFXr.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548