Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0.exe
Resource
win7-20240903-en
General
-
Target
cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0.exe
-
Size
665KB
-
MD5
36154c6f1c3f02d7a65d8c9c3a278065
-
SHA1
f74278b0b692a1d23961655288142480fd28636b
-
SHA256
cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0
-
SHA512
c0b9a56f935d421e495129064e5b3613e4d73218127815dabf5e549cc28909d4a7a1fe25ed184978a980d69445dc6145a69f661e80f162c572bd15d47a5587f7
-
SSDEEP
12288:tcloGWGKgxsnETjHfm0C7PSPIwkAAuW4vhMm9fAEM8+cXuFOROsvMAND3bsoS:tcloGWGKgxsnETLm0C7JwkAAuW4JMm9B
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2332-1-0x0000000000400000-0x00000000006BD000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0.exe"C:\Users\Admin\AppData\Local\Temp\cf10408cd72354f12bb1cd31d344af81d2fa2bccedb62d41f6783a2c9a99baf0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2332