Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf.exe
Resource
win7-20240903-en
General
-
Target
3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf.exe
-
Size
672KB
-
MD5
58b2c2c0e5cfc6dd38bf75fb726de876
-
SHA1
ce2ce61e4f2dc144aa426d5134be7e75c4dace21
-
SHA256
3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf
-
SHA512
83e9d052e79131246efc67f97b13ad7df84f5246aafa7258a6f27a6bf3ba4e2af1f7fef5f978a4d91f82923515d7d329c89f29692899abc49ef079498abfaf86
-
SSDEEP
12288:LIVG9tAR6Rwt50MY7K53YYCgaK8rwHqzrJ3LJZzbBR1t6l4KWGlmKrPYcfFCGiCK:LoG9t48kY6+REHqzlbJnRX6GKW2f8GzB
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/3068-1-0x0000000000400000-0x00000000006CD000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf.exe"C:\Users\Admin\AppData\Local\Temp\3f1e753e8356bd3d8b34434c34a9a0847d6ae7f657746f4429b486a3bf891bdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3068