Analysis
-
max time kernel
140s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 10:13
Behavioral task
behavioral1
Sample
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe
Resource
win7-20240729-en
General
-
Target
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe
-
Size
676KB
-
MD5
9ad5b2de0e61b8de9dfc187d8fb3a6f3
-
SHA1
59b7997aaf1d677db731e8a084e390e76c258175
-
SHA256
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e
-
SHA512
300f2b1057bdadef1a760a6c36cc35816aca6114d215924d4a534614325fb8dbb759bca141c96208ff1af1747404361b986ac39702e3f797b6bc89600493f707
-
SSDEEP
12288:y4gDM4r3xJDRRX7My6LwOJ+XlMXYrUYj5VLScbwFtniBWPEaaPXJAq17MuANXGgd:yNDFHgycMXlMK/jj+cbA/PsXdeNXGM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2440-4-0x0000000000400000-0x00000000005D3000-memory.dmp family_blackmoon behavioral1/memory/2440-5-0x0000000000400000-0x00000000005D3000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/2440-0-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral1/memory/2440-1-0x00000000003D0000-0x00000000003F4000-memory.dmp upx behavioral1/memory/2440-2-0x00000000003D0000-0x00000000003F4000-memory.dmp upx behavioral1/memory/2440-4-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral1/memory/2440-5-0x0000000000400000-0x00000000005D3000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exepid process 2440 42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe"C:\Users\Admin\AppData\Local\Temp\42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2440