Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 10:13
Behavioral task
behavioral1
Sample
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe
Resource
win7-20240729-en
General
-
Target
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe
-
Size
676KB
-
MD5
9ad5b2de0e61b8de9dfc187d8fb3a6f3
-
SHA1
59b7997aaf1d677db731e8a084e390e76c258175
-
SHA256
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e
-
SHA512
300f2b1057bdadef1a760a6c36cc35816aca6114d215924d4a534614325fb8dbb759bca141c96208ff1af1747404361b986ac39702e3f797b6bc89600493f707
-
SSDEEP
12288:y4gDM4r3xJDRRX7My6LwOJ+XlMXYrUYj5VLScbwFtniBWPEaaPXJAq17MuANXGgd:yNDFHgycMXlMK/jj+cbA/PsXdeNXGM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3728-4-0x0000000000400000-0x00000000005D3000-memory.dmp family_blackmoon behavioral2/memory/3728-6-0x0000000000400000-0x00000000005D3000-memory.dmp family_blackmoon behavioral2/memory/3728-5-0x0000000000400000-0x00000000005D3000-memory.dmp family_blackmoon behavioral2/memory/3728-7-0x0000000000400000-0x00000000005D3000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/3728-0-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral2/memory/3728-1-0x00000000023A0000-0x00000000023C4000-memory.dmp upx behavioral2/memory/3728-2-0x00000000023A0000-0x00000000023C4000-memory.dmp upx behavioral2/memory/3728-4-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral2/memory/3728-6-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral2/memory/3728-5-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral2/memory/3728-7-0x0000000000400000-0x00000000005D3000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42912d0ab5bbd1d577d0a71ff0b21ecad69571a64cae33163778ad6e2da0fa2e.exe