Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exe
Resource
win7-20240903-en
General
-
Target
82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exe
-
Size
702KB
-
MD5
9070c9d8803ed977ff718c0d5fa226c6
-
SHA1
c2654e6585ab3b756d344dc5c80a4463304f825c
-
SHA256
82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953
-
SHA512
3e19c175efaca7e22c9ab9aba47f9405973ec347e68aaf416ef306b36e7d79d1d16b298693fc66fb26448faf6814dbf855c6320f9626b39b0b86091601ebf57f
-
SSDEEP
12288:C5hZlSuKSfT5USD/vVbk+Oo7Kw2MR2Kz1OS6f0n17m9s10s/1jD//oS:UXD1ftnj6f0n09saev
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1628-1-0x0000000000400000-0x00000000006D5000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exepid process 1628 82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exe"C:\Users\Admin\AppData\Local\Temp\82a54cd3c4f3f05b7671eb98487969cbcbdecdc9a99e7bdf91407de4f2821953.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1628