Analysis
-
max time kernel
140s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exe
Resource
win7-20241010-en
General
-
Target
e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exe
-
Size
2.1MB
-
MD5
051443cb144c8c151a01ab4ffadafe5f
-
SHA1
033b6a5940fcc7c7b6536750e84a614afbbb0b92
-
SHA256
e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164
-
SHA512
f14f9f1b67e5bc1646a7c0aa019159d3ee77405138aa34bcfcc9d4280a30ed2d1491adb6df9603e0a45d1119dcd31a3f62714351c49e087ec29e3993bbba07bd
-
SSDEEP
49152:ymzmbTahsoQJ7keaBrksk97EBBD9Infzid0q5j:yBf+eorksFrIfziL5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-1-0x0000000000400000-0x0000000000840000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exepid process 2060 e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exe"C:\Users\Admin\AppData\Local\Temp\e9f8094cfed885ebfa876268eff009e0b2bd4caf06365e961b310fb1d1fc5164.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060