Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f.exe
Resource
win7-20240903-en
General
-
Target
682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f.exe
-
Size
705KB
-
MD5
e0dde189c677abdb5effd48559cb4f40
-
SHA1
29646708cf032236cee18f96f9bfc8d532889c35
-
SHA256
682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f
-
SHA512
661ddba70feb81fb4b6eae6d2ce020d4eac9e5a73c6debd83750885f7101d65d356e5d35d6889bce10d27e40f48f2234926226c180ff67f0a826150aa11736e3
-
SSDEEP
12288:D1Ae+zFgm/HWT6g7O9j7G5mz+UBxtxSho7uEBH0PEaxssGYy4plToSs:Jf+h5fRZGoz+Sh3axssGR4na
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2552-1-0x0000000000400000-0x00000000006DB000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2552 682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f.exe"C:\Users\Admin\AppData\Local\Temp\682244054ad614ee1349d721973c6d24698e69874c778a6f7fb1d9a5f51a799f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2552