Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d.exe
Resource
win7-20241010-en
General
-
Target
71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d.exe
-
Size
685KB
-
MD5
0be6ee861413fde4d9bb359c99a64a5a
-
SHA1
6d99b15a78b03fc66a3e1cc8babeff9adcfe0358
-
SHA256
71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d
-
SHA512
791f13939c95568b04b1372d630c29e601ad32684f8dda3396cd8846fdecb46bf3d6cca0c4aa6a6b8345713ca71bcadbe32dfa86a682cfef61be7cbdbdfb60fc
-
SSDEEP
12288:f5AavEnQSnGGPsVPYQmoB6f2PBefE4C1f7SZgXuMoAugwTwhFSv15LMs8EcbBoS:f5jt6GGPsVPYFk60VV1XAAmTwbM16E
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/1964-1-0x0000000000400000-0x00000000006E9000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d.exe"C:\Users\Admin\AppData\Local\Temp\71bd1df7edfcd6b85dbf367ebe92ad41515d7dc40108392fb33c20b4d524776d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1964