Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 23:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1.exe
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1.exe
-
Size
657KB
-
MD5
a9ebf5556eb47f3f18d078ac1190a2c4
-
SHA1
61a8fe14ff32ab5b0f399deaa1e3e44907b0157d
-
SHA256
58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1
-
SHA512
a86772f9ffe13a178a3f555fe072b33ff7f4be9ad0819caae735aa0c9fb7f5e5d4a4c25ece5e416aee640b7bf0bd9bfef54846ece69f706062688880429ec63a
-
SSDEEP
12288:YZDivJ9Ke7zbicvzCtU32WQuwOD0uzxJvS0ph+6y09PC3oS:YZ23KEXJQGByxuz7vJAu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2300-1-0x0000000000400000-0x00000000006CF000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2300 58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1.exe"C:\Users\Admin\AppData\Local\Temp\58a1b9e3dc66c003a898261b810257ab6e6036b3e004bbcf6fc6381f7c7904b1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2300