Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86.exe
Resource
win7-20240903-en
General
-
Target
34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86.exe
-
Size
682KB
-
MD5
4d4b5647173e23089c036e5357f919e7
-
SHA1
08e2aa2202c99941d794927b9735dd85e07a8605
-
SHA256
34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86
-
SHA512
4cddb1821990ccbf5d52f0dbdf18822876421dd974e6d857a0c3fdd0b9dbf02b52cb067ad8decb068932c93894b5079367120387bdad7cc53d33333acfd51ed8
-
SSDEEP
12288:Pr/8lMJ1gdUo/nD/f+ZUNOBf6tT+w1KhgjU3yWfLYFjqYmCj+BZ8soS:Pr/8YgdUgD/f+oO+TeiY/09qBCj+BZ8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2132-2-0x0000000000400000-0x00000000006E9000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2132 34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86.exe"C:\Users\Admin\AppData\Local\Temp\34f2aa5c11dccc7ea24781cb5e528d30941c11a89786a988e2d8c8d12165ea86.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2132