Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b.exe
Resource
win7-20240903-en
General
-
Target
8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b.exe
-
Size
672KB
-
MD5
cf7e378f27b28d9ecd2b84c46d58ddab
-
SHA1
cf845e0274f6d3b19b7dc4042ee7254aa87c2cd2
-
SHA256
8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b
-
SHA512
54bb5baf16c5ce4006075b5daef15fbcf11fde81e6f8ba2df2be0103c6bd318e52c53d3c6632251f1fafde8924884e12c9fa7c6c8ac50a75907f54a37b245c6a
-
SSDEEP
12288:PTR6ErVYVj/8nVuiWaGK5E+h6takJU0i8PRzT2gyonkuura+gF85noS:PN68WoncF00aQzBP9y6kuuk85
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2128-1-0x0000000000400000-0x0000000000565000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b.exe"C:\Users\Admin\AppData\Local\Temp\8f939b49e74465ee8e2977b8b0f4ea85d9a0d1194d23849568ed2294667ec50b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2128