Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 16:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe
-
Size
1.1MB
-
MD5
c51d58c7d01077a4e13eaad5851e81bc
-
SHA1
4e272b84e835358c4e06e7741f956cb7822c6a63
-
SHA256
3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568
-
SHA512
3f2503039e8fb80fc6f50d48c26246d5fae781d9a88782ebf6aba97c15b98e8014e459507e2cd998980c47293d84778e1a635eec0291457260b75be227fbb57f
-
SSDEEP
24576:L8peMCEwiZqITSWWmwv9bLgWef6R4OHjCLsBPxp2M83Qk8N1xma:L8vCyqWUFef62ODKMB83Qk8fd
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2292-2-0x0000000000400000-0x0000000000738000-memory.dmp family_blackmoon behavioral1/memory/2292-5-0x0000000000400000-0x0000000000738000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2292 3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe 2292 3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe"C:\Users\Admin\AppData\Local\Temp\3477f5bb14b2cc4fd28f50287b5e9efec72a38bb465d668a1027b903437e9568.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2292