Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2022 18:43
Behavioral task
behavioral1
Sample
7fd10abd56e2e5b324be359c0b054b3a52aab4897b3aec821d17f711d036fe2b.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7fd10abd56e2e5b324be359c0b054b3a52aab4897b3aec821d17f711d036fe2b.dll
-
Size
1.1MB
-
MD5
1af00924ee16348b25651eef36066f9c
-
SHA1
6b6d86bee8ca36395d978d88116ed9d58b46abae
-
SHA256
7fd10abd56e2e5b324be359c0b054b3a52aab4897b3aec821d17f711d036fe2b
-
SHA512
56d132de8e08d10cfbcd6f4ce0a408c864c9029b34b43c998f16afe0f16e14ace01525890d6d9d79623b7bb7b26d882cf16e7c21dedb65961c350b827143986b
-
SSDEEP
24576:cdxKK+Z3z0jetmSpSqQwxk8HLTKW2ZII6F3DejNN2fgd9Y:cdF+FBmgie/Gk6r2fgXY
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/2152-133-0x0000000010000000-0x000000001025D000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/2152-133-0x0000000010000000-0x000000001025D000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2152 1944 rundll32.exe 81 PID 1944 wrote to memory of 2152 1944 rundll32.exe 81 PID 1944 wrote to memory of 2152 1944 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fd10abd56e2e5b324be359c0b054b3a52aab4897b3aec821d17f711d036fe2b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7fd10abd56e2e5b324be359c0b054b3a52aab4897b3aec821d17f711d036fe2b.dll,#12⤵PID:2152
-