Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 23:35
Behavioral task
behavioral1
Sample
0cf826c1d9c49f4348a2466120849e48c8092ba525493be51709ddd33762cd00.dll
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0cf826c1d9c49f4348a2466120849e48c8092ba525493be51709ddd33762cd00.dll
-
Size
80KB
-
MD5
91736a6edf7ba0ff3883de008c6dd1ee
-
SHA1
97d8a09de7272e7b8b74df5e402aa3620b7307e7
-
SHA256
0cf826c1d9c49f4348a2466120849e48c8092ba525493be51709ddd33762cd00
-
SHA512
41bfa5f8d8dcedb6c63e0360ad5d4fcf8de23d38a7df037a325a7155d650cad3104acf691674d7b1eebaf9db34739c83463f9ec9df000390a763efdba6ed45f3
-
SSDEEP
768:TmvT5hPKXIm//39QqUCaNadrla2sI5ccdmGLkiGuWxZ:cH5m/P9xUCDdrY2s9QZ4xZ
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3792-133-0x0000000010000000-0x0000000010014000-memory.dmp family_blackmoon behavioral2/memory/3792-134-0x0000000010000000-0x0000000010014000-memory.dmp family_blackmoon -
Blocklisted process makes network request 31 IoCs
flow pid Process 5 3792 rundll32.exe 12 3792 rundll32.exe 17 3792 rundll32.exe 18 3792 rundll32.exe 20 3792 rundll32.exe 23 3792 rundll32.exe 27 3792 rundll32.exe 28 3792 rundll32.exe 31 3792 rundll32.exe 33 3792 rundll32.exe 40 3792 rundll32.exe 44 3792 rundll32.exe 47 3792 rundll32.exe 48 3792 rundll32.exe 50 3792 rundll32.exe 53 3792 rundll32.exe 54 3792 rundll32.exe 55 3792 rundll32.exe 61 3792 rundll32.exe 62 3792 rundll32.exe 63 3792 rundll32.exe 66 3792 rundll32.exe 67 3792 rundll32.exe 68 3792 rundll32.exe 69 3792 rundll32.exe 70 3792 rundll32.exe 71 3792 rundll32.exe 72 3792 rundll32.exe 74 3792 rundll32.exe 75 3792 rundll32.exe 76 3792 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3792 4100 rundll32.exe 81 PID 4100 wrote to memory of 3792 4100 rundll32.exe 81 PID 4100 wrote to memory of 3792 4100 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cf826c1d9c49f4348a2466120849e48c8092ba525493be51709ddd33762cd00.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cf826c1d9c49f4348a2466120849e48c8092ba525493be51709ddd33762cd00.dll,#12⤵
- Blocklisted process makes network request
PID:3792
-