Analysis
-
max time kernel
58s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 12:59
Behavioral task
behavioral1
Sample
2c193a7ae021ac695125b45017b325ef68d2895c71f2cf88a8a1c66bc85c82a3.dll
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2c193a7ae021ac695125b45017b325ef68d2895c71f2cf88a8a1c66bc85c82a3.dll
-
Size
331KB
-
MD5
967ffab34af15c3b341429a2c87d0bd0
-
SHA1
4b219dc8b063b67c566e57a957bb9ca86bfae3d2
-
SHA256
2c193a7ae021ac695125b45017b325ef68d2895c71f2cf88a8a1c66bc85c82a3
-
SHA512
d8a06e22f4b692838197a0627bac647e2a7e1cc5c4e4132f3d68cb391a8c068f7d5d43b3efd25a574bb3e77bc15d6b9451ba2600dc0a3e34ddd4dc93210c5905
-
SSDEEP
6144:Ag8qAFmLoT7cqANKKi8zbGvrEfyv3cGrvwsUxF5rvnwbiZy0vgP3ZGT:Ag7Ah7cqANKKiubGYfyvM6vwT3i0vIJQ
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/892-56-0x0000000010000000-0x00000000100B7000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/892-56-0x0000000010000000-0x00000000100B7000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1116 wrote to memory of 892 1116 rundll32.exe 28 PID 1116 wrote to memory of 892 1116 rundll32.exe 28 PID 1116 wrote to memory of 892 1116 rundll32.exe 28 PID 1116 wrote to memory of 892 1116 rundll32.exe 28 PID 1116 wrote to memory of 892 1116 rundll32.exe 28 PID 1116 wrote to memory of 892 1116 rundll32.exe 28 PID 1116 wrote to memory of 892 1116 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c193a7ae021ac695125b45017b325ef68d2895c71f2cf88a8a1c66bc85c82a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c193a7ae021ac695125b45017b325ef68d2895c71f2cf88a8a1c66bc85c82a3.dll,#12⤵PID:892
-