Analysis
-
max time kernel
153s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 12:10
Behavioral task
behavioral1
Sample
7aed80f9c4cadc43e40b56f8cd8e70509a46918d87b87c91ae8a2d729a23afb7.dll
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
7aed80f9c4cadc43e40b56f8cd8e70509a46918d87b87c91ae8a2d729a23afb7.dll
-
Size
366KB
-
MD5
3d71c09344a0159188ca85f7a6c1eeb0
-
SHA1
86069c3f28bcbbeef3c29a038d67402eada1d5a1
-
SHA256
7aed80f9c4cadc43e40b56f8cd8e70509a46918d87b87c91ae8a2d729a23afb7
-
SHA512
3b484337793e594df68c79a7f35373cc19cf31d2a2c1cbab837e7f700cdfe691a38e9439ac9fb92577ff2c0cbf46883e8752fccad494824d969eb95a9e892405
-
SSDEEP
6144:GoiItmwgmFLHUJAL+dlgeUtHdwAyPnfC1n7rD9WU259w0Ky:zBygL06klgeU5dwAHJ7P9W15w
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/1440-133-0x0000000010000000-0x00000000100C1000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/1440-133-0x0000000010000000-0x00000000100C1000-memory.dmp vmprotect -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1440 1008 rundll32.exe 82 PID 1008 wrote to memory of 1440 1008 rundll32.exe 82 PID 1008 wrote to memory of 1440 1008 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7aed80f9c4cadc43e40b56f8cd8e70509a46918d87b87c91ae8a2d729a23afb7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7aed80f9c4cadc43e40b56f8cd8e70509a46918d87b87c91ae8a2d729a23afb7.dll,#12⤵PID:1440
-