Analysis
-
max time kernel
55s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 21:36
Static task
static1
Behavioral task
behavioral1
Sample
0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll
-
Size
53KB
-
MD5
f48665b578488678b7054c2056ff8832
-
SHA1
45e86adffcf85f1a8858ab8b00f2986480c024ec
-
SHA256
0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3
-
SHA512
65a89f75df869019b3a06e3665ae9fa427c14b4909fd14366775226c84f08b3ee99c7e12f89b839876075d405b052d30ec5e1418fcce0129995c73f23a785dc2
-
SSDEEP
1536:SMPBiyz7cJQN2U3sbmOV4w2dSeV/hoAygKmpQgK4E0:BiywU3CFVL+jVJNyQpQQE0
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/956-56-0x0000000010000000-0x0000000010023000-memory.dmp family_blackmoon behavioral1/memory/956-58-0x0000000010000000-0x0000000010023000-memory.dmp family_blackmoon -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 968 wrote to memory of 956 968 rundll32.exe 27 PID 968 wrote to memory of 956 968 rundll32.exe 27 PID 968 wrote to memory of 956 968 rundll32.exe 27 PID 968 wrote to memory of 956 968 rundll32.exe 27 PID 968 wrote to memory of 956 968 rundll32.exe 27 PID 968 wrote to memory of 956 968 rundll32.exe 27 PID 968 wrote to memory of 956 968 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll,#12⤵PID:956
-