Analysis
-
max time kernel
200s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll
-
Size
53KB
-
MD5
f48665b578488678b7054c2056ff8832
-
SHA1
45e86adffcf85f1a8858ab8b00f2986480c024ec
-
SHA256
0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3
-
SHA512
65a89f75df869019b3a06e3665ae9fa427c14b4909fd14366775226c84f08b3ee99c7e12f89b839876075d405b052d30ec5e1418fcce0129995c73f23a785dc2
-
SSDEEP
1536:SMPBiyz7cJQN2U3sbmOV4w2dSeV/hoAygKmpQgK4E0:BiywU3CFVL+jVJNyQpQQE0
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/1716-133-0x0000000010000000-0x0000000010023000-memory.dmp family_blackmoon behavioral2/memory/1716-135-0x0000000010000000-0x0000000010023000-memory.dmp family_blackmoon -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1716 4480 rundll32.exe 81 PID 4480 wrote to memory of 1716 4480 rundll32.exe 81 PID 4480 wrote to memory of 1716 4480 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e4d2888566ebfab1ad13f8b684ea75002ac0318cfaff47c69d12d43d49315b3.dll,#12⤵PID:1716
-