Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 15:07
Behavioral task
behavioral1
Sample
a8f074d0f1dd7a1c61dd5aec5856bf404fae4f38e93eeb05a8fe691f012daaa4.dll
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
a8f074d0f1dd7a1c61dd5aec5856bf404fae4f38e93eeb05a8fe691f012daaa4.dll
-
Size
117KB
-
MD5
44160dd35999d7cb0eaf15f8c3f6ac14
-
SHA1
1a454b460bbb1fb74be58c3d6402469fdea15a3e
-
SHA256
a8f074d0f1dd7a1c61dd5aec5856bf404fae4f38e93eeb05a8fe691f012daaa4
-
SHA512
b907840df609a98cb17b0f92a1dc16edb6210dfcfbaff98917fdb9d0cfc6288f5bb975d0e87cc479c95da48e1c3d1664e99a996d236e5209c414b7ba2d7420f2
-
SSDEEP
1536:wA/yfatLv5hjJ3uU86cz2K1CwAyjh7buyaqNIQGY2DwOoAtSfhd77ekaU07WJP:OatTJ+Uf45CxyWYKgAtSfz77+C
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4324-135-0x0000000010000000-0x000000001005D000-memory.dmp family_blackmoon behavioral2/memory/4324-134-0x0000000010000000-0x000000001005D000-memory.dmp family_blackmoon behavioral2/memory/4324-133-0x0000000010000000-0x000000001005D000-memory.dmp family_blackmoon -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1564 wrote to memory of 4324 1564 rundll32.exe rundll32.exe PID 1564 wrote to memory of 4324 1564 rundll32.exe rundll32.exe PID 1564 wrote to memory of 4324 1564 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8f074d0f1dd7a1c61dd5aec5856bf404fae4f38e93eeb05a8fe691f012daaa4.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8f074d0f1dd7a1c61dd5aec5856bf404fae4f38e93eeb05a8fe691f012daaa4.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4324-135-0x0000000010000000-0x000000001005D000-memory.dmpFilesize
372KB
-
memory/4324-134-0x0000000010000000-0x000000001005D000-memory.dmpFilesize
372KB
-
memory/4324-133-0x0000000010000000-0x000000001005D000-memory.dmpFilesize
372KB
-
memory/4324-136-0x0000000002E60000-0x0000000003003000-memory.dmpFilesize
1.6MB
-
memory/4324-137-0x0000000002710000-0x0000000002800000-memory.dmpFilesize
960KB
-
memory/4324-138-0x0000000002C40000-0x0000000002E55000-memory.dmpFilesize
2.1MB