Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-05-2023 05:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll
-
Size
1.5MB
-
MD5
41d085710f39cbd602231c19064da772
-
SHA1
23952c9f39bf95cf3c23437192d4d120a0e3eb05
-
SHA256
8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083
-
SHA512
207ea2f42b856142f230b66084a0a2853d924e4b0e5025f17e4fb23fc21f051f86d1c6dd9f6f7206613f4acf5fdd8a14180d36fc8d5579d3a7c06a330848f980
-
SSDEEP
24576:Ux1UBPEKrpVXeL84kzLSN/iprn/KpC4he+sstRg1dj7uk:73ukzLSlNhe+sMg/3L
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2012-54-0x0000000010000000-0x0000000010404000-memory.dmp family_blackmoon behavioral1/memory/2012-56-0x0000000010000000-0x0000000010404000-memory.dmp family_blackmoon -
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2012 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2012 2000 rundll32.exe 28 PID 2000 wrote to memory of 2012 2000 rundll32.exe 28 PID 2000 wrote to memory of 2012 2000 rundll32.exe 28 PID 2000 wrote to memory of 2012 2000 rundll32.exe 28 PID 2000 wrote to memory of 2012 2000 rundll32.exe 28 PID 2000 wrote to memory of 2012 2000 rundll32.exe 28 PID 2000 wrote to memory of 2012 2000 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:2012
-