Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2023, 05:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll
-
Size
1.5MB
-
MD5
41d085710f39cbd602231c19064da772
-
SHA1
23952c9f39bf95cf3c23437192d4d120a0e3eb05
-
SHA256
8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083
-
SHA512
207ea2f42b856142f230b66084a0a2853d924e4b0e5025f17e4fb23fc21f051f86d1c6dd9f6f7206613f4acf5fdd8a14180d36fc8d5579d3a7c06a330848f980
-
SSDEEP
24576:Ux1UBPEKrpVXeL84kzLSN/iprn/KpC4he+sstRg1dj7uk:73ukzLSlNhe+sMg/3L
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/3884-133-0x0000000010000000-0x0000000010404000-memory.dmp family_blackmoon -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 3884 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3884 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3884 2392 rundll32.exe 89 PID 2392 wrote to memory of 3884 2392 rundll32.exe 89 PID 2392 wrote to memory of 3884 2392 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b70b64f2a52a1077871aa2b5981ea1478786cbdcc4d7ec2b61b48bdc0dad083.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:3884
-