Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29-06-2023 20:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad89ca11ccac45dde4662371a93a692ec3158fb34e901ff5a1a35c4799d00605.dll
Resource
win7-20230621-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ad89ca11ccac45dde4662371a93a692ec3158fb34e901ff5a1a35c4799d00605.dll
-
Size
1.4MB
-
MD5
af29eb08dea00fb938bfb3665c334eb6
-
SHA1
6ffcc407436d6e50a75f5a350094e4f30aff5ed9
-
SHA256
ad89ca11ccac45dde4662371a93a692ec3158fb34e901ff5a1a35c4799d00605
-
SHA512
1370aaa8201531b4828c7bbb20c52d2105df4a27e4807872db71774b1bc3eeb084d1c91a90c0480b1b2e50a0e70200aac50c69f7d3ea9dd8e5352d74fe2bd1a1
-
SSDEEP
24576:VVn6rzCP8RL2Eu0fRDMia+xZIV04Wlh8W03pLvj9zJrFepfiv4VXqWeR7qX:3eGUR1a+o/08W0j93qivgiV
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-54-0x0000000010000000-0x00000000103FB000-memory.dmp family_blackmoon -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 2 2016 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 2016 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe PID 1320 wrote to memory of 2016 1320 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad89ca11ccac45dde4662371a93a692ec3158fb34e901ff5a1a35c4799d00605.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad89ca11ccac45dde4662371a93a692ec3158fb34e901ff5a1a35c4799d00605.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:2016
-