Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 08:48
Behavioral task
behavioral1
Sample
9ad0cafdba54de544ad7c8fa4ed0e83ddf564c97aee4c00222e8c0031b5b51d9.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9ad0cafdba54de544ad7c8fa4ed0e83ddf564c97aee4c00222e8c0031b5b51d9.dll
Resource
win10v2004-20230703-en
General
-
Target
9ad0cafdba54de544ad7c8fa4ed0e83ddf564c97aee4c00222e8c0031b5b51d9.dll
-
Size
2.9MB
-
MD5
ab7dc02cc8ed6cad5e20ad35d975d40f
-
SHA1
7b9a5a4057bdfcf948c94b1519d186f7bb06612e
-
SHA256
9ad0cafdba54de544ad7c8fa4ed0e83ddf564c97aee4c00222e8c0031b5b51d9
-
SHA512
7887edc9e91d1c98d5f8cbb3db6370cb2c6ad5c4adf38a0c9aec6bf00f92419d6fa7f12de3e91e1d6b94c0100d40bbbe55e4e4b6d36ccdbbad0d6270301051ce
-
SSDEEP
49152:0mN3JexYE/p+N0mBbl++rCbZ9J+mmWj3wiamXGyT5viIAIRSKvLLR838xKcERc14:DN5q/8ymBbljr8+mH3wiamXGs5iyRSKc
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2644-7-0x00000000001C0000-0x00000000001E5000-memory.dmp family_blackmoon -
Blocklisted process makes network request 3 IoCs
flow pid Process 2 2644 rundll32.exe 4 2644 rundll32.exe 6 2644 rundll32.exe -
resource yara_rule behavioral1/memory/2644-0-0x0000000074030000-0x000000007452D000-memory.dmp upx behavioral1/memory/2644-2-0x0000000073B30000-0x000000007402D000-memory.dmp upx behavioral1/memory/2644-3-0x0000000073B30000-0x000000007402D000-memory.dmp upx behavioral1/memory/2644-29-0x0000000073B30000-0x000000007402D000-memory.dmp upx behavioral1/memory/2644-37-0x0000000073B30000-0x000000007402D000-memory.dmp upx behavioral1/memory/2644-43-0x0000000073B30000-0x000000007402D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe 2644 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2644 2440 rundll32.exe 28 PID 2440 wrote to memory of 2644 2440 rundll32.exe 28 PID 2440 wrote to memory of 2644 2440 rundll32.exe 28 PID 2440 wrote to memory of 2644 2440 rundll32.exe 28 PID 2440 wrote to memory of 2644 2440 rundll32.exe 28 PID 2440 wrote to memory of 2644 2440 rundll32.exe 28 PID 2440 wrote to memory of 2644 2440 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ad0cafdba54de544ad7c8fa4ed0e83ddf564c97aee4c00222e8c0031b5b51d9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ad0cafdba54de544ad7c8fa4ed0e83ddf564c97aee4c00222e8c0031b5b51d9.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2644
-