Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll
Resource
win7-20230831-en
General
-
Target
9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll
-
Size
66KB
-
MD5
d73f8cd93189c46c1d4058ce9af4b752
-
SHA1
5eff68604a537dae5afc193710402ed0219d12ea
-
SHA256
9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75
-
SHA512
43148e7c31859a6133c91fccf7eef3ebafee16e09fad298b3bb9a33597ac43f067a651af090d42e0329d50d5a88c45ce259c7e923d6229c72d2b4d5c10942fac
-
SSDEEP
1536:wNjPUnRAumvCoCzPTYcV0rPXP4HsrIIOWXxoV:wNjENbMcVAPXPsVpWho
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/1420-2-0x0000000010000000-0x0000000010067000-memory.dmp family_blackmoon behavioral1/memory/1420-23-0x0000000010000000-0x0000000010067000-memory.dmp family_blackmoon -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdatem = "C:\\Users\\Public\\Documents\\Applicationqgzij.exe" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32.txt rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2236 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1944 wrote to memory of 1420 1944 rundll32.exe 28 PID 1420 wrote to memory of 2236 1420 rundll32.exe 29 PID 1420 wrote to memory of 2236 1420 rundll32.exe 29 PID 1420 wrote to memory of 2236 1420 rundll32.exe 29 PID 1420 wrote to memory of 2236 1420 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9310dd497d7feee8ad590da0086f7db8bf43b66e3a8cac6dc1e9228bf7137c75.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\rundll32.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD53aea5b78bac5359a799c2714fecccd1a
SHA15d3203b328ecfc7a55c0ded1032d209e9f273367
SHA256c05e763cab67cf9daf5be7a6a6cff2650223987a9693eaa119f69b2bbb6df6c3
SHA5129513cc84a7ed3dd709d4affb03f6e286dcd43e82f33441c00a9d74d2b45449f2ee20baa8db46218d7a59d9e62fb7f95050ea305166e70f3e71dde39ccf07b6d3
-
Filesize
162B
MD50a2dcf199afc7f50d4e16fc0bee1e7ee
SHA116fbc549b74036b20bef29916b26485174334530
SHA256a6e6abc5a24194e576e5bda08a632178e45ba5b5f23e06cadf3cc5e4a57e709c
SHA512b456049077a6f9df393c4f12b9557da0bb67e69b4297a1828d3309f21d5f419bb81b3bb33ea7b1c1f84cba0e446aad6ada64a6676b56df60683230a6a12f366f