Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 02:49
Behavioral task
behavioral1
Sample
2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll
Resource
win7-20230831-en
General
-
Target
2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll
-
Size
6.5MB
-
MD5
9c9e300f744ccd62a86831643b50c671
-
SHA1
9aefecfb7073e537d48f422722aa48ac21faf19e
-
SHA256
2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637
-
SHA512
49abc183bc5f3e07ecc50a6de8d285313d2ff1883252faad92ccff69b69aab06c511625bd5c938d1f8fc69eef139d3241ce82c917335ed45bbc922c4b4707686
-
SSDEEP
98304:iVEqNYiuw2c5kn3TcYifC3UW8xnufnRMqVe1mUr+EFxFMNEJNJxpWA74:Z+1z6n326EdleSkJUS6MkNJxMe4
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/3444-1-0x0000000010000000-0x0000000010B68000-memory.dmp family_blackmoon behavioral2/memory/3444-4-0x0000000010000000-0x0000000010B68000-memory.dmp family_blackmoon behavioral2/memory/3444-16-0x0000000002710000-0x0000000002723000-memory.dmp family_blackmoon -
Executes dropped EXE 4 IoCs
pid Process 3704 svchost.exe 724 svchost.exe 2640 svchost.exe 3968 svchost.exe -
resource yara_rule behavioral2/memory/3444-1-0x0000000010000000-0x0000000010B68000-memory.dmp vmprotect behavioral2/memory/3444-4-0x0000000010000000-0x0000000010B68000-memory.dmp vmprotect -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3444 set thread context of 3764 3444 rundll32.exe 87 PID 3444 set thread context of 4976 3444 rundll32.exe 89 PID 3444 set thread context of 1108 3444 rundll32.exe 90 PID 3444 set thread context of 4884 3444 rundll32.exe 92 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3444 rundll32.exe 3444 rundll32.exe 3444 rundll32.exe 3444 rundll32.exe 3444 rundll32.exe 3444 rundll32.exe 3444 rundll32.exe 3444 rundll32.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe 3764 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3444 rundll32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1548 wrote to memory of 3444 1548 rundll32.exe 85 PID 1548 wrote to memory of 3444 1548 rundll32.exe 85 PID 1548 wrote to memory of 3444 1548 rundll32.exe 85 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 3764 3444 rundll32.exe 87 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 4976 3444 rundll32.exe 89 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 1108 3444 rundll32.exe 90 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92 PID 3444 wrote to memory of 4884 3444 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b36a5edccd366c2b4c37dd86680d69fcdd8b6e011ede9c90d51c6a5a862e637.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\svchost.exesvchost.exe C:\Windows\SysWOW643⤵
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe C:\Windows\SysWOW643⤵
- Drops file in Windows directory
PID:4976
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe C:\Windows\SysWOW643⤵
- Drops file in Windows directory
PID:1108
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe C:\Windows\SysWOW643⤵
- Drops file in Windows directory
PID:4884
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:3704
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:724
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:2640
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309