Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 08:18
Behavioral task
behavioral1
Sample
龙神5.16免费版/3KM2.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
龙神5.16免费版/3KM2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
龙神5.16免费版/SKY.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
龙神5.16免费版/SKY.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
龙神5.16免费版/龍神辅助免费2013.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
龙神5.16免费版/龍神辅助免费2013.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
龙神5.16免费版/龙神辅助官网.url
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
龙神5.16免费版/龙神辅助官网.url
Resource
win10v2004-20241007-en
General
-
Target
龙神5.16免费版/SKY.dll
-
Size
733KB
-
MD5
aa1d57ec487edb3d00281ecc8446e262
-
SHA1
a6f2de04e6fe3cd325c285a3e9620473dc0ce5a8
-
SHA256
23c2652bc50f2fcc75bccd85acd2d3001dedd8ad860101642f9d055474726ff6
-
SHA512
3dcad1fb2c9e807aa2e6a493f103b210cbd89d9f22071b40fece991d8303fc7afbc89e83c9f24789840a7315e2e781078500abbc582eb95db0ee2d15dd841392
-
SSDEEP
12288:3gi7mpVdet6O95j4ZSLIP6DJVNApOsldlmwhjouHHXZfraqftTQzk3wer:QImdaF/js+opOMmwdnJftT93z
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral4/memory/3976-2-0x0000000010000000-0x000000001033C000-memory.dmp family_blackmoon behavioral4/memory/3976-3-0x0000000010000000-0x000000001033C000-memory.dmp family_blackmoon behavioral4/memory/3976-1659-0x0000000010000000-0x000000001033C000-memory.dmp family_blackmoon behavioral4/memory/3976-1661-0x0000000010000000-0x000000001033C000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral4/memory/3976-0-0x0000000010000000-0x000000001033C000-memory.dmp vmprotect behavioral4/memory/3976-2-0x0000000010000000-0x000000001033C000-memory.dmp vmprotect behavioral4/memory/3976-3-0x0000000010000000-0x000000001033C000-memory.dmp vmprotect behavioral4/memory/3976-1659-0x0000000010000000-0x000000001033C000-memory.dmp vmprotect behavioral4/memory/3976-1661-0x0000000010000000-0x000000001033C000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 3976 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4836 wrote to memory of 3976 4836 rundll32.exe rundll32.exe PID 4836 wrote to memory of 3976 4836 rundll32.exe rundll32.exe PID 4836 wrote to memory of 3976 4836 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\龙神5.16免费版\SKY.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\龙神5.16免费版\SKY.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219