Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 19:34
Behavioral task
behavioral1
Sample
6d516ddb0c8ff5854ba4d54958eebd99d3e2ae9ff0d23ca16a6dde3140c083d3.dll
Resource
win7-20240903-en
General
-
Target
6d516ddb0c8ff5854ba4d54958eebd99d3e2ae9ff0d23ca16a6dde3140c083d3.dll
-
Size
4.1MB
-
MD5
d9501fb2216a7e083367786a19a7062d
-
SHA1
33a161685b85117e02c7cfdc1c3bd539bb3c0f40
-
SHA256
6d516ddb0c8ff5854ba4d54958eebd99d3e2ae9ff0d23ca16a6dde3140c083d3
-
SHA512
d2af8f2d92104027388ea95a4c1d4a24ce264d9a5f7196650118b593c6ab82d49885cfbcfb523943a988a8382de68bdefd3f93aeb9d12269c109df5f09c186f5
-
SSDEEP
98304:pT31c8XZrPwZ/ikqFmxsppzve1Da0BepkWX85bTH/eDXxor6p:pT1cyrP44g6lvmU6WX8ZTHWr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2188-2-0x0000000010000000-0x0000000010AAA000-memory.dmp family_blackmoon behavioral1/memory/2188-3-0x0000000010000000-0x0000000010AAA000-memory.dmp family_blackmoon behavioral1/memory/2188-11-0x0000000010000000-0x0000000010AAA000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 2188 rundll32.exe -
resource yara_rule behavioral1/memory/2188-1-0x0000000010000000-0x0000000010AAA000-memory.dmp upx behavioral1/memory/2188-2-0x0000000010000000-0x0000000010AAA000-memory.dmp upx behavioral1/memory/2188-3-0x0000000010000000-0x0000000010AAA000-memory.dmp upx behavioral1/memory/2188-8-0x00000000002B0000-0x00000000002C5000-memory.dmp upx behavioral1/memory/2188-11-0x0000000010000000-0x0000000010AAA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2188 3020 rundll32.exe 30 PID 3020 wrote to memory of 2188 3020 rundll32.exe 30 PID 3020 wrote to memory of 2188 3020 rundll32.exe 30 PID 3020 wrote to memory of 2188 3020 rundll32.exe 30 PID 3020 wrote to memory of 2188 3020 rundll32.exe 30 PID 3020 wrote to memory of 2188 3020 rundll32.exe 30 PID 3020 wrote to memory of 2188 3020 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d516ddb0c8ff5854ba4d54958eebd99d3e2ae9ff0d23ca16a6dde3140c083d3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d516ddb0c8ff5854ba4d54958eebd99d3e2ae9ff0d23ca16a6dde3140c083d3.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a