Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 20:49
Behavioral task
behavioral1
Sample
38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll
Resource
win7-20240708-en
General
-
Target
38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll
-
Size
4.1MB
-
MD5
693ea4b1b7c421ee707e2d40735aef51
-
SHA1
2c95c0b57eb863b1b663c6c1ad2dd3661f3929a0
-
SHA256
38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613
-
SHA512
1196adc262ca67d528dbda7ddd705479658d8d6aea62cd6025e0a7660fa1d7e4612bde2ecd6b198a84e743a54c140345723ad0b4e0ebb60c90af595802e41a85
-
SSDEEP
98304:CjkhoyDYt7LfE00POzxk43H5rqe0jB6S451bKNnot/W3U:MkMlfEak43HB04S45lJN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2348-2-0x0000000010000000-0x0000000010A12000-memory.dmp family_blackmoon behavioral1/memory/2348-3-0x0000000010000000-0x0000000010A12000-memory.dmp family_blackmoon behavioral1/memory/2348-11-0x0000000010000000-0x0000000010A12000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 2348 rundll32.exe -
resource yara_rule behavioral1/memory/2348-1-0x0000000010000000-0x0000000010A12000-memory.dmp upx behavioral1/memory/2348-2-0x0000000010000000-0x0000000010A12000-memory.dmp upx behavioral1/memory/2348-3-0x0000000010000000-0x0000000010A12000-memory.dmp upx behavioral1/memory/2348-8-0x0000000000160000-0x0000000000175000-memory.dmp upx behavioral1/memory/2348-11-0x0000000010000000-0x0000000010A12000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2348 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 784 wrote to memory of 2348 784 rundll32.exe 31 PID 784 wrote to memory of 2348 784 rundll32.exe 31 PID 784 wrote to memory of 2348 784 rundll32.exe 31 PID 784 wrote to memory of 2348 784 rundll32.exe 31 PID 784 wrote to memory of 2348 784 rundll32.exe 31 PID 784 wrote to memory of 2348 784 rundll32.exe 31 PID 784 wrote to memory of 2348 784 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a