Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 20:49
Behavioral task
behavioral1
Sample
38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll
Resource
win7-20240708-en
General
-
Target
38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll
-
Size
4.1MB
-
MD5
693ea4b1b7c421ee707e2d40735aef51
-
SHA1
2c95c0b57eb863b1b663c6c1ad2dd3661f3929a0
-
SHA256
38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613
-
SHA512
1196adc262ca67d528dbda7ddd705479658d8d6aea62cd6025e0a7660fa1d7e4612bde2ecd6b198a84e743a54c140345723ad0b4e0ebb60c90af595802e41a85
-
SSDEEP
98304:CjkhoyDYt7LfE00POzxk43H5rqe0jB6S451bKNnot/W3U:MkMlfEak43HB04S45lJN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/4344-9-0x0000000010000000-0x0000000010A12000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 4344 rundll32.exe -
resource yara_rule behavioral2/memory/4344-0-0x0000000010000000-0x0000000010A12000-memory.dmp upx behavioral2/memory/4344-7-0x0000000002D60000-0x0000000002D75000-memory.dmp upx behavioral2/memory/4344-9-0x0000000010000000-0x0000000010A12000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3832 4344 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4344 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4344 4480 rundll32.exe 83 PID 4480 wrote to memory of 4344 4480 rundll32.exe 83 PID 4480 wrote to memory of 4344 4480 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\38aff101950bdcd57b3c6bed385ec9cfe87ce8ab5e6a2107c6f8fb7201ff0613.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 8243⤵
- Program crash
PID:3832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4344 -ip 43441⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a