Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 20:49
Behavioral task
behavioral1
Sample
99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll
Resource
win7-20240903-en
General
-
Target
99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll
-
Size
4.2MB
-
MD5
58345def8b478487ddf266d012334cf7
-
SHA1
bbb1956e0ee6631fb3729fd39b00f61835923a46
-
SHA256
99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56
-
SHA512
cc81d8727e3be75e0fbf35ac160d64e270538c42343351e4a006d601c50e5663688370271769f8d4df09fbfb62a51117c6b5383761921297c6d15ae75655b69a
-
SSDEEP
98304:W3jMc3dYt1mI8e7GBloJBxs7QqAiweQiXRdPT597Nbo:W3dtY39GBuBxGwDiXL7TN0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2988-1-0x0000000010000000-0x0000000010C9F000-memory.dmp family_blackmoon behavioral1/memory/2988-2-0x0000000010000000-0x0000000010C9F000-memory.dmp family_blackmoon behavioral1/memory/2988-3-0x0000000010000000-0x0000000010C9F000-memory.dmp family_blackmoon behavioral1/memory/2988-10-0x0000000010000000-0x0000000010C9F000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 2988 rundll32.exe -
resource yara_rule behavioral1/memory/2988-1-0x0000000010000000-0x0000000010C9F000-memory.dmp upx behavioral1/memory/2988-2-0x0000000010000000-0x0000000010C9F000-memory.dmp upx behavioral1/memory/2988-3-0x0000000010000000-0x0000000010C9F000-memory.dmp upx behavioral1/memory/2988-8-0x0000000000150000-0x0000000000165000-memory.dmp upx behavioral1/memory/2988-10-0x0000000010000000-0x0000000010C9F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2988 1480 rundll32.exe 30 PID 1480 wrote to memory of 2988 1480 rundll32.exe 30 PID 1480 wrote to memory of 2988 1480 rundll32.exe 30 PID 1480 wrote to memory of 2988 1480 rundll32.exe 30 PID 1480 wrote to memory of 2988 1480 rundll32.exe 30 PID 1480 wrote to memory of 2988 1480 rundll32.exe 30 PID 1480 wrote to memory of 2988 1480 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a