Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 20:49
Behavioral task
behavioral1
Sample
99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll
Resource
win7-20240903-en
General
-
Target
99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll
-
Size
4.2MB
-
MD5
58345def8b478487ddf266d012334cf7
-
SHA1
bbb1956e0ee6631fb3729fd39b00f61835923a46
-
SHA256
99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56
-
SHA512
cc81d8727e3be75e0fbf35ac160d64e270538c42343351e4a006d601c50e5663688370271769f8d4df09fbfb62a51117c6b5383761921297c6d15ae75655b69a
-
SSDEEP
98304:W3jMc3dYt1mI8e7GBloJBxs7QqAiweQiXRdPT597Nbo:W3dtY39GBuBxGwDiXL7TN0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/3668-9-0x0000000010000000-0x0000000010C9F000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 3668 rundll32.exe -
resource yara_rule behavioral2/memory/3668-0-0x0000000010000000-0x0000000010C9F000-memory.dmp upx behavioral2/memory/3668-7-0x0000000002D40000-0x0000000002D55000-memory.dmp upx behavioral2/memory/3668-8-0x0000000002D40000-0x0000000002D55000-memory.dmp upx behavioral2/memory/3668-9-0x0000000010000000-0x0000000010C9F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1472 3668 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3668 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3116 wrote to memory of 3668 3116 rundll32.exe 82 PID 3116 wrote to memory of 3668 3116 rundll32.exe 82 PID 3116 wrote to memory of 3668 3116 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99839f4e2d466e2f4043d7cef454de2545cb5cb3df1bde3c43716dbfeea02e56.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 8483⤵
- Program crash
PID:1472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3668 -ip 36681⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a