Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 14:49
Behavioral task
behavioral1
Sample
da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll
Resource
win7-20240903-en
General
-
Target
da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll
-
Size
4.1MB
-
MD5
885f9eeabd4d985a35823e8c4c6f3011
-
SHA1
d90f4d3ddc9221f7cdb224ab86ba1143f75b48e9
-
SHA256
da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a
-
SHA512
7e37f21035485bc329eb1f6cb6cf75ff005fd38392812ec7f0364fac1d5637dc94ff95d32b0c3c73ff27072418d73a7c334e5deca67ae68524aa25cfcf2df053
-
SSDEEP
98304:5j+JyRqtwrKiHXpQQjQ3tZ7P0LYsKCLZnTW/Ko:5j9Rc5l13jP0dhW/K
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2880-3-0x0000000010000000-0x0000000010AA7000-memory.dmp family_blackmoon behavioral1/memory/2880-9-0x0000000010000000-0x0000000010AA7000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 2880 rundll32.exe -
resource yara_rule behavioral1/memory/2880-0-0x0000000010000000-0x0000000010AA7000-memory.dmp upx behavioral1/memory/2880-1-0x0000000010000000-0x0000000010AA7000-memory.dmp upx behavioral1/memory/2880-2-0x0000000010000000-0x0000000010AA7000-memory.dmp upx behavioral1/memory/2880-3-0x0000000010000000-0x0000000010AA7000-memory.dmp upx behavioral1/memory/2880-8-0x00000000001A0000-0x00000000001B5000-memory.dmp upx behavioral1/memory/2880-9-0x0000000010000000-0x0000000010AA7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2880 2512 rundll32.exe 31 PID 2512 wrote to memory of 2880 2512 rundll32.exe 31 PID 2512 wrote to memory of 2880 2512 rundll32.exe 31 PID 2512 wrote to memory of 2880 2512 rundll32.exe 31 PID 2512 wrote to memory of 2880 2512 rundll32.exe 31 PID 2512 wrote to memory of 2880 2512 rundll32.exe 31 PID 2512 wrote to memory of 2880 2512 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a