Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 14:34
Behavioral task
behavioral1
Sample
da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll
Resource
win7-20240903-en
General
-
Target
da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll
-
Size
4.1MB
-
MD5
885f9eeabd4d985a35823e8c4c6f3011
-
SHA1
d90f4d3ddc9221f7cdb224ab86ba1143f75b48e9
-
SHA256
da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a
-
SHA512
7e37f21035485bc329eb1f6cb6cf75ff005fd38392812ec7f0364fac1d5637dc94ff95d32b0c3c73ff27072418d73a7c334e5deca67ae68524aa25cfcf2df053
-
SSDEEP
98304:5j+JyRqtwrKiHXpQQjQ3tZ7P0LYsKCLZnTW/Ko:5j9Rc5l13jP0dhW/K
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/840-10-0x0000000010000000-0x0000000010AA7000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 840 rundll32.exe -
resource yara_rule behavioral2/memory/840-0-0x0000000010000000-0x0000000010AA7000-memory.dmp upx behavioral2/memory/840-7-0x00000000024B0000-0x00000000024C5000-memory.dmp upx behavioral2/memory/840-8-0x00000000024B0000-0x00000000024C5000-memory.dmp upx behavioral2/memory/840-10-0x0000000010000000-0x0000000010AA7000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3436 840 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 840 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2556 wrote to memory of 840 2556 rundll32.exe 83 PID 2556 wrote to memory of 840 2556 rundll32.exe 83 PID 2556 wrote to memory of 840 2556 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da772eefd713e021bae2a0b9274313629d3b512203bfe23d3dd29cb751ed2f8a.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 8443⤵
- Program crash
PID:3436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 840 -ip 8401⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a