Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 15:06
Behavioral task
behavioral1
Sample
eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll
Resource
win7-20241023-en
windows7-x64
8 signatures
150 seconds
General
-
Target
eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll
-
Size
440KB
-
MD5
a57bc0f6299614486b61b74d28ff5821
-
SHA1
43359903adbab69ac1950a2cdbd9c57f57f3e19a
-
SHA256
eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4
-
SHA512
9f46e699bdf9069e96c6bee14ddb6348f5339ce1ca6420d77155900a486907c02f426b3ef805c10429b7389e00851e52c98a0bb66b7b32766acf0f3880b3fac2
-
SSDEEP
6144:9Oaxk4jn12paJcCOXtmAU/Xk+qpy+CuRydo90C:kaxk4jnSaJcCOXZU/U+qpyfuRyih
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/1036-2-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon behavioral1/memory/1036-13-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon behavioral1/memory/1036-12-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/1036-1-0x0000000000180000-0x0000000000198000-memory.dmp upx behavioral1/memory/1036-15-0x0000000000180000-0x0000000000198000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2060 1036 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1036 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 684 wrote to memory of 1036 684 rundll32.exe 30 PID 1036 wrote to memory of 2060 1036 rundll32.exe 31 PID 1036 wrote to memory of 2060 1036 rundll32.exe 31 PID 1036 wrote to memory of 2060 1036 rundll32.exe 31 PID 1036 wrote to memory of 2060 1036 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 2603⤵
- Program crash
PID:2060
-
-