Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 15:21
Behavioral task
behavioral1
Sample
eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll
Resource
win7-20241010-en
windows7-x64
8 signatures
150 seconds
General
-
Target
eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll
-
Size
440KB
-
MD5
a57bc0f6299614486b61b74d28ff5821
-
SHA1
43359903adbab69ac1950a2cdbd9c57f57f3e19a
-
SHA256
eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4
-
SHA512
9f46e699bdf9069e96c6bee14ddb6348f5339ce1ca6420d77155900a486907c02f426b3ef805c10429b7389e00851e52c98a0bb66b7b32766acf0f3880b3fac2
-
SSDEEP
6144:9Oaxk4jn12paJcCOXtmAU/Xk+qpy+CuRydo90C:kaxk4jnSaJcCOXZU/U+qpyfuRyih
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/1548-13-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon behavioral2/memory/1548-2-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon behavioral2/memory/1548-12-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon behavioral2/memory/1548-20-0x0000000010000000-0x0000000010081000-memory.dmp family_blackmoon -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 1548 rundll32.exe -
resource yara_rule behavioral2/memory/1548-1-0x0000000000C60000-0x0000000000C78000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1548 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 1548 3352 rundll32.exe 83 PID 3352 wrote to memory of 1548 3352 rundll32.exe 83 PID 3352 wrote to memory of 1548 3352 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eeae7565e4b18298754cc0723eea0774798fe667f869d977e78448e8302464f4.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1548
-