Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 04:56
Static task
static1
Behavioral task
behavioral1
Sample
e2b6172d4b96e9e8059f6c2fd6fb951983e988602920b3b2069907abea89c72b.dll
Resource
win7-20241010-en
General
-
Target
e2b6172d4b96e9e8059f6c2fd6fb951983e988602920b3b2069907abea89c72b.dll
-
Size
431KB
-
MD5
42ffeba32e0c3ca377b0dcc92e368053
-
SHA1
c7d471341e220deb366c946dc9da1f2f5b9f96bb
-
SHA256
e2b6172d4b96e9e8059f6c2fd6fb951983e988602920b3b2069907abea89c72b
-
SHA512
4fdb38d49010a2c879fcec4464898627538fb2c28435ae485ce3f8afc6015101b54492df4fa62d4f2dd80b39b103e57f771d9a2c7b6922b4916420ba97a63509
-
SSDEEP
12288:eemOG51BN127O5XnyrfrOAZL8PsO3BTyAhTTcc7vR/U6wYvoSOTEgTF:eemOG5NA74Xyrf3L83EAFIcrK6wYcTEC
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 9 IoCs
resource yara_rule behavioral2/memory/3116-4-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-5-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-6-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-7-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-8-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-11-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-13-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-17-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon behavioral2/memory/3116-18-0x0000000010000000-0x00000000100A0000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5952 wrote to memory of 3116 5952 rundll32.exe 82 PID 5952 wrote to memory of 3116 5952 rundll32.exe 82 PID 5952 wrote to memory of 3116 5952 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2b6172d4b96e9e8059f6c2fd6fb951983e988602920b3b2069907abea89c72b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2b6172d4b96e9e8059f6c2fd6fb951983e988602920b3b2069907abea89c72b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3116
-