Analysis

  • max time kernel
    517s
  • max time network
    435s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 02:18

General

  • Target

    yunyu1.dll

  • Size

    3.3MB

  • MD5

    5cebb26986fc489229f5c83efeff3edb

  • SHA1

    394d4ec00bbed12415f6f7df068f76606b2fb9b8

  • SHA256

    7a3ab1c009b5d827ab2245cb26cb9c70999542ebc0c4f40d97ca4116421cfad4

  • SHA512

    61af80903d690a01c7c542b050654be5f318099871a7ba602ecf79a6f7d335f172b10f5cac33cb7139dd7773b68f236a8f8e4dd482486197fb7b81288900e99f

  • SSDEEP

    98304:wSm9lpNfXVZI057IFL1v0X+JMYE49Lt5UrrIz+6Kf6g/FUKZeRn2RXA09LWBpSv6:wSYUq+JMcKIz7KvFM2SBpSc78T9W7

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\yunyu1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:6044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\yunyu1.dll,#1
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4476-0-0x0000000010000000-0x0000000010558000-memory.dmp

    Filesize

    5.3MB

  • memory/4476-1-0x000000001004F000-0x0000000010050000-memory.dmp

    Filesize

    4KB

  • memory/4476-2-0x0000000010000000-0x0000000010558000-memory.dmp

    Filesize

    5.3MB

  • memory/4476-3-0x0000000010000000-0x0000000010558000-memory.dmp

    Filesize

    5.3MB