Behavioral task
behavioral1
Sample
7ba2ed448939ccaa31fa9028e15b320568e1b589801d15c2de48c1c3ea769eff.exe
Resource
win7-20220812-en
General
-
Target
7ba2ed448939ccaa31fa9028e15b320568e1b589801d15c2de48c1c3ea769eff
-
Size
352KB
-
MD5
056372020b73880d6f2edbc79c1374b0
-
SHA1
5e1b9d1c4a41ddde6762dc8a8a12826ecbfd6edb
-
SHA256
7ba2ed448939ccaa31fa9028e15b320568e1b589801d15c2de48c1c3ea769eff
-
SHA512
0ac45e321737a93c1236d8bc22308818b668134508f58bf32dae3ae359f8aa429ec146d7b26404afb85e87d6bbb3f6fd64652a637d07c13b0fd85d99289d6a9b
-
SSDEEP
6144:lqwAilBJvvKRxIH87/LzX58WGZE1LJ1CqaBzpLo/0ccNc:IwAivJlH87LPbfaBNLA
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
7ba2ed448939ccaa31fa9028e15b320568e1b589801d15c2de48c1c3ea769eff.exe windows x86
397ab61e83d534015f06a078d8c8e295
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
IsBadReadPtr
GetModuleFileNameA
CreateDirectoryA
GetCommandLineA
GetUserDefaultLCID
FormatMessageA
CloseHandle
ReadFile
GetFileSize
CreateFileA
WriteFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetTickCount
GetEnvironmentVariableA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
ExitProcess
IsBadWritePtr
VirtualAlloc
LCMapStringW
RaiseException
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
SetLastError
TlsAlloc
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetCurrentProcess
ExitThread
TlsGetValue
TlsSetValue
CreateThread
RtlUnwind
InterlockedIncrement
InterlockedDecrement
GetVersion
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TerminateThread
LocalFree
CreateFileMappingA
MapViewOfFile
GetCurrentThreadId
Sleep
GetLastError
LocalSize
HeapAlloc
HeapFree
GetProcessHeap
RtlMoveMemory
GetCurrentProcessId
TerminateProcess
OpenProcess
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
SetWaitableTimer
CreateWaitableTimerA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
IsDebuggerPresent
SetFilePointer
GetModuleHandleA
user32
EndDialog
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
GetSubMenu
SetMenuInfo
GetClientRect
GetMenuItemCount
AppendMenuA
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
CreateMenu
ReleaseDC
GetDC
GetDialogBaseUnits
SendDlgItemMessageA
SetDlgItemTextA
DefWindowProcA
GetAsyncKeyState
CallWindowProcA
EndPaint
BeginPaint
MsgWaitForMultipleObjects
TrackPopupMenu
GetMenuStringA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
CheckMenuItem
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
InsertMenuA
GetMenuItemInfoA
DestroyWindow
SendMessageA
DefMDIChildProcA
LoadCursorA
SetCursor
TrackMouseEvent
DestroyIcon
PostQuitMessage
SetWindowLongA
DestroyCursor
CreateWindowExA
GetWindowLongA
GetDlgItem
IsWindow
GetClassNameA
SetFocus
GetFocus
GetWindowRect
GetParent
ScreenToClient
InvalidateRect
ValidateRect
GetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
CreateDialogParamA
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
SetParent
PostMessageA
SetWindowPos
MoveWindow
UpdateWindow
atl
ord42
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
shell32
DragQueryFileA
DragFinish
Shell_NotifyIconA
DragAcceptFiles
gdi32
DeleteObject
GetObjectA
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
BitBlt
ExtCreateRegion
CombineRgn
CreateRoundRectRgn
StretchBlt
CreateSolidBrush
CreatePatternBrush
SetTextColor
SetBkMode
SetBkColor
GetStockObject
oleaut32
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
ws2_32
gethostname
getsockname
ntohs
gethostbyname
inet_ntoa
send
recv
select
__WSAFDIsSet
inet_addr
connect
WSAStartup
socket
ioctlsocket
WSAGetLastError
htons
bind
listen
accept
closesocket
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE