Behavioral task
behavioral1
Sample
69170ed530a85e4d0cebd7dae73109f6a9c787d69c8ef563d09dac413a73e6c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
69170ed530a85e4d0cebd7dae73109f6a9c787d69c8ef563d09dac413a73e6c6.exe
Resource
win10v2004-20220812-en
General
-
Target
69170ed530a85e4d0cebd7dae73109f6a9c787d69c8ef563d09dac413a73e6c6
-
Size
436KB
-
MD5
55a118ce9f2bf1b4b6757d230320a770
-
SHA1
d8484c9060f415120e43c005ea441c7d0f662466
-
SHA256
69170ed530a85e4d0cebd7dae73109f6a9c787d69c8ef563d09dac413a73e6c6
-
SHA512
e15400c9bd66bf63ed02958fb3eee381ed45f96d672b7f36ead7a36790973765aa392bf16f8314f06e3e2cb0061f72cdaad26ef646ac790956af0f8bbe64b3c7
-
SSDEEP
12288:2TiVPrJ/Vw+gia6JOUfsaZYFv53gNCpOdn/uc:2TixrJ/V1gia6JvfhYLpOd/5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
69170ed530a85e4d0cebd7dae73109f6a9c787d69c8ef563d09dac413a73e6c6.exe windows x86
8496a2b6c2c34c25fa1b98e929fd1485
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalSize
LocalFree
LocalAlloc
GetSystemInfo
lstrlenW
lstrcmpW
lstrcmpiW
RtlZeroMemory
VirtualAlloc
VirtualFree
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
CopyFileA
ReadFile
GetFileSize
CreateFileA
WriteFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetCommandLineA
LCMapStringA
MulDiv
GetCurrentThreadId
lstrcpynW
RtlMoveMemory
GetModuleHandleW
TerminateProcess
OpenProcess
Process32Next
CloseHandle
lstrlenA
Process32First
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
SetFilePointer
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
RaiseException
GetProcAddress
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
GetVersion
WideCharToMultiByte
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CreateToolhelp32Snapshot
MultiByteToWideChar
user32
PeekMessageA
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuState
GetMenuItemRect
GetMessageA
GetMenuStringW
TrackPopupMenu
SetForegroundWindow
GetMenuItemID
GetSubMenu
SetMenuInfo
InsertMenuW
GetMenuItemCount
DispatchMessageA
wsprintfA
MessageBoxA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoW
GetMenuItemInfoW
CheckMenuItem
AppendMenuW
DestroyMenu
LoadMenuW
CreatePopupMenu
CreateMenu
CharLowerW
CharUpperW
RegisterClassExW
LoadCursorW
LoadIconW
RegisterWindowMessageW
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
DestroyIcon
EndPaint
FillRect
BeginPaint
DestroyWindow
SetClassLongW
ReleaseDC
GetDC
RemovePropW
GetPropW
SetPropW
MessageBoxW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
SetParent
PostMessageW
SetWindowPos
MoveWindow
ScreenToClient
GetParent
UpdateWindow
ValidateRect
InvalidateRect
GetWindowRect
GetClientRect
GetFocus
SetFocus
GetClassNameW
GetDlgItem
GetWindowLongW
GetClassLongW
CallNextHookEx
SetWindowsHookExW
SendMessageW
CreateWindowExW
UnhookWindowsHookEx
SetWindowLongW
SetCursor
DefMDIChildProcW
DefWindowProcW
GetAsyncKeyState
CallWindowProcW
IsWindow
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
IsDialogMessageW
GetMessageW
CheckMenuRadioItem
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconW
DragAcceptFiles
DragFinish
DragQueryFileW
StrStrW
StrCmpNIA
StrStrIW
StrRStrW
StrRStrIW
gdi32
DeleteObject
CreatePatternBrush
CreateSolidBrush
GetObjectW
CreateFontW
GetDeviceCaps
GetStockObject
shlwapi
StrTrimW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE