Behavioral task
behavioral1
Sample
0840d19aa56ea100faf311b3dd987d53be1b57f85e40625825d6a9e0ab6d04ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0840d19aa56ea100faf311b3dd987d53be1b57f85e40625825d6a9e0ab6d04ee.exe
Resource
win10v2004-20220901-en
General
-
Target
0840d19aa56ea100faf311b3dd987d53be1b57f85e40625825d6a9e0ab6d04ee
-
Size
488KB
-
MD5
60ea01e5c8d18e48f787f96ee5371655
-
SHA1
b3f45ba23721de69fb55a944df09290e93a04b27
-
SHA256
0840d19aa56ea100faf311b3dd987d53be1b57f85e40625825d6a9e0ab6d04ee
-
SHA512
24e6222b703d81e49ff7356b80a5e436830f081b52de0cd27b3ebd0e9927cc94011e082136f3a5f9f3e339dd72de31e76b768f6e8014b6004edfe9102c71e180
-
SSDEEP
3072:ZiwzBarqlShFimd4vDl7I/cRXWtNMXtZ47i3qMGVPJ2tk2dpRctg2OZ5avfKlAwj:ZiwzBqqu7yvDhmIWTesmlRSn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
0840d19aa56ea100faf311b3dd987d53be1b57f85e40625825d6a9e0ab6d04ee.exe windows x86
392e343f49182442181b180286eca57c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
CallNextHookEx
EnumChildWindows
RedrawWindow
EnumThreadWindows
UnhookWindowsHookEx
SetWindowsHookExA
DrawTextA
GetWindow
PtInRect
EnumWindows
GetCursorPos
SystemParametersInfoA
DrawFocusRect
GetLastActivePopup
GetKeyState
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetSysColorBrush
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
GrayStringA
CreateDialogIndirectParamA
GetDlgCtrlID
GetWindowPlacement
GetForegroundWindow
GetMessagePos
GetMessageTime
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
FindWindowExA
GetClassNameA
GetWindowTextA
AdjustWindowRectEx
MapWindowPoints
InflateRect
FrameRect
CopyRect
GetMenuCheckMarkDimensions
OffsetRect
GetWindowThreadProcessId
PostMessageA
LoadIconA
LoadStringA
UnregisterClassA
PostThreadMessageA
BeginPaint
EndPaint
CallWindowProcA
GetAsyncKeyState
GetClientRect
DestroyWindow
DefWindowProcA
SendMessageA
DefMDIChildProcA
LoadCursorA
SetCursor
TrackMouseEvent
DestroyIcon
PostQuitMessage
SetWindowLongA
DestroyCursor
CreateWindowExA
GetWindowLongA
GetDlgItem
IsWindow
SetFocus
PeekMessageA
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
CheckMenuItem
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
GetMenuItemInfoA
GetMenuStringA
TrackPopupMenu
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
GetSubMenu
SetMenuInfo
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
CreateMenu
ReleaseDC
GetDC
GetDialogBaseUnits
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
CreateDialogParamA
DialogBoxParamA
GetClassInfoExA
EndDialog
RegisterClassExA
SetActiveWindow
DispatchMessageA
TranslateMessage
IsDialogMessageA
TranslateAcceleratorA
GetMessageA
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
SetParent
SetWindowPos
GetFocus
GetWindowRect
GetParent
ScreenToClient
InvalidateRect
ValidateRect
UpdateWindow
MoveWindow
kernel32
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
CreateFileA
WriteFile
IsBadReadPtr
HeapReAlloc
ExitProcess
LocalSize
HeapAlloc
HeapFree
GetProcessHeap
RtlMoveMemory
GetModuleHandleA
lstrcpyn
CloseHandle
ReadProcessMemory
VirtualQueryEx
TerminateProcess
CreateToolhelp32Snapshot
OpenProcess
GetCurrentProcessId
InterlockedExchange
Process32First
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcpynA
FlushFileBuffers
LocalFree
MulDiv
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
lstrcmpiA
GetCurrentThreadId
GetVersion
FindResourceA
LoadResource
LockResource
lstrcatA
SetLastError
lstrlenA
lstrcpyA
Sleep
GetVersionExA
GetCurrentProcess
GetLastError
SetFilePointer
Process32Next
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetTextMetricsA
Ellipse
Arc
CreateEllipticRgnIndirect
SelectClipRgn
MoveToEx
LineTo
CreatePen
SetPixel
GetTextColor
GetTextExtentPoint32A
GetDeviceCaps
CreateCompatibleBitmap
GetPixel
SetBkMode
SetTextColor
CreatePatternBrush
CreateSolidBrush
StretchBlt
CreateRoundRectRgn
CombineRgn
ExtCreateRegion
BitBlt
SelectObject
DeleteDC
CreateDIBSection
CreateCompatibleDC
GetObjectA
GetStockObject
DeleteObject
SetBkColor
shell32
DragAcceptFiles
Shell_NotifyIconA
DragFinish
ShellExecuteA
DragQueryFileA
comctl32
ord17
_TrackMouseEvent
InitCommonControlsEx
ole32
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleInitialize
CreateStreamOnHGlobal
OleIsCurrentClipboard
atl
ord42
oledlg
ord8
olepro32
ord251
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VarR8FromBool
VarR8FromCy
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
msimg32
GradientFill
Sections
.text Size: 240KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE