Behavioral task
behavioral1
Sample
3b50108ce36f833e566c4e625054e98c5c216dc88a18e3b8a1fe8c2addb2e942.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b50108ce36f833e566c4e625054e98c5c216dc88a18e3b8a1fe8c2addb2e942.exe
Resource
win10v2004-20220901-en
General
-
Target
3b50108ce36f833e566c4e625054e98c5c216dc88a18e3b8a1fe8c2addb2e942
-
Size
168KB
-
MD5
cfba72dfe6db893c846bcdf5a172d0a5
-
SHA1
07f827d9370a4792a387ab6864b9d048f8b4378a
-
SHA256
3b50108ce36f833e566c4e625054e98c5c216dc88a18e3b8a1fe8c2addb2e942
-
SHA512
0735f772eb9c169073ad4cb9938c101145ef745d3e1e3ba642b31ba00ad87c173fabae1b360f1ca522038278469bef35fcc6e5768169db742d383bc680385386
-
SSDEEP
1536:DUSRsEVKgivz6vUAKDynLx+xlMjT3zpFUtLRV1yoLDYtD+yhrkNg56Yh0Dmr/FSD:DmzGUuI7CwrgoLctD+4rkdnDm5ztI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
3b50108ce36f833e566c4e625054e98c5c216dc88a18e3b8a1fe8c2addb2e942.exe windows x86
36a12017bd5bc835398236ff1b96afdc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetModuleFileNameA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CreateFileA
WriteFile
CloseHandle
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
CreateEventA
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
Sleep
GetTickCount
GetTimeZoneInformation
SetLastError
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
GlobalUnlock
LocalFree
GetLastError
lstrcpynA
EnterCriticalSection
lstrcpyA
LocalAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
SetFilePointer
FlushFileBuffers
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
lstrcatA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
GetSystemTime
GetLocalTime
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringW
VirtualAlloc
IsBadWritePtr
OpenEventA
user32
GetMenuCheckMarkDimensions
GetSystemMetrics
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetMenuItemBitmaps
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
LoadBitmapA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
SetWindowTextA
GetMenuState
ModifyMenuA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
SetWindowPos
SetForegroundWindow
ShowWindow
IsWindowVisible
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
EnumWindows
MessageBoxA
GetForegroundWindow
UnregisterClassA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetClipBox
GetDeviceCaps
CreateBitmap
wininet
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetCloseHandle
InternetOpenA
InternetCanonicalizeUrlA
InternetSetOptionA
dbghelp
MakeSureDirectoryPathExists
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
WSAStartup
WSACleanup
recv
send
select
closesocket
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE