Start
Behavioral task
behavioral1
Sample
806faab318cbbd98645d83e6db217a164302f966dacf2c860ed45f2aa64b6f16.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
806faab318cbbd98645d83e6db217a164302f966dacf2c860ed45f2aa64b6f16.dll
Resource
win10v2004-20221111-en
General
-
Target
806faab318cbbd98645d83e6db217a164302f966dacf2c860ed45f2aa64b6f16
-
Size
432KB
-
MD5
7c04489ffff1f3f15a7f0a70ea054564
-
SHA1
78d3699bc08dd063cd52f7b16ef8bd145eacb1d7
-
SHA256
806faab318cbbd98645d83e6db217a164302f966dacf2c860ed45f2aa64b6f16
-
SHA512
177b0b54508ff3224f960ed0f128498a2f1854d526f15d2c609a007a4f8d1f670215311438eb75195ca812d4e75cc710428b9c580664aa9ddf6a256193d4e2fe
-
SSDEEP
6144:JYDSn+YFZ8pgZ/QDcv1WYpcVLoaVcTg2iwQ+Syo:JYDi+YL3ZIDutpcVFR9wQ6
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
806faab318cbbd98645d83e6db217a164302f966dacf2c860ed45f2aa64b6f16.dll windows x86
797b9fba1a3e37c57b364fc10664c39c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockFile
UnlockFile
SetEndOfFile
lstrcpynA
GetFullPathNameA
GetFileTime
LocalAlloc
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalHandle
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
GetCurrentDirectoryA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
GetSystemTime
GetLocalTime
HeapSize
GetACP
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
IsBadWritePtr
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadCodePtr
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentThreadId
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
WinExec
lstrcatA
WriteProfileStringA
SetLastError
GetProfileStringA
CreateDirectoryA
GetSystemDirectoryA
EnumResourceNamesA
CopyFileA
Sleep
GetWindowsDirectoryA
GetTempPathA
GlobalMemoryStatus
Module32First
Module32Next
OpenProcess
InterlockedExchange
TerminateProcess
GetDriveTypeA
GetVolumeInformationA
GetLastError
GetFileSize
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
RemoveDirectoryA
FindNextFileA
FindClose
DeleteFileA
MultiByteToWideChar
GlobalAlloc
LoadLibraryExA
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcpyA
GlobalLock
GlobalSize
GlobalUnlock
GlobalFree
WriteFile
ReadFile
SetFilePointer
GetLocaleInfoA
GetSystemDefaultLangID
GetTimeZoneInformation
CreateFileA
DeviceIoControl
lstrlenA
GetVersion
GetVersionExA
LoadLibraryA
GetProcAddress
GetCurrentProcess
FreeLibrary
QueryPerformanceCounter
QueryPerformanceFrequency
TlsFree
DuplicateHandle
MulDiv
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
VerLanguageNameA
GetModuleFileNameA
GetCommandLineA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CloseHandle
Process32Next
Process32First
VirtualAlloc
CreateToolhelp32Snapshot
user32
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
PostMessageA
PostQuitMessage
WindowFromPoint
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
EnumWindows
GetWindowTextA
FindWindowExA
IsRectEmpty
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
ChangeDisplaySettingsA
EnumDisplaySettingsA
SendMessageTimeoutA
FindWindowA
GetWindowThreadProcessId
SetCursorPos
mouse_event
keybd_event
OpenClipboard
EmptyClipboard
LoadCursorA
CloseClipboard
GetClassNameA
IsWindow
SendMessageA
GrayStringA
GetWindowRect
ReleaseCapture
SetCapture
GetSystemMetrics
LoadImageA
VkKeyScanExA
GetDC
ReleaseDC
GetKeyboardLayout
SendDlgItemMessageA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
LoadStringA
UnregisterClassA
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
LoadBitmapA
DestroyWindow
GetKeyboardState
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
IsIconic
GetWindowPlacement
SetFocus
SetWindowPos
IsDialogMessageA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
UnhookWindowsHookEx
CharUpperA
DestroyMenu
GetDesktopWindow
GetSysColorBrush
SetClipboardData
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
RegisterClassA
gdi32
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
GetObjectA
RealizePalette
GetDIBits
CreateDCA
CreateCompatibleBitmap
GetPixel
GetDeviceCaps
RemoveFontResourceA
AddFontResourceA
EnumFontFamiliesExA
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
SelectPalette
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
Escape
iphlpapi
GetAdaptersInfo
SendARP
shlwapi
PathAppendA
SHDeleteValueA
SHDeleteKeyA
PathFileExistsA
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
WNetCancelConnection2A
WNetAddConnection2A
winmm
mciSendStringA
waveOutGetDevCapsA
waveOutGetNumDevs
ws2_32
inet_addr
gethostbyname
gethostname
inet_ntoa
gethostbyaddr
WSACleanup
closesocket
connect
sendto
socket
WSAStartup
htons
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
comdlg32
GetFileTitleA
PrintDlgA
winspool.drv
EnumPrintersA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
SetPrinterA
GetPrinterA
advapi32
RegCloseKey
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
AddAce
InitializeAcl
FreeSid
AllocateAndInitializeSid
RegGetKeySecurity
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegDeleteValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegOpenKeyA
RegEnumKeyA
RegQueryInfoKeyA
RegSetKeySecurity
RegDeleteKeyA
RegCreateKeyA
GetTokenInformation
GetLengthSid
RegOpenKeyExA
CopySid
shell32
ShellExecuteA
SHChangeNotify
SHEmptyRecycleBinA
SHGetSpecialFolderPathA
comctl32
ord17
ole32
CoCreateInstance
CoCreateGuid
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
Exports
Exports
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ