Behavioral task
behavioral1
Sample
034fe5dadb6902d845ff4cdb96402490a065e9936398386f83bd6e3bb8674934.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
034fe5dadb6902d845ff4cdb96402490a065e9936398386f83bd6e3bb8674934.exe
Resource
win10v2004-20221111-en
General
-
Target
034fe5dadb6902d845ff4cdb96402490a065e9936398386f83bd6e3bb8674934
-
Size
2.1MB
-
MD5
3980bf09cbb5f0a770689b3560c5e4c8
-
SHA1
3dea76256362498e118c565a16cc25fbce309e7e
-
SHA256
034fe5dadb6902d845ff4cdb96402490a065e9936398386f83bd6e3bb8674934
-
SHA512
f44077811612cd1fd19f9c26d36373c4c9bf6f1a87ba10b9b02f4dcf9c2a534eec9a7a5c47a10ad1a5b479417cf57357aab75d8094cfa60a55b32f1d6a1a01b7
-
SSDEEP
24576:Sc/GdFaHMv6CorjqnyPQxYkoIKRxzd1e8cw1pb8n6qdxKhcEUh5pYCvGwQqSnYYx:Sx1vqjdPQGg8zwPKm7xvVm
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
034fe5dadb6902d845ff4cdb96402490a065e9936398386f83bd6e3bb8674934.exe windows x86
3de8d23759f7e1150e8e9b88746254d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
IsBadReadPtr
CloseHandle
WriteFile
CreateFileA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
Sleep
FindNextFileA
FindFirstFileA
FindClose
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
GetTickCount
SetFileAttributesA
HeapReAlloc
GetProcAddress
LoadLibraryA
ExitProcess
FlushFileBuffers
SetStdHandle
GetStringTypeW
FreeLibrary
HeapAlloc
GetStringTypeA
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
GetModuleHandleA
GetProcessHeap
RtlMoveMemory
MoveFileExA
SetWaitableTimer
CreateWaitableTimerA
Process32Next
CreateThread
Process32First
CreateToolhelp32Snapshot
LCMapStringA
GetCommandLineA
GetVersion
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
LCMapStringW
VirtualAlloc
shlwapi
PathFileExistsA
user32
TranslateMessage
wsprintfA
GetMessageA
GetMenuInfo
SetMenuInfo
TrackMouseEvent
MsgWaitForMultipleObjects
MessageBoxA
PeekMessageA
DispatchMessageA
atl
ord42
shell32
DragAcceptFiles
Shell_NotifyIconA
DragFinish
DragQueryFileA
advapi32
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegFlushKey
RegQueryValueExA
RegEnumValueA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegCreateKeyA
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ