Behavioral task
behavioral1
Sample
a7f8089d3a33329e1bd37a4b802e4cdb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7f8089d3a33329e1bd37a4b802e4cdb.exe
Resource
win10v2004-20220901-en
General
-
Target
a7f8089d3a33329e1bd37a4b802e4cdb.exe
-
Size
2.0MB
-
MD5
a7f8089d3a33329e1bd37a4b802e4cdb
-
SHA1
fd70a39e6a9f355546fb2d13ecb943ffc02cb2a0
-
SHA256
da1def22e92bbfa93dbb221c28d35e82ab2a82472893a0e7a1e56921b1a05c52
-
SHA512
698671142cbe9dac2d9db01e8810874a194a75a13c725785a8a5d096a33610fc1b11af38fc939c2a4c1eee4275dc2c7da00249b26e0ecede637ada1cde7208f4
-
SSDEEP
49152:fstyTbefPOI3kntRDDDDDDn2IiUwtm045FfZ:UuuPQGm04Px
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
a7f8089d3a33329e1bd37a4b802e4cdb.exe.exe windows x86
1deabcb2e45a292261c481b80ffdd1ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
ws2_32
WSACleanup
WSAStartup
gethostname
kernel32
WriteFile
CreateFileA
FindNextFileA
FindFirstFileA
FindClose
GetVersionExA
GetModuleFileNameA
GetTickCount
Sleep
GetCommandLineA
FreeLibrary
SetFileAttributesA
LCMapStringA
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
SetThreadExecutionState
CreateDirectoryA
WaitForSingleObject
GetStartupInfoA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GlobalFree
SetWaitableTimer
CreateWaitableTimerA
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
TerminateProcess
WideCharToMultiByte
lstrcpyn
GetCurrentProcessId
GetProcAddress
GetModuleHandleA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
IsWow64Process
OpenProcess
LoadLibraryA
user32
MsgWaitForMultipleObjects
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
MessageBoxA
DispatchMessageA
wsprintfA
advapi32
RegEnumValueA
EnumDependentServicesA
EnumServicesStatusExA
EnumServicesStatusA
ChangeServiceConfigA
ControlService
DeleteService
GetServiceKeyNameA
GetServiceDisplayNameA
ChangeServiceConfig2A
QueryServiceConfig2A
QueryServiceConfigA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegFlushKey
RegQueryInfoKeyA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyA
StartServiceA
CreateServiceA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
psapi
GetModuleFileNameExA
EnumProcessModules
msvcrt
_stricmp
free
malloc
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
_ftol
atoi
strncpy
sprintf
__CxxFrameHandler
strchr
realloc
modf
memmove
strncmp
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE