Behavioral task
behavioral1
Sample
94277b6138c74377f3c2a805efa2a2b92dd8c2de05a8cf2d3503f940a84ec71f.exe
Resource
win7-20220812-en
General
-
Target
94277b6138c74377f3c2a805efa2a2b92dd8c2de05a8cf2d3503f940a84ec71f
-
Size
244KB
-
MD5
2a957d023ba95e743fdf618e140da8c9
-
SHA1
6736b8107a8d9727b95d919fca99e76fef3ab9cc
-
SHA256
94277b6138c74377f3c2a805efa2a2b92dd8c2de05a8cf2d3503f940a84ec71f
-
SHA512
d55884bbe9aea4edd24d2d5d98ce3f6697d4809d882519d80655c5d7b9edfdac3834aae53d2febeb35623e88609593d4e9bd9c05192bbf01717844697833b0ec
-
SSDEEP
3072:WFXMiTZOek0drM6a4VsBGcddZ2G3xebtvZxsmz:WFXMiTZxdrpK1vEZA
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
94277b6138c74377f3c2a805efa2a2b92dd8c2de05a8cf2d3503f940a84ec71f.exe windows x86
c08cd11d2e3a7eb165995b072f7df9e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetCurrentProcess
ExitProcess
RtlMoveMemory
VirtualAlloc
VirtualFree
GetStartupInfoA
CreateProcessA
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
CloseHandle
OpenProcess
MultiByteToWideChar
GetProcessHeap
HeapFree
HeapAlloc
InterlockedExchange
LocalSize
lstrlenA
HeapReAlloc
IsBadReadPtr
GetVersionExA
WideCharToMultiByte
GlobalFree
GlobalUnlock
GetCPInfo
GetOEMCP
LCMapStringA
GetModuleFileNameA
GetCommandLineA
GetCurrentDirectoryA
RtlUnwind
GlobalAlloc
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetStdHandle
GetTickCount
GlobalLock
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
lstrcpynA
FlushFileBuffers
LocalFree
MulDiv
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetVersion
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
WriteFile
SetFilePointer
GetLastError
TerminateProcess
Sleep
FreeLibrary
lstrcpyA
LoadLibraryA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
RaiseException
user32
TrackPopupMenu
TrackMouseEvent
DestroyIcon
SetWindowLongA
LoadCursorA
DefMDIChildProcA
ReleaseCapture
SetCapture
DefWindowProcA
DestroyWindow
GetClientRect
GetAsyncKeyState
GetMessageA
GetFocus
IsChild
GetParent
SendMessageA
TranslateAcceleratorA
IsDialogMessageA
TranslateMessage
DispatchMessageA
IsWindow
LoadIconA
FindWindowA
SetTimer
GetWindowThreadProcessId
KillTimer
PostQuitMessage
CreateWindowExA
ShowWindow
BeginPaint
SystemParametersInfoA
GetCursorPos
PtInRect
GetWindow
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
SendDlgItemMessageA
GetWindowPlacement
GetForegroundWindow
GetMessagePos
GetMessageTime
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
PeekMessageA
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
CheckMenuItem
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
GetMenuItemInfoA
GetMenuStringA
CallWindowProcA
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
GetSubMenu
SetMenuInfo
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
CreateMenu
ReleaseDC
GetDC
RegisterClassExA
SetActiveWindow
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
IsWindowVisible
SetParent
PostMessageA
SetWindowPos
MoveWindow
UpdateWindow
ValidateRect
InvalidateRect
ScreenToClient
GetWindowRect
SetFocus
GetClassNameA
GetDlgItem
GetWindowLongA
DestroyCursor
EndPaint
SetCursor
gdi32
SetBkMode
SetBkColor
SetTextColor
CreatePatternBrush
CreateSolidBrush
StretchBlt
SetStretchBltMode
CreateRoundRectRgn
CombineRgn
ExtCreateRegion
BitBlt
SelectObject
DeleteDC
CreateDIBSection
CreateCompatibleDC
GetObjectA
GetStockObject
DeleteObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
DragQueryFileA
DragAcceptFiles
Shell_NotifyIconA
DragFinish
ole32
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
atl
ord42
ord47
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
VarR8FromCy
VarR8FromBool
SafeArrayCreate
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
Sections
.text Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE