Behavioral task
behavioral1
Sample
bb869adb67bdbd09db7bfee7bf028216c93b455d7cb27bc7538da87b9a24ade3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb869adb67bdbd09db7bfee7bf028216c93b455d7cb27bc7538da87b9a24ade3.exe
Resource
win10v2004-20220812-en
General
-
Target
bb869adb67bdbd09db7bfee7bf028216c93b455d7cb27bc7538da87b9a24ade3
-
Size
548KB
-
MD5
e610281204191c0dd1543daac22179e9
-
SHA1
c5d1595542b3eb4e25f47a9507d5bd0c17a741a8
-
SHA256
bb869adb67bdbd09db7bfee7bf028216c93b455d7cb27bc7538da87b9a24ade3
-
SHA512
b14fe586f65715d1f93b19ef4ca94631e943c2f4ee250e3f6e4e37d835dce9f52850eb7ced74b95bb420f10fcac919df4b3ec1a9f8e8bd4bab9b15ae1310058f
-
SSDEEP
6144:9qYc99f0KsURG96zrXDGju+P20TGtdXunQJqTYn9tUhgzHK4PN8AbCszcy:9qYyXGMrXC/G/uXYn/zq4VNW0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
bb869adb67bdbd09db7bfee7bf028216c93b455d7cb27bc7538da87b9a24ade3.exe windows x86
41a78847277107bdfe653877ec7cf07c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CreateFileA
GetFileSize
ReadFile
GetEnvironmentVariableA
DeleteFileA
GetModuleFileNameA
Sleep
GetTickCount
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
ReadProcessMemory
WideCharToMultiByte
VirtualQueryEx
Module32Next
LocalAlloc
GetCurrentProcessId
TerminateProcess
QueryDosDeviceA
OpenProcess
GetCurrentProcess
GetSystemDirectoryA
Module32First
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
LocalSize
SetStdHandle
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
RaiseException
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
LeaveCriticalSection
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
RtlUnwind
GetVersion
GetCommandLineA
LCMapStringA
GetProcAddress
FreeLibrary
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetModuleHandleA
LoadLibraryA
RtlMoveMemory
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetFilePointer
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
FlushFileBuffers
CloseHandle
TlsSetValue
InterlockedIncrement
user32
MessageBoxA
wsprintfA
DispatchMessageA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
GetWindowThreadProcessId
GetClassInfoExA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
UnregisterClassA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetTimer
CreateWindowExA
TranslateMessage
GetMessageA
PeekMessageA
MessageBoxA
wsprintfA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
SelectObject
RestoreDC
SaveDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
DeleteDC
DeleteObject
CreateBitmap
GetDeviceCaps
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
psapi
GetProcessImageFileNameA
comctl32
ord17
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 244KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 272KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ