DllMianRun
Behavioral task
behavioral1
Sample
f76ad81216ce0a4c6e3979cbbdc50d7875e2d7fef3de25cb96fb0e19f5dcfb19.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f76ad81216ce0a4c6e3979cbbdc50d7875e2d7fef3de25cb96fb0e19f5dcfb19.dll
Resource
win10v2004-20230221-en
General
-
Target
f76ad81216ce0a4c6e3979cbbdc50d7875e2d7fef3de25cb96fb0e19f5dcfb19
-
Size
272KB
-
MD5
38f80eb9150d62115214c2481a05a56b
-
SHA1
efa1b12f38298226afa01e3e4df8ef8c7eca0ef2
-
SHA256
f76ad81216ce0a4c6e3979cbbdc50d7875e2d7fef3de25cb96fb0e19f5dcfb19
-
SHA512
bb3cc2c2cda7cc0dfe2beb51b144b3f5350992c720c575c0b7d056ef9a7e5577aff80d79216cf86227489eeca94af4990f2e8f5a90b1b2c4cd68d035e41f7de3
-
SSDEEP
3072:gBcYHz2bMT+Ce9MyZbnJOFaJUwT8qahl/t7GRweO4ctBADUREyMec4Ob:gBcYHz2bMTk9MoYaKm8NUtsAu4V4q
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon
Files
-
f76ad81216ce0a4c6e3979cbbdc50d7875e2d7fef3de25cb96fb0e19f5dcfb19.dll windows x86
f117fc3b7453aa40ae5091c912c8e1b5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetVersionExA
GetLocalTime
FindClose
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualProtect
VirtualFreeEx
WriteProcessMemory
ReadProcessMemory
VirtualQueryEx
GetCurrentProcessId
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
GetTimeFormatA
GetDateFormatA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
lstrlenA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
MulDiv
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LockResource
LoadResource
FindResourceA
GetProcessVersion
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
CreateThread
CreateWaitableTimerA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
CloseHandle
SetWaitableTimer
gdi32
ScaleWindowExtEx
GetObjectA
GetStockObject
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
GetClipBox
SetBkColor
CreateBitmap
DeleteObject
DeleteDC
SaveDC
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
RestoreDC
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegCreateKeyExA
user32
MsgWaitForMultipleObjects
FindWindowExA
EndDialog
CreateDialogIndirectParamA
DestroyMenu
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SetTimer
CallWindowProcA
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
IsWindow
GetActiveWindow
SetActiveWindow
SetForegroundWindow
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnhookWindowsHookEx
UnregisterClassA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
ole32
OleFlushClipboard
OleInitialize
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
CoUninitialize
OleIsCurrentClipboard
CoInitialize
winhttp
WinHttpCrackUrl
WinHttpSetOption
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpCheckPlatform
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpOpenRequest
WinHttpSetCredentials
WinHttpCloseHandle
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
oledlg
ord8
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
Exports
Exports
Sections
iREZL Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
gcznMy Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
pCrDI Size: 24KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
KaTlh Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
mtffhy Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ