Behavioral task
behavioral1
Sample
5cfdc4d78672df920e446671381617a5e871f967946295cd13011f8b0bfdc5a4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5cfdc4d78672df920e446671381617a5e871f967946295cd13011f8b0bfdc5a4.exe
Resource
win10v2004-20230220-en
General
-
Target
5cfdc4d78672df920e446671381617a5e871f967946295cd13011f8b0bfdc5a4
-
Size
580KB
-
MD5
887079ae51ae430655319f924c408eb4
-
SHA1
e029194a3f970b1193091407c067ece56444d02b
-
SHA256
5cfdc4d78672df920e446671381617a5e871f967946295cd13011f8b0bfdc5a4
-
SHA512
9e1799cce7261d16215cf28db3660c73ff8f3399f8e550537d82c918ba5e34af5186cf7ef6e4c04a5ee732b530915491e9dfa0ff1350dd14924fe927d6de5154
-
SSDEEP
6144:4K1/9LdACi/qza4TkmnPWaPGgDOX6ORn8AUi2WmgrQzGKA:4c/BdBs94jhG6K8bLg/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5cfdc4d78672df920e446671381617a5e871f967946295cd13011f8b0bfdc5a4
Files
-
5cfdc4d78672df920e446671381617a5e871f967946295cd13011f8b0bfdc5a4.exe windows x86
86216bd5af9062dffc2b664a219150c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
DeleteFileA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetCurrentDirectoryA
GetFileSize
ReadFile
CreateFileA
WriteFile
CloseHandle
GetLocalTime
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
GetModuleFileNameA
GetTickCount
IsBadReadPtr
HeapFree
HeapReAlloc
ExitProcess
ReadProcessMemory
GetCurrentProcess
GetTempPathA
GetWindowsDirectoryA
LocalSize
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
HeapAlloc
GetProcessHeap
lstrlenA
CreateThread
GetTimeFormatA
GetDateFormatA
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
GetProcAddress
GetModuleHandleA
LocalFree
RtlFillMemory
LocalAlloc
RtlMoveMemory
DeviceIoControl
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
IsDebuggerPresent
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
GetACP
Sleep
GetTimeZoneInformation
SetLastError
UnmapViewOfFile
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
GetLastError
lstrcpynA
DeleteCriticalSection
SetFilePointer
FlushFileBuffers
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
MulDiv
GlobalFlags
lstrcatA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
HeapSize
RaiseException
TerminateProcess
GetSystemTime
user32
PtInRect
GetDlgCtrlID
GetWindow
UnhookWindowsHookEx
GetMenuItemCount
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetFocus
GetWindowPlacement
SystemParametersInfoA
RegisterWindowMessageA
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
GetCapture
GetTopWindow
GetMenuCheckMarkDimensions
CopyRect
GetClientRect
AdjustWindowRectEx
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
WinHelpA
RegisterClipboardFormatA
SetWindowTextA
IsWindow
PostQuitMessage
LoadBitmapA
GetMenuState
PostMessageA
GetWindowLongA
SendMessageA
SetCursor
ModifyMenuA
SetMenuItemBitmaps
OpenClipboard
CloseClipboard
GetCursorPos
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
KillTimer
SetTimer
SetWindowRgn
DestroyWindow
EqualRect
IntersectRect
CreateWindowExA
GetWindowTextLengthA
EnableWindow
SetClipboardData
EmptyClipboard
PrintWindow
GetWindowRect
IsIconic
EnumDisplaySettingsA
DrawIconEx
LoadImageA
CallWindowProcA
FillRect
TrackMouseEvent
InvalidateRect
EndPaint
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
ShowWindow
SetForegroundWindow
SetWindowPos
MsgWaitForMultipleObjects
BeginPaint
MoveWindow
ClientToScreen
GetDC
ReleaseDC
GetClassInfoExA
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
CombineRgn
CreateRectRgn
CreatePatternBrush
StretchBlt
CreateFontA
CreateDIBitmap
TextOutA
SetBkColor
SetDIBitsToDevice
SetPixelV
GetPixel
CreateCompatibleBitmap
GdiFlush
CreateDIBSection
CreateCompatibleDC
DeleteObject
CreateSolidBrush
DeleteDC
BitBlt
SelectObject
GetDIBits
GetObjectA
SetMapMode
SetTextColor
RestoreDC
SaveDC
CreateBitmap
CreatePalette
GetStockObject
RectVisible
Escape
ExtTextOutA
GetNearestPaletteIndex
PtVisible
GetDeviceCaps
wininet
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
CryptGetHashParam
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
shell32
SHGetSpecialFolderPathA
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoRegisterMessageFilter
CoFreeUnusedLibraries
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
oleaut32
LoadTypeLi
LHashValOfNameSys
VariantChangeType
VariantCopy
RegisterTypeLi
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
SafeArrayCreate
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SysAllocString
VarR8FromBool
shlwapi
PathIsDirectoryA
PathFileExistsA
StrDupA
dbghelp
MakeSureDirectoryPathExists
msimg32
TransparentBlt
oledlg
ord8
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
WSAStartup
WSACleanup
send
recv
select
closesocket
Sections
.text Size: 420KB - Virtual size: 417KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE