Behavioral task
behavioral1
Sample
e1c44b67241dcb9910a98044bb220de2fde5bc67813e3efe4c24a689bc7e4020.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
e1c44b67241dcb9910a98044bb220de2fde5bc67813e3efe4c24a689bc7e4020.exe
Resource
win10v2004-20230621-en
General
-
Target
e1c44b67241dcb9910a98044bb220de2fde5bc67813e3efe4c24a689bc7e4020
-
Size
2.6MB
-
MD5
f9ccab22c27550d8c1d2e872469699ab
-
SHA1
f98db620b64e1bf07b6dc3e2b7bc11fadb81ce41
-
SHA256
e1c44b67241dcb9910a98044bb220de2fde5bc67813e3efe4c24a689bc7e4020
-
SHA512
38b241a9e2d668630974234bee0c9c3ef00c40d380f25d6c3eb593ab9301554cc40eb20bb04d141467bc12608333ad007af094be4c15be6c2a7e420b115916a9
-
SSDEEP
24576:e5U2ZKrZC72i5Uy0H7FAbLOI2YBpPuiv7duC2156+0qjOtPvWitZZ4lVwqD+M4Ty:ef46bL9Pq2PvWBw79ZCsHz0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e1c44b67241dcb9910a98044bb220de2fde5bc67813e3efe4c24a689bc7e4020
Files
-
e1c44b67241dcb9910a98044bb220de2fde5bc67813e3efe4c24a689bc7e4020.exe windows x86
0613d413d6c9bfc8d5ad51ec9f81d982
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
LCMapStringA
CreateDirectoryA
WriteFile
GetFileSize
ReadFile
CloseHandle
GetLocalTime
Sleep
WritePrivateProfileStringA
SetLocalTime
GetPrivateProfileStringA
GetModuleFileNameA
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
WriteProcessMemory
ReadProcessMemory
CreateProcessA
Module32First
lstrcpyn
TerminateProcess
OpenProcess
CreateEventA
OpenEventA
CreateMutexA
GetCurrentProcessId
Process32Next
Process32First
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
VirtualProtect
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
CreateFileA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
VirtualFree
VirtualAlloc
IsDebuggerPresent
SetStdHandle
IsBadCodePtr
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateThread
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
lstrlenA
InterlockedIncrement
InterlockedDecrement
LocalFree
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
lstrcatA
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GetProcessVersion
SetErrorMode
GetCurrentProcess
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
HeapSize
RaiseException
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
ws2_32
accept
socket
htons
inet_addr
connect
send
recv
gethostname
sendto
bind
htonl
getpeername
inet_ntoa
__WSAFDIsSet
getsockname
ntohs
WSAAsyncSelect
select
gethostbyname
listen
closesocket
recvfrom
WSACleanup
WSAStartup
user32
PtInRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetForegroundWindow
GetMenuCheckMarkDimensions
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
LoadBitmapA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
GetDC
ReleaseDC
EnumChildWindows
PostMessageA
CreateWindowStationA
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindowVisible
RegisterClipboardFormatA
GetMessagePos
SetWindowPos
SetForegroundWindow
PostThreadMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetWindowRect
MoveWindow
shlwapi
PathFileExistsA
gdi32
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
RestoreDC
GetStockObject
GetObjectA
GetDeviceCaps
SaveDC
CreateBitmap
CreateDIBitmap
SelectObject
DeleteDC
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
shell32
ShellExecuteA
ole32
CoInitializeEx
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
wininet
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetOpenA
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
comctl32
ord17
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ