Behavioral task
behavioral1
Sample
06c90b60dbb2fbexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
06c90b60dbb2fbexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
06c90b60dbb2fbexeexeexeex.exe
-
Size
524KB
-
MD5
06c90b60dbb2fbf4c10d9be3ea09a8e1
-
SHA1
33f774531446c29cfbacd40efc344f1b784dbb5f
-
SHA256
4f2b99c147cc278e15010f41ac60f958cdbff80ac4dd006f5eca3acf2e376709
-
SHA512
c94e2ac8af6b347b640a38a438aba337f7bd43af9e7a1d884e32f8bc5e013551b66b77656127cc7860747b7f468bbbb323c10f339aaeee3d09d468ee273a40c7
-
SSDEEP
6144:y+0m8kZHU0brUxFImb9C5u1wWxclQMgMAn0DUh2q/+Kmy/v0nL:Qm8H0brUXImb9efQMgMALH+Kmo
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06c90b60dbb2fbexeexeexeex.exe
Files
-
06c90b60dbb2fbexeexeexeex.exe.exe windows x86
aebfdbf8b5498e1bf025874461ce8941
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
FreeLibrary
GetCommandLineA
SetCurrentDirectoryA
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileSize
RemoveDirectoryA
SetFilePointer
GetTempPathA
GetTickCount
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateDirectoryA
GetLocalTime
GetEnvironmentVariableA
GetStartupInfoA
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualFree
GetProcAddress
LoadLibraryA
VirtualAlloc
lstrcpynA
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
CreateDirectoryW
SetLastError
GetNativeSystemInfo
GetCurrentProcessId
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
GetCurrentThreadId
DeleteFileA
TerminateThread
GetExitCodeThread
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
TerminateProcess
Process32NextW
Sleep
Process32FirstW
QueryDosDeviceW
OpenProcess
GetTempPathW
lstrlenW
Module32First
WideCharToMultiByte
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemInfo
GetVersionExA
RtlMoveMemory
GetComputerNameA
CloseHandle
GetQueuedCompletionStatus
CreateIoCompletionPort
GetCurrentProcess
LocalFree
LocalAlloc
WaitForSingleObject
CreateThread
MoveFileA
MultiByteToWideChar
DeleteCriticalSection
lstrlenA
SetSystemPowerState
GetLastError
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
user32
PostQuitMessage
SendMessageA
SetCursor
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
ExitWindowsEx
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
UnregisterClassA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
IsWindowEnabled
GetParent
EnableWindow
GetForegroundWindow
PostMessageA
GetWindowThreadProcessId
GetWindowTextA
IsWindowVisible
MsgWaitForMultipleObjects
GetDesktopWindow
GetWindowTextLengthA
FindWindowExA
SetForegroundWindow
GetActiveWindow
ReleaseDC
GetCursorInfo
GetIconInfo
DrawIcon
ClientToScreen
SetCursorPos
WindowFromPoint
GetCursorPos
GetFocus
GetAncestor
AttachThreadInput
SetActiveWindow
GetSystemMetrics
GetTopWindow
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
PeekMessageA
CallWindowProcA
PostMessageW
KillTimer
SetTimer
MapVirtualKeyA
SendInput
advapi32
GetUserNameA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteA
ws2_32
send
gethostbyname
setsockopt
WSACleanup
connect
htons
inet_addr
socket
closesocket
recv
WSAStartup
shlwapi
PathIsDirectoryW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdi32
SetTextColor
SetMapMode
SetBkColor
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
RestoreDC
SaveDC
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
DeleteObject
BitBlt
GdiFlush
GetObjectA
GetStockObject
CreateBitmap
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE