Behavioral task
behavioral1
Sample
a28ac053f34b96f3f1d05762df2c753bcd225858536a9493d283efc931f36fbc.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a28ac053f34b96f3f1d05762df2c753bcd225858536a9493d283efc931f36fbc.exe
Resource
win10v2004-20230703-en
General
-
Target
a28ac053f34b96f3f1d05762df2c753bcd225858536a9493d283efc931f36fbc
-
Size
1.5MB
-
MD5
62fcc10ec4021f7f75e3030c2524eb63
-
SHA1
e416976ad79b16f5ca7e5f1b10206516b313ec9a
-
SHA256
a28ac053f34b96f3f1d05762df2c753bcd225858536a9493d283efc931f36fbc
-
SHA512
661e6b909a14e1d57ea9a90aac95320b41c08f985af2977846d91e423879d5258afc508ccb070f26c14f4c7be4b5984e44d90257de45cc62df9cf9ccdaa2c517
-
SSDEEP
24576:bi+lI9QEHW3c2188H2zODnP43Dip9UrQvIJtYfTFuKiUR5Z3F6HK:apV21sALpWUZj3F6HK
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a28ac053f34b96f3f1d05762df2c753bcd225858536a9493d283efc931f36fbc
Files
-
a28ac053f34b96f3f1d05762df2c753bcd225858536a9493d283efc931f36fbc.exe windows x86
c3b93218757fbb9728d739796de030ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
FreeLibrary
GetCommandLineA
LCMapStringA
SetFileAttributesA
WriteFile
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
CreateFileA
GetFileSize
ReadFile
GetPrivateProfileStringA
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetLastError
GetVersionExA
IsBadReadPtr
GetSystemInfo
IsProcessorFeaturePresent
lstrcmpiA
GetWindowsDirectoryA
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
WritePrivateProfileStringA
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
lstrcpyn
CreateThread
WideCharToMultiByte
lstrlenW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
GetLocalTime
Sleep
VirtualFree
VirtualAlloc
GlobalMemoryStatusEx
GetLogicalProcessorInformation
GetProcAddress
GetVersion
CreateEventA
OpenEventA
CreateFileMappingA
OpenFileMappingA
CreateMutexA
VirtualProtect
gdi32
RestoreDC
SaveDC
CreateBitmap
TranslateCharsetInfo
GetDeviceCaps
CreateFontA
DeleteObject
DeleteDC
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
advapi32
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegQueryValueExA
shlwapi
PathFileExistsA
ws2_32
ntohs
WSAAsyncSelect
select
WSACleanup
gethostbyname
getsockname
recv
send
connect
htons
inet_addr
socket
closesocket
WSAStartup
inet_ntoa
user32
MessageBoxA
GetForegroundWindow
SendInput
keybd_event
GetAsyncKeyState
GetWindowInfo
MoveWindow
wsprintfA
GetCursorPos
GetWindowThreadProcessId
SetLayeredWindowAttributes
SetWindowLongA
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindowLongA
IsWindow
ReleaseDC
GetWindowRect
GetDesktopWindow
GetDC
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetSystemMetrics
EnableWindow
GetParent
IsWindowEnabled
GetActiveWindow
SetForegroundWindow
CallWindowProcA
CreateWindowExA
GetSysColor
LoadBitmapA
RegisterHotKey
ReleaseCapture
ScreenToClient
SendMessageA
SetCapture
UnregisterHotKey
PostQuitMessage
PostMessageA
SetCursor
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
PtInRect
GetDlgCtrlID
GetWindow
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
ClientToScreen
UnregisterClassA
shell32
SHGetSpecialFolderPathA
DragAcceptFiles
DragFinish
DragQueryFileA
psapi
GetProcessImageFileNameW
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
ImageList_BeginDrag
Sections
.text Size: 692KB - Virtual size: 688KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 732KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ