Behavioral task
behavioral1
Sample
6c71854896b4ebde922d035e0ef2cd2e48d5302f1d68c63d3d7f3a5cf623d89b.exe
Resource
win7-20230712-en
General
-
Target
6c71854896b4ebde922d035e0ef2cd2e48d5302f1d68c63d3d7f3a5cf623d89b
-
Size
4.6MB
-
MD5
05c38aedfb57cbd358c76cbbf78e8471
-
SHA1
b5d73c8c2686101ef5ac0bdd9e8c2de684ae0288
-
SHA256
6c71854896b4ebde922d035e0ef2cd2e48d5302f1d68c63d3d7f3a5cf623d89b
-
SHA512
249255a7c2b8861b98e6ea704811956391144e8b299412cc0c36252190d4c253bdeadccda9b7fc6babc7b2aa0e4afa38f042af3f0f0f64d5a9a0c255d57f6404
-
SSDEEP
49152:XXTQ4Gy8Z0oZY1YUZdSeALSovXmkr87pd6QcBn9N4P0OxvDbtWqVdR/bZLa7m/f2:nTQ4Gy8Z0oZYHsTfgNExN4boq/NVfLwh
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c71854896b4ebde922d035e0ef2cd2e48d5302f1d68c63d3d7f3a5cf623d89b
Files
-
6c71854896b4ebde922d035e0ef2cd2e48d5302f1d68c63d3d7f3a5cf623d89b.exe windows x86
187ffb0b072c1c66034fc36b16412193
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LCMapStringA
CreateThread
SetFileAttributesA
DeleteCriticalSection
GetTickCount
Sleep
GetFileSize
ReadFile
WriteFile
CloseHandle
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
LoadLibraryA
CreateFileA
GetLastError
RtlMoveMemory
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
LocalSize
lstrlenW
LocalAlloc
HeapCreate
VirtualFree
GetStartupInfoA
GlobalUnlock
GlobalFree
GetFileType
GetStdHandle
SetHandleCount
GetLastError
TlsGetValue
SetLastError
TlsFree
MultiByteToWideChar
GlobalLock
GlobalAlloc
LocalFree
RtlMoveMemory
SetStdHandle
GetModuleHandleA
TlsAlloc
TlsSetValue
IsBadWritePtr
GetProcAddress
IsBadReadPtr
GetCommandLineA
GetVersion
RtlUnwind
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
VirtualProtectEx
VirtualAlloc
GetProcessHeap
ExitProcess
LoadLibraryW
GetCurrentThreadId
GetModuleFileNameA
RaiseException
HeapAlloc
HeapReAlloc
HeapFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SetFilePointer
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
MapViewOfFile
FlushFileBuffers
LCMapStringA
LoadLibraryA
FreeLibrary
GetCurrentDirectoryA
GetLocalTime
Sleep
GetTempPathA
GetTickCount
GetFileSize
ReadFile
CreateFileA
WriteFile
CloseHandle
CreateFileMappingA
user32
MessageBoxA
GetAsyncKeyState
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowThreadProcessId
wsprintfA
SendInput
FindWindowA
PeekMessageA
PeekMessageA
TrackMouseEvent
GetSystemMetrics
OpenClipboard
DispatchMessageA
TranslateMessage
GetMessageA
GetClipboardData
GetCursorPos
wsprintfA
MessageBoxA
ShowWindow
CloseClipboard
CallWindowProcA
IsWindow
ReleaseDC
UpdateLayeredWindow
GetDC
GetWindowRect
GetWindowLongA
GetClassNameA
EnumWindows
GetAncestor
SendMessageA
EnumChildWindows
GetPropA
SetPropA
CreateWindowExA
advapi32
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CreateServiceA
StartServiceA
ControlService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
shlwapi
PathFindFileNameA
PathFileExistsA
PathFileExistsA
gdi32
DeleteObject
CreateDIBSection
DeleteDC
SelectObject
CreateCompatibleDC
gdiplus
GdipSetSmoothingMode
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDisposeImage
GdiplusStartup
GdipSetSolidFillColor
GdipDeletePen
GdipGetImageHeight
GdipGetImageWidth
GdipDrawRectangleI
GdipLoadImageFromStream
GdipLoadImageFromFile
GdipGetRegionBounds
GdipSetTextRenderingHint
GdipDeleteBrush
GdipCreateSolidFill
GdipCreateFromHDC
ole32
CLSIDFromString
CreateStreamOnHGlobal
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
ImmGetCompositionStringW
ImmAssociateContext
shell32
SHAppBarMessage
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteA
winmm
PlaySoundA
msvcrt
atoi
_ftol
rand
_CIfmod
_CIpow
srand
sprintf
__CxxFrameHandler
strncmp
memmove
free
malloc
modf
strchr
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.2MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ