Behavioral task
behavioral1
Sample
e0a1fa61a28474cd7bdd5bab8efede066fd7ad498d07a7e00247c7da8a5f2769.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e0a1fa61a28474cd7bdd5bab8efede066fd7ad498d07a7e00247c7da8a5f2769.exe
Resource
win10v2004-20230703-en
General
-
Target
e0a1fa61a28474cd7bdd5bab8efede066fd7ad498d07a7e00247c7da8a5f2769
-
Size
548KB
-
MD5
12138eba5db351a2e3409f2b6e14794d
-
SHA1
1554c6887623235de3d245266902372943010e34
-
SHA256
e0a1fa61a28474cd7bdd5bab8efede066fd7ad498d07a7e00247c7da8a5f2769
-
SHA512
a6100afc434c33f4e0aafa17ac2bff16161c9d96e0e26b3c71cf47181a56ac990d83200bd1637b0c15dc9403dd5f75200c9faaf4619762da8823ad312e038a7b
-
SSDEEP
12288:UnWxNKJqyCWRD+nkrcdh2iuEi6T/Dg85JOlJ:UnWxNKJqyN+Kc2oFT/Dg8fO7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0a1fa61a28474cd7bdd5bab8efede066fd7ad498d07a7e00247c7da8a5f2769
Files
-
e0a1fa61a28474cd7bdd5bab8efede066fd7ad498d07a7e00247c7da8a5f2769.exe windows x86
998b264bb55f3baea1e412dbb5d046b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
kernel32
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalUnlock
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalLock
GetVersion
GetProcessVersion
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
GetVersionExA
GetTickCount
GetLocalTime
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
Sleep
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreatePipe
lstrcpyn
GetProcAddress
GetModuleHandleA
GetCurrentProcess
WaitForSingleObject
CreateProcessW
HeapFree
OpenProcess
LocalFree
lstrcmpiW
LocalAlloc
FindClose
FindFirstFileW
MultiByteToWideChar
CloseHandle
Process32Next
CreateToolhelp32Snapshot
WideCharToMultiByte
lstrlenW
GlobalFree
RtlMoveMemory
GlobalAlloc
HeapAlloc
GetProcessHeap
GlobalGetAtomNameA
user32
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallWindowProcA
WaitForInputIdle
CloseDesktop
CreateDesktopW
LoadStringA
GetDlgItem
UnregisterClassA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
DeleteObject
CreateBitmap
DeleteDC
SaveDC
RestoreDC
GetDeviceCaps
SelectObject
advapi32
RegQueryInfoKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegFlushKey
RegQueryValueExA
RegEnumValueA
LookupAccountSidW
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegCreateKeyA
CreateProcessWithTokenW
DuplicateTokenEx
OpenProcessToken
CreateProcessAsUserW
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
Sections
.text Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 352KB - Virtual size: 413KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ