Behavioral task
behavioral1
Sample
90cecedd17d191308da7236a08d08bd7372ece998e1d807a53eb3fcfeeff8570.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
90cecedd17d191308da7236a08d08bd7372ece998e1d807a53eb3fcfeeff8570.exe
Resource
win10v2004-20230703-en
General
-
Target
90cecedd17d191308da7236a08d08bd7372ece998e1d807a53eb3fcfeeff8570
-
Size
5.8MB
-
MD5
a151808442abe020399bdbd264719ee9
-
SHA1
92f4968cc2c44c9faa2047bdcb3e78b4cabef03f
-
SHA256
90cecedd17d191308da7236a08d08bd7372ece998e1d807a53eb3fcfeeff8570
-
SHA512
4cd06bfee51c8fc06aa5e974555598deae91beba2202d3b60aa8005594fabff9a821771ae6b0346b019a3ceed5b58394d862c25a3d1ab4e0cc00ee9c7c7b5567
-
SSDEEP
98304:o8+Gu0BdNZRAP4iqAnRwjDvzLYoGpENoj:9T7oGAnR+vTGEoj
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90cecedd17d191308da7236a08d08bd7372ece998e1d807a53eb3fcfeeff8570
Files
-
90cecedd17d191308da7236a08d08bd7372ece998e1d807a53eb3fcfeeff8570.exe windows x86
ca63846a99c53412cab69b2ac0fd304d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
FlushFileBuffers
GlobalReAlloc
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetLocalTime
GetCurrentThread
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
GetCommandLineA
SetFilePointer
GetFileSize
ReadFile
CopyFileA
CreateDirectoryA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
MoveFileA
GetTickCount
DeleteFileA
CreateFileA
WriteFile
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
LocalFree
LocalAlloc
WideCharToMultiByte
lstrlenW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
user32
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetFocus
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
ShowWindow
SetWindowPos
SetWindowLongA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetKeyState
UnregisterClassA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
SelectObject
RestoreDC
SaveDC
GetObjectA
GetStockObject
DeleteDC
DeleteObject
Escape
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
CreateBitmap
psapi
GetProcessImageFileNameW
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
comctl32
ord17
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.7MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ