Behavioral task
behavioral1
Sample
682e82ef03d01a63e6343af464acf99e30b698b4ba5f0e27f2afe0b2cb8497c1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
682e82ef03d01a63e6343af464acf99e30b698b4ba5f0e27f2afe0b2cb8497c1.exe
Resource
win10v2004-20230703-en
General
-
Target
682e82ef03d01a63e6343af464acf99e30b698b4ba5f0e27f2afe0b2cb8497c1
-
Size
1.2MB
-
MD5
898adaaea2ee3055e18ee317912d6283
-
SHA1
fd43e9cbce50534e80f68fb6a2fa0730a2d73692
-
SHA256
682e82ef03d01a63e6343af464acf99e30b698b4ba5f0e27f2afe0b2cb8497c1
-
SHA512
5815b24f8ae7a8b0f17ebd8fbb35cd24a941b6e7c3c20f90648eff8bb0571415b42099af69613c3ffefaf6e607234e7330a02bf9f328eef217149eb1f0040963
-
SSDEEP
24576:DMD2vAIz2nqFYB0jWaJUfTFuKiUR5Z3FDDLlAbz:O+AZj3FfK/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 682e82ef03d01a63e6343af464acf99e30b698b4ba5f0e27f2afe0b2cb8497c1
Files
-
682e82ef03d01a63e6343af464acf99e30b698b4ba5f0e27f2afe0b2cb8497c1.exe windows x86
7bdbbeac09ff412504f1b7194e9646f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
Process32Next
Process32First
CreateFileA
VirtualFree
GetCurrentProcessId
OpenFileMappingA
FreeLibrary
GetModuleFileNameA
GetCommandLineA
LCMapStringA
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
GetLocalTime
WritePrivateProfileStringA
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetProcAddress
LoadLibraryA
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
GetTempPathA
GetDiskFreeSpaceExA
GetWindowsDirectoryA
GetVersionExA
RtlMoveMemory
GetCurrentProcess
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
lstrcpynA
Sleep
CreateThread
lstrlenW
WideCharToMultiByte
GetTickCount
CloseHandle
CreateEventA
OpenEventA
CreateMutexA
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
GetLastError
CreateFileMappingA
GlobalMemoryStatusEx
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
GetSystemDirectoryA
VirtualProtect
user32
UnhookWindowsHookEx
GetMenuItemCount
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
GetDlgCtrlID
CopyRect
ClientToScreen
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
UnregisterHotKey
PtInRect
GetMenuCheckMarkDimensions
ValidateRect
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
PeekMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetWindowTextA
SetCapture
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetNextDlgTabItem
GetKeyState
GetClassNameA
GetWindowThreadProcessId
CreateWindowStationA
FindWindowExA
GetParent
GetWindowTextLengthW
GetWindowTextW
FindWindowA
SetLayeredWindowAttributes
GetCursorPos
GetAsyncKeyState
SendInput
GetWindowInfo
MessageBoxA
wsprintfA
GetClientRect
GetWindow
CallNextHookEx
GetSystemMetrics
OpenClipboard
EmptyClipboard
CloseClipboard
CreateDialogIndirectParamA
UpdateWindow
GetMessageA
SendMessageA
DestroyWindow
PostQuitMessage
SetWindowTextA
GetDlgItem
ShowWindow
SetWindowLongA
GetWindowRect
ScreenToClient
SetWindowPos
GetWindowLongA
GetWindowTextLengthA
UnregisterClassA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
ShellExecuteA
gdi32
CreateFontA
GetDeviceCaps
TranslateCharsetInfo
CreateBitmap
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
GetObjectA
SetWindowExtEx
ScaleWindowExtEx
shlwapi
PathFileExistsA
ws2_32
recv
getsockname
ntohs
send
select
WSACleanup
gethostbyname
connect
inet_addr
htons
socket
closesocket
WSAAsyncSelect
WSAStartup
psapi
GetProcessImageFileNameA
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
ImageList_BeginDrag
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 372KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 792KB - Virtual size: 895KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ