Behavioral task
behavioral1
Sample
f8ed1d2c9e3ac13f76e180e89ab7929a21134d19a5b2cd848d5fa41cf9dd7127.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f8ed1d2c9e3ac13f76e180e89ab7929a21134d19a5b2cd848d5fa41cf9dd7127.exe
Resource
win10v2004-20230824-en
General
-
Target
f8ed1d2c9e3ac13f76e180e89ab7929a21134d19a5b2cd848d5fa41cf9dd7127
-
Size
1.2MB
-
MD5
d90c9cde3f8a582b86a6d5b1f2be1ac6
-
SHA1
4d37d16edb1bd4872954b1cdba19fcfb53bb87bd
-
SHA256
f8ed1d2c9e3ac13f76e180e89ab7929a21134d19a5b2cd848d5fa41cf9dd7127
-
SHA512
a2f37a08d594b88b293f76c4491cff123f659d8064cb42b59179b4d882192d04a25d5df3e3c210cc01a6690a2ab02b814f115337326e8551943ef654f6f61eda
-
SSDEEP
24576:a01ElhnesqSco3FjWG+TafTFuKiUR5Z3FwMsTb7DL8:X+giZj3F98z4
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8ed1d2c9e3ac13f76e180e89ab7929a21134d19a5b2cd848d5fa41cf9dd7127
Files
-
f8ed1d2c9e3ac13f76e180e89ab7929a21134d19a5b2cd848d5fa41cf9dd7127.exe windows x86
fb84d623699a6e544f72fcf873bf225d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualAlloc
Process32Next
Process32First
CreateFileA
GetCurrentProcessId
OpenFileMappingA
FreeLibrary
GetModuleFileNameA
GetCommandLineA
LCMapStringA
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
GetLocalTime
WritePrivateProfileStringA
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetProcAddress
LoadLibraryA
GetModuleHandleA
RtlMoveMemory
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
GetDiskFreeSpaceExA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
lstrcpynA
GetLastError
GetCurrentProcess
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
Sleep
CreateThread
lstrlenW
WideCharToMultiByte
GetTickCount
CloseHandle
CreateEventA
OpenEventA
CreateMutexA
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GlobalMemoryStatusEx
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
GetTempPathA
VirtualProtect
user32
UnhookWindowsHookEx
GetMenuItemCount
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
GetDlgCtrlID
CopyRect
ClientToScreen
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
UnregisterHotKey
PtInRect
GetMenuCheckMarkDimensions
ValidateRect
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
PeekMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetWindowTextA
SetCapture
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetNextDlgTabItem
GetKeyState
GetClassNameA
GetWindowThreadProcessId
CreateWindowStationA
FindWindowExA
GetParent
GetWindowTextLengthW
GetWindowTextW
FindWindowA
SetLayeredWindowAttributes
GetCursorPos
IsWindow
GetAsyncKeyState
GetWindowInfo
SendInput
MessageBoxA
GetClientRect
GetWindow
CallNextHookEx
GetSystemMetrics
OpenClipboard
EmptyClipboard
CloseClipboard
CreateDialogIndirectParamA
UpdateWindow
GetMessageA
SendMessageA
DestroyWindow
PostQuitMessage
SetWindowTextA
GetDlgItem
ShowWindow
SetWindowLongA
GetWindowRect
ScreenToClient
SetWindowPos
GetWindowLongA
GetWindowTextLengthA
wsprintfA
UnregisterClassA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
ShellExecuteA
gdi32
CreateFontA
GetDeviceCaps
TranslateCharsetInfo
DeleteObject
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetStockObject
GetObjectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
shlwapi
PathFileExistsA
ws2_32
recv
getsockname
ntohs
send
select
WSACleanup
gethostbyname
connect
inet_addr
htons
socket
closesocket
WSAAsyncSelect
WSAStartup
psapi
GetProcessImageFileNameA
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
ImageList_BeginDrag
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 792KB - Virtual size: 892KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ