Behavioral task
behavioral1
Sample
433ad1da717c8afc3c99526c6792dc197acd7bc607aab16cf0ddd3bdb52fba0d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
433ad1da717c8afc3c99526c6792dc197acd7bc607aab16cf0ddd3bdb52fba0d.exe
Resource
win10v2004-20230703-en
General
-
Target
433ad1da717c8afc3c99526c6792dc197acd7bc607aab16cf0ddd3bdb52fba0d
-
Size
524KB
-
MD5
2e31fedd276be172e2c90212ef5a0638
-
SHA1
e4c9aa7d752b93296d053131950e36c2e5700826
-
SHA256
433ad1da717c8afc3c99526c6792dc197acd7bc607aab16cf0ddd3bdb52fba0d
-
SHA512
55201e2c2fdd515c24520b7d95154cb91256f7a1300da23de2c497da6dbb2af67b7a783015881935090804762e88aa70bfc60bc411abf78fe4658a46705e853a
-
SSDEEP
6144:BKuWscyM+JBF3Uajm7789DLxunGtWEovU0UvUh2q/+Km4/v0d+:ouWsRJBF3Uajm7789DF2Eoc2H+KmS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 433ad1da717c8afc3c99526c6792dc197acd7bc607aab16cf0ddd3bdb52fba0d
Files
-
433ad1da717c8afc3c99526c6792dc197acd7bc607aab16cf0ddd3bdb52fba0d.exe windows x86
d2549c5b2181e0cb6cb8abdaf491719e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
FreeLibrary
GetCommandLineA
SetCurrentDirectoryA
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileSize
RemoveDirectoryA
SetFilePointer
GetTempPathA
GetTickCount
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateDirectoryA
GetLocalTime
GetEnvironmentVariableA
GetStartupInfoA
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualFree
GetProcAddress
LoadLibraryA
VirtualAlloc
lstrcpynA
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
CreateDirectoryW
SetLastError
GetNativeSystemInfo
GetCurrentProcessId
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
GetCurrentThreadId
DeleteFileA
TerminateThread
GetExitCodeThread
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
TerminateProcess
Process32NextW
Sleep
Process32FirstW
QueryDosDeviceW
OpenProcess
GetTempPathW
lstrlenW
Module32First
WideCharToMultiByte
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemInfo
GetVersionExA
GetComputerNameA
CloseHandle
GetQueuedCompletionStatus
CreateIoCompletionPort
GetCurrentProcess
LocalFree
LocalAlloc
WaitForSingleObject
CreateThread
MoveFileA
MultiByteToWideChar
RtlMoveMemory
DeleteCriticalSection
lstrlenA
SetSystemPowerState
GetLastError
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
user32
PostQuitMessage
SendMessageA
SetCursor
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
ExitWindowsEx
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
UnregisterClassA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
IsWindowEnabled
GetParent
EnableWindow
GetForegroundWindow
PostMessageA
GetWindowThreadProcessId
GetWindowTextA
IsWindowVisible
MsgWaitForMultipleObjects
GetDesktopWindow
GetWindowTextLengthA
FindWindowExA
SetForegroundWindow
GetActiveWindow
ReleaseDC
GetCursorInfo
GetIconInfo
DrawIcon
ClientToScreen
SetCursorPos
WindowFromPoint
GetCursorPos
GetFocus
GetAncestor
AttachThreadInput
SetActiveWindow
GetSystemMetrics
GetTopWindow
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
PeekMessageA
CallWindowProcA
PostMessageW
KillTimer
SetTimer
MapVirtualKeyA
SendInput
advapi32
GetUserNameA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteA
ws2_32
connect
setsockopt
htons
recv
inet_addr
socket
closesocket
WSACleanup
gethostbyname
send
WSAStartup
shlwapi
PathIsDirectoryW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdi32
SetTextColor
SetMapMode
SetBkColor
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
RestoreDC
SaveDC
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
DeleteObject
BitBlt
GdiFlush
GetObjectA
GetStockObject
CreateBitmap
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE