Behavioral task
behavioral1
Sample
ca4baf862b74aad1cd4ccfe76229202e79abd8541f70129a1ec64232bf26a86e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ca4baf862b74aad1cd4ccfe76229202e79abd8541f70129a1ec64232bf26a86e.exe
Resource
win10v2004-20230703-en
General
-
Target
ca4baf862b74aad1cd4ccfe76229202e79abd8541f70129a1ec64232bf26a86e
-
Size
13.7MB
-
MD5
0fa94f81975f78ec8c48cf9c4e6e131c
-
SHA1
663cc9b7f42b04f93c1838412db1348589cd6aef
-
SHA256
ca4baf862b74aad1cd4ccfe76229202e79abd8541f70129a1ec64232bf26a86e
-
SHA512
ee5038512789e31f4b1e86ee45b69eb3772e7f8537036ebf84340e76d0d715a5eac7a41f59321679d97a9b7c881910ce0ecffd93a29ac69aac73934f772d6f9b
-
SSDEEP
393216:HdE/7C/Y8jcM3xVRWT0cjJ3/7cv0vPKJxPA6NceE:Hm/7CQmxUppqJxPA6S
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca4baf862b74aad1cd4ccfe76229202e79abd8541f70129a1ec64232bf26a86e
Files
-
ca4baf862b74aad1cd4ccfe76229202e79abd8541f70129a1ec64232bf26a86e.exe windows x86
aec0713d60d8c508ad171a9365bb08c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetModuleFileNameA
WritePrivateProfileStringA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
GetTempPathA
GetSystemDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
MulDiv
lstrcatA
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
WriteFile
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
InterlockedDecrement
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
SetFileAttributesA
GetPrivateProfileStringA
GetTickCount
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
GetWindowsDirectoryA
DeleteFileA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
Sleep
CreateThread
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
Process32Next
Process32First
CreateFileA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
VirtualProtect
VirtualFree
VirtualAlloc
IsDebuggerPresent
CloseHandle
SetWaitableTimer
CreateWaitableTimerA
CreateEventA
OpenEventA
CreateFileMappingA
OpenFileMappingA
LocalAlloc
CreateMutexA
user32
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
ReleaseDC
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
PtInRect
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetMenuItemCount
UnhookWindowsHookEx
SetWindowTextA
GetLastActivePopup
GetWindowLongA
SetCursor
PostMessageA
PostQuitMessage
UnregisterHotKey
SetWindowLongA
SetCapture
SendMessageA
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
IsWindowEnabled
GetParent
EnableWindow
UnregisterClassA
GetWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetWindowRect
GetClientRect
WindowFromPoint
wvsprintfA
GetForegroundWindow
ClientToScreen
GetFocus
GetCursorPos
GetAsyncKeyState
IsWindow
GetWindowThreadProcessId
CreateWindowStationA
GetClassNameA
GetWindowTextA
IsWindowVisible
MsgWaitForMultipleObjects
GetDlgCtrlID
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
ShellExecuteA
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
TranslateCharsetInfo
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
GetObjectA
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ws2_32
WSAStartup
closesocket
socket
WSACleanup
select
WSAAsyncSelect
ntohs
getsockname
recv
send
gethostbyname
connect
inet_addr
htons
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shlwapi
PathFileExistsA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
Sections
.text Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13.3MB - Virtual size: 13.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ