Behavioral task
behavioral1
Sample
127548c23b9b9bd9dfcedf027f73a9903c740d4c55091bdbaf48865b7409117a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
127548c23b9b9bd9dfcedf027f73a9903c740d4c55091bdbaf48865b7409117a.exe
Resource
win10v2004-20230703-en
General
-
Target
127548c23b9b9bd9dfcedf027f73a9903c740d4c55091bdbaf48865b7409117a
-
Size
1.9MB
-
MD5
44c14d9746110764ec596f850a8f329c
-
SHA1
d0bfd7a988977b3a59c6631a297645e82bd73fa1
-
SHA256
127548c23b9b9bd9dfcedf027f73a9903c740d4c55091bdbaf48865b7409117a
-
SHA512
6606b5f5e973acf53668eeba1081282661ae4b2db523d09027b336c6b260d5676117047eaebf38b04baf5902d774fa3c5eea191d42874f3932034f5782188cda
-
SSDEEP
24576:gYiRjmIGHW9nmoHSPIZ6bZZr0fI1vmW06pFFkZECDx00Nltv/LQ57bJs8yqJLr:gYP5iECLtvDQBbCqJLr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 127548c23b9b9bd9dfcedf027f73a9903c740d4c55091bdbaf48865b7409117a
Files
-
127548c23b9b9bd9dfcedf027f73a9903c740d4c55091bdbaf48865b7409117a.exe windows x86
9eb0d8201f6626aba457c62961f19cc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetEnvironmentVariableA
DeleteFileA
WriteFile
SetFileAttributesA
Sleep
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
IsBadReadPtr
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
MoveFileA
GetModuleFileNameA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
IsBadCodePtr
SetUnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
RaiseException
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
GetVersion
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
VirtualAlloc
LCMapStringW
VirtualFree
DeviceIoControl
GetVersionExA
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
DeleteFileA
GetModuleFileNameA
GetLocalTime
GetTickCount
GlobalAlloc
GlobalFree
GetUserDefaultLCID
HeapCreate
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
MulDiv
lstrcpyn
GlobalUnlock
GlobalLock
GetFileSize
GetTimeFormatA
IsBadWritePtr
WriteFile
CloseHandle
GetLastError
RtlFillMemory
GetModuleHandleA
ReadFile
SetLastError
CreateFileA
SetEndOfFile
RtlMoveMemory
WideCharToMultiByte
MultiByteToWideChar
SetFilePointer
GetCurrentProcess
TerminateProcess
Sleep
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
lstrcpyA
InterlockedExchange
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetACP
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetDateFormatA
HeapSize
RaiseException
RtlUnwind
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcpynA
FlushFileBuffers
LocalFree
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
GetVersion
FindResourceA
LoadResource
LockResource
lstrcatA
IsBadReadPtr
shlwapi
PathFileExistsA
UrlUnescapeA
PathFileExistsA
user32
GetWindowThreadProcessId
GetAsyncKeyState
mouse_event
IsWindow
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
wvsprintfA
PtInRect
GetWindow
GetParent
PostQuitMessage
TabbedTextOutA
SetWindowLongA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
keybd_event
GetClassNameA
IsWindow
SendMessageA
GetWindowRect
GetSystemMetrics
VkKeyScanExA
GetKeyboardLayout
MessageBoxA
FillRect
DrawTextA
InvertRect
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
IsWindowVisible
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
PostMessageA
SetCursor
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
SetWindowsHookExA
ValidateRect
SetActiveWindow
CallNextHookEx
GetActiveWindow
OpenClipboard
GetWindowTextA
GrayStringA
EndDialog
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
DestroyMenu
PostThreadMessageA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
IsIconic
GetWindowPlacement
SetFocus
GetCursorPos
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
SetWindowPos
IsDialogMessageA
SendDlgItemMessageA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
UnregisterClassA
GetKeyState
ole32
CLSIDFromProgID
CoUninitialize
CoInitialize
CoCreateInstance
OleRun
GetHGlobalFromStream
CreateStreamOnHGlobal
CLSIDFromString
OleInitialize
CoInitialize
CoUninitialize
OleFlushClipboard
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleIsCurrentClipboard
CoRevokeClassObject
OleUninitialize
advapi32
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
CryptGetHashParam
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
gdi32
PolyBezierTo
GetStockObject
SaveDC
RestoreDC
RectVisible
SetTextColor
SetMapMode
Polygon
Pie
SetViewportExtEx
ScaleViewportExtEx
ExtTextOutA
Escape
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
Arc
SetViewportOrgEx
Chord
SetPixel
GetPixel
LineTo
MoveToEx
Ellipse
GetDIBits
Rectangle
TextOutA
GetObjectA
GetDeviceCaps
PtVisible
CreateBitmap
DeleteObject
CreateDIBSection
SelectObject
CreateHatchBrush
DeleteDC
StretchBlt
SetBkColor
CreateFontA
OffsetViewportOrgEx
CreateSolidBrush
wininet
InternetTimeFromSystemTime
InternetTimeToSystemTime
gdiplus
GdipSaveImageToStream
GdipDisposeImage
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromStream
GdipCreateBitmapFromStream
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
oleaut32
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayGetDim
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
SafeArrayGetLBound
SafeArrayDestroyDescriptor
msimg32
TransparentBlt
oledlg
ord8
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
Sections
.text Size: 820KB - Virtual size: 819KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ