Behavioral task
behavioral1
Sample
3e56179ff60e7a0bfc8c9753031083ac95cd8ad33ec6ca5ae18c66db2fd3c819.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3e56179ff60e7a0bfc8c9753031083ac95cd8ad33ec6ca5ae18c66db2fd3c819.exe
Resource
win10v2004-20230703-en
General
-
Target
3e56179ff60e7a0bfc8c9753031083ac95cd8ad33ec6ca5ae18c66db2fd3c819
-
Size
1.1MB
-
MD5
f7026260fe4d5b100f71c8b59e72b732
-
SHA1
44b92878e7a8753c0f2d9796e6376125530602f9
-
SHA256
3e56179ff60e7a0bfc8c9753031083ac95cd8ad33ec6ca5ae18c66db2fd3c819
-
SHA512
fe9da8b18094d8804c7af84c390cc7482fc02176c26b6491e91ebab0110900e9a092ffe4a97409a975c14946389f82fa68ded51de08a9c2c89620d23957774ea
-
SSDEEP
24576:hH/wWoymvGWoD/4uDxcCs+RzBWE3hCROX0rl6nNCeaOn:6WozOWowuOCsczIExg+COn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e56179ff60e7a0bfc8c9753031083ac95cd8ad33ec6ca5ae18c66db2fd3c819
Files
-
3e56179ff60e7a0bfc8c9753031083ac95cd8ad33ec6ca5ae18c66db2fd3c819.exe windows x86
e74edf945fda053387e9e6471ae093d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
lstrlenW
GetTempPathW
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
CreateWaitableTimerA
SetWaitableTimer
MultiByteToWideChar
LocalAlloc
CreateDirectoryW
LocalFree
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WaitForSingleObject
CreateProcessA
GetStartupInfoA
WriteFile
CreateFileA
GetUserDefaultLCID
GetTickCount
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
RaiseException
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetCommandLineA
GetVersion
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
shell32
SHGetSpecialFolderPathW
user32
DispatchMessageA
TranslateMessage
MsgWaitForMultipleObjects
wsprintfA
MessageBoxA
GetMessageA
PeekMessageA
shlwapi
PathIsDirectoryW
ole32
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromProgID
CoInitialize
CLSIDFromString
oleaut32
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1016KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE