Behavioral task
behavioral1
Sample
59bead25257929ab8be296f1aa41bbb8f952a9b0d7de1cf16903cc1afac05b3c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
59bead25257929ab8be296f1aa41bbb8f952a9b0d7de1cf16903cc1afac05b3c.exe
Resource
win10v2004-20230703-en
General
-
Target
59bead25257929ab8be296f1aa41bbb8f952a9b0d7de1cf16903cc1afac05b3c
-
Size
5.9MB
-
MD5
dabdeb995c589792dbdd10c4b95386e6
-
SHA1
dd1be900fe7f3f61bcd90f4f76eedbd393413462
-
SHA256
59bead25257929ab8be296f1aa41bbb8f952a9b0d7de1cf16903cc1afac05b3c
-
SHA512
f602c34f32ad663e7112f4a3ab224209440ca2ce041709bfb1c2b8bcf1a4b402e9e7fc7cc846b8bc904b6f39570690d1d9940b5380902d370a167c4794d249a5
-
SSDEEP
98304:x8+Gu0BdNZRAP4iqAnhgwx092zLYoGp6NoZ:KT7oGAnhgwvTGCoZ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59bead25257929ab8be296f1aa41bbb8f952a9b0d7de1cf16903cc1afac05b3c
Files
-
59bead25257929ab8be296f1aa41bbb8f952a9b0d7de1cf16903cc1afac05b3c.exe windows x86
e614a1bd07a5e85ead29b2f9c7e12ba5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
FlushFileBuffers
TlsAlloc
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LeaveCriticalSection
GetLocalTime
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
GetCommandLineA
SetFilePointer
GetFileSize
ReadFile
CopyFileA
CreateDirectoryA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
MoveFileA
GetTickCount
DeleteFileA
CreateFileA
WriteFile
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
LocalFree
LocalAlloc
WideCharToMultiByte
lstrlenW
QueryDosDeviceW
Process32Next
Process32First
TerminateProcess
OpenProcess
GetCurrentProcess
IsBadStringPtrA
CloseHandle
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MultiByteToWideChar
user32
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetFocus
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
ShowWindow
SetWindowPos
SetWindowLongA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallNextHookEx
UnregisterClassA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
SelectObject
RestoreDC
SaveDC
GetObjectA
GetStockObject
DeleteDC
DeleteObject
Escape
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
CreateBitmap
psapi
GetProcessImageFileNameW
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
comctl32
ord17
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.7MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ