True
Behavioral task
behavioral1
Sample
JC_44c085e0ad5a3b902937382ee27e380329b84774640274996a326538439c1bfb.dll
Resource
win7-20230831-en
General
-
Target
JC_44c085e0ad5a3b902937382ee27e380329b84774640274996a326538439c1bfb
-
Size
2.6MB
-
MD5
6d32af242aa3f23ae52b17d73023553e
-
SHA1
ad872865732f82e5972e6e4370109a6618376e3e
-
SHA256
44c085e0ad5a3b902937382ee27e380329b84774640274996a326538439c1bfb
-
SHA512
cf348c56abe7b1326f0297cd0ee37521f32b30f82b60869ffa14afee28cb09770e2f04fa0641a62c2bcdf3e450efc8710d8630ed20a08cbd456557796954b48c
-
SSDEEP
24576:EQou7w0nGF7N0TUxH04cLSeNW1DZdvY91FLTe2Ne7UcuzM7k3wJmOKMCmLb2NCf:E1FJLeXg8z53wJWqb2N
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JC_44c085e0ad5a3b902937382ee27e380329b84774640274996a326538439c1bfb
Files
-
JC_44c085e0ad5a3b902937382ee27e380329b84774640274996a326538439c1bfb.dll windows x86
ea747dba6d1fb7137b40dac680ace842
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadProcessMemory
lstrcpyn
GetCurrentThreadId
CopyFileA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
MultiByteToWideChar
ResumeThread
CreateRemoteThread
OpenThread
GetVersionExA
GetLogicalDriveStringsA
QueryDosDeviceA
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
Sleep
ReadFile
GetFileSize
CreateFileA
DeleteFileA
MulDiv
GetDiskFreeSpaceA
VirtualAllocEx
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
VirtualAlloc
VirtualFree
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
WriteProcessMemory
WideCharToMultiByte
DuplicateHandle
GetCurrentProcess
CloseHandle
GetProcessHandleCount
GetCurrentDirectoryA
GetLastError
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
WriteFile
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
MultiByteToWideChar
WaitForSingleObject
VirtualFreeEx
lstrcpynA
FindClose
lstrcpyn
GetNativeSystemInfo
OpenProcess
GetModuleHandleA
CloseHandle
GetModuleFileNameA
GetCurrentProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
TerminateProcess
InterlockedIncrement
GetOEMCP
RtlUnwind
GetVersion
CreateToolhelp32Snapshot
Process32First
Process32Next
DuplicateHandle
CopyFileA
VirtualAllocEx
WideCharToMultiByte
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
RtlMoveMemory
WriteProcessMemory
GetWindowsDirectoryA
lstrcpynW
CreateWaitableTimerA
SetWaitableTimer
Module32First
Module32Next
VirtualProtect
VirtualQuery
LoadLibraryExA
FreeLibrary
CreateRemoteThread
GetExitCodeThread
OpenThread
TerminateThread
LeaveCriticalSection
GetVersionExA
HeapCreate
ReadProcessMemory
VirtualQueryEx
CreateProcessA
PeekNamedPipe
lstrlenW
lstrcpyA
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
LoadLibraryA
InterlockedDecrement
GetCurrentThreadId
SetProcessAffinityMask
EnterCriticalSection
DeleteCriticalSection
RtlZeroMemory
IsWow64Process
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
ReadFile
GetFileSize
CreateFileA
DeleteFileA
WriteFile
GetTickCount
LCMapStringA
GetProcAddress
GetUserDefaultLCID
GetDiskFreeSpaceExA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetStartupInfoA
FindNextFileA
FindFirstFileA
GetCommandLineA
shlwapi
PathFindFileNameA
PathFindFileNameA
StrToIntW
StrToIntExW
PathFindExtensionA
PathFileExistsA
StrToIntExA
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetAncestor
IsWindowVisible
GetParent
EnumWindows
RegisterWindowMessageA
MsgWaitForMultipleObjects
PostThreadMessageA
CallWindowProcA
SetWindowLongA
GetWindowLongA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
GetForegroundWindow
RegisterWindowMessageA
ClientToScreen
SendMessageA
WindowFromPoint
ShowWindow
EnumWindows
GetParent
GetAncestor
CallWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
GetMessageA
MessageBoxA
GetDlgItem
FindWindowA
GetCursorPos
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptHashData
CryptGetHashParam
RegCloseKey
RegQueryValueExA
RegOpenKeyA
ws2_32
WSAStartup
htons
WSACleanup
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shell32
SHGetSpecialFolderPathA
ole32
CoCreateInstance
OleRun
CoInitialize
CLSIDFromString
CLSIDFromProgID
CoUninitialize
psapi
GetModuleInformation
oleaut32
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SysFreeString
Exports
Exports
Sections
.text Size: 976KB - Virtual size: 973KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ