Behavioral task
behavioral1
Sample
f4e3e41dc9c5f83acf4cf9133a68d7075a7dded908dcd7ce8659483600f39bc4.exe
Resource
win7-20230831-en
General
-
Target
f4e3e41dc9c5f83acf4cf9133a68d7075a7dded908dcd7ce8659483600f39bc4
-
Size
7.9MB
-
MD5
00555b373ddf50540c6a084078453327
-
SHA1
87e354d5687c818ac4cf9cd5f17f2bcff6cba6b9
-
SHA256
f4e3e41dc9c5f83acf4cf9133a68d7075a7dded908dcd7ce8659483600f39bc4
-
SHA512
9b743ef85de2c446f5f8f25b99035136e697e0f0c70b18332bc224df9166197db4bececa20089aa37090fd7f24fc3aa3c8620fd5f625690c216d353428c9aae5
-
SSDEEP
98304:kJ9KiFkPmlQoVlcHRRmccZY/Pk1AwKHlrm0XMFlxldE0BMhSuCnsuJeF2LUtXwOW:kqikPyzESjZYnkewKFtGE1j9XEjugP
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4e3e41dc9c5f83acf4cf9133a68d7075a7dded908dcd7ce8659483600f39bc4
Files
-
f4e3e41dc9c5f83acf4cf9133a68d7075a7dded908dcd7ce8659483600f39bc4.exe windows x86
fd11b9bb7605ec163f8e11ded961582d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
SetFileAttributesA
WriteFile
CopyFileA
SetCurrentDirectoryA
GetModuleFileNameA
FindFirstFileA
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindClose
GetTickCount
GetStartupInfoA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
Sleep
GetEnvironmentVariableA
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
lstrcpyA
DeleteTimerQueueTimer
CreateTimerQueueTimer
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
GetCurrentThreadId
GetProcessHeap
InterlockedDecrement
InterlockedIncrement
CreateTimerQueue
CreateIoCompletionPort
lstrcpyn
Module32First
CreateToolhelp32Snapshot
CreateEventA
HeapValidate
PostQueuedCompletionStatus
GetQueuedCompletionStatus
CreateThread
GetSystemInfo
HeapDestroy
CloseHandle
HeapFree
HeapAlloc
HeapCreate
GetLastError
LocalSize
RtlMoveMemory
WaitForSingleObject
CreateProcessA
InterlockedExchange
SetStdHandle
IsBadCodePtr
GetCurrentProcessId
LoadResource
SizeofResource
FindResourceA
MoveFileA
DeleteCriticalSection
TerminateThread
lstrlenA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetCurrentProcess
Process32Next
Process32First
OpenProcess
SetLastError
lstrcatA
LockResource
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
MulDiv
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CreateDirectoryA
user32
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetWindowLongA
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
LoadBitmapA
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetWindowTextA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetWindowThreadProcessId
GetClassNameA
GetWindowRect
GetSystemMetrics
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
GetCursorPos
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetClientRect
GetPropA
SetPropA
CreateIconFromResource
SendMessageA
IsWindow
FindWindowExA
FindWindowA
RegisterWindowMessageA
TrackPopupMenu
SetForegroundWindow
PtInRect
IsWindowVisible
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
CallWindowProcA
AppendMenuA
AppendMenuW
SetWindowLongA
DrawMenuBar
SetMenu
CreatePopupMenu
GetSubMenu
advapi32
CreateProcessAsUserA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetFileInfoA
Shell_NotifyIconA
ShellExecuteEx
SHGetSpecialFolderPathA
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
OleUninitialize
OleInitialize
OleFlushClipboard
OleIsCurrentClipboard
CoUninitialize
CoInitialize
iphlpapi
GetExtendedTcpTable
shlwapi
PathFileExistsA
ws2_32
closesocket
setsockopt
WSARecv
inet_ntoa
WSASocketA
WSAGetLastError
WSAIoctl
WSAStartup
WSASocketW
ioctlsocket
shutdown
socket
htons
inet_addr
recvfrom
sendto
accept
htonl
__WSAFDIsSet
connect
gethostbyname
ntohs
getsockname
recv
bind
getpeername
WSACleanup
WSASetLastError
send
select
listen
WSAConnect
gdi32
SetWindowExtEx
SetViewportOrgEx
ScaleWindowExtEx
GetClipBox
GetStockObject
GetObjectA
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
ScaleViewportExtEx
SetViewportExtEx
Escape
ExtTextOutA
TextOutA
SetTextColor
SetMapMode
RectVisible
PtVisible
OffsetViewportOrgEx
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
winmm
timeKillEvent
timeSetEvent
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
Sections
.text Size: 392KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7.4MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE