Behavioral task
behavioral1
Sample
843bfa78fd61e5822c2f8ee82aa2c446ffd6c238dfa4def3e67e3199c02a26b8.exe
Resource
win7-20230831-en
General
-
Target
843bfa78fd61e5822c2f8ee82aa2c446ffd6c238dfa4def3e67e3199c02a26b8
-
Size
3.7MB
-
MD5
6bd3c83c90763742ea249d0b7c583035
-
SHA1
2408efd7320449c2372a3a4136d2444d30b9ea4f
-
SHA256
843bfa78fd61e5822c2f8ee82aa2c446ffd6c238dfa4def3e67e3199c02a26b8
-
SHA512
454c2f8ecd83e2f7bc8f95ab5c0852e63d6bf730f5a9618921176236c3c95166b4cb86dad8e9d16bae29c1170e399e8395bc4dd8ce6c0f7e2c1dc2d7ee9356a8
-
SSDEEP
49152:LDlpJJlkFQDZNyv+HdHep+A7IyPyQjbJ7dz53wJWqX:XlTJKFQ+vy+ppIyPyQzE7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 843bfa78fd61e5822c2f8ee82aa2c446ffd6c238dfa4def3e67e3199c02a26b8
Files
-
843bfa78fd61e5822c2f8ee82aa2c446ffd6c238dfa4def3e67e3199c02a26b8.exe windows x86
46e592b6a7730f295451075032d11ed5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
VirtualProtect
OpenThread
CopyFileA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
CreateWaitableTimerA
SetWaitableTimer
RtlMoveMemory
Module32First
Module32Next
DeleteFileA
GetTickCount
GetModuleFileNameA
GetDiskFreeSpaceExA
lstrcpyn
SetCurrentDirectoryA
GetUserDefaultLCID
GetStartupInfoA
FindNextFileA
FindFirstFileA
LeaveCriticalSection
GetCommandLineA
ExitProcess
LoadLibraryA
FlushFileBuffers
SetStdHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetFileSize
GetWindowsDirectoryA
GetNativeSystemInfo
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
TerminateThread
HeapCreate
VirtualQuery
LoadLibraryExA
FreeLibrary
DuplicateHandle
FindClose
WideCharToMultiByte
ReadFile
LCMapStringA
CreateFileA
WriteFile
IsBadReadPtr
HeapReAlloc
lstrcpynA
GetCurrentProcess
GetACP
GetVersionExA
ReadProcessMemory
VirtualQueryEx
SetProcessAffinityMask
CreateProcessA
PeekNamedPipe
lstrlenW
lstrcpyA
RtlZeroMemory
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
VirtualAllocEx
GetCurrentDirectoryA
WriteProcessMemory
GetModuleHandleA
GetProcAddress
VirtualFreeEx
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
DeviceIoControl
CloseHandle
IsWow64Process
GetStdHandle
GetFileType
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
RaiseException
SetFilePointer
LCMapStringW
GetCPInfo
GetLocalTime
GetSystemTime
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
InterlockedDecrement
InterlockedIncrement
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetCurrentDirectoryA
DeleteFileA
GetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
TerminateThread
LoadLibraryExA
GetWindowsDirectoryA
Beep
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
SetLastError
GetTimeZoneInformation
GetVersion
SetStdHandle
InterlockedExchange
shlwapi
StrToIntExW
StrToIntExA
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
StrToIntW
ws2_32
WSAStartup
WSACleanup
htons
recvfrom
ioctlsocket
inet_ntoa
recv
getpeername
accept
WSACleanup
closesocket
WSAAsyncSelect
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
user32
ClientToScreen
GetForegroundWindow
WindowFromPoint
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextA
MsgWaitForMultipleObjects
SendMessageA
ShowWindow
RegisterWindowMessageA
EnumWindows
GetParent
GetAncestor
CallWindowProcA
TranslateMessage
DispatchMessageA
MessageBoxA
wsprintfA
GetMessageA
GetCursorPos
FindWindowA
GetClassNameA
PeekMessageA
GetDlgItem
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
UnregisterClassA
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetClassNameA
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
SetWindowTextA
LoadStringA
CopyIcon
GetIconInfo
CreateIconIndirect
GetDesktopWindow
IsIconic
GetDlgItem
GetForegroundWindow
SetRect
InflateRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
SetWindowRgn
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetSysColorBrush
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
DrawIconEx
advapi32
RegQueryValueExA
CryptHashData
CryptGetHashParam
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
ole32
OleRun
CoInitialize
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CLSIDFromString
OleUninitialize
OleInitialize
CLSIDFromString
psapi
GetModuleInformation
oleaut32
SafeArrayDestroy
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
VariantChangeType
SysFreeString
VariantClear
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
winmm
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
waveOutUnprepareHeader
gdi32
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
ExtSelectClipRgn
GetViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
GetStockObject
CreateSolidBrush
FillRgn
CreateRectRgn
CombineRgn
PatBlt
CreatePen
GetObjectA
SelectObject
CreateBitmap
MoveToEx
LineTo
SetTextColor
GetTextMetricsA
OffsetRgn
FrameRgn
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
GetDIBits
RealizePalette
SelectPalette
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
GetWindowExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ImageList_GetImageInfo
ImageList_GetImageCount
ord17
ImageList_Destroy
ImageList_Read
ImageList_Duplicate
ImageList_GetIcon
comdlg32
ChooseColorA
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 844KB - Virtual size: 840KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ