Behavioral task
behavioral1
Sample
963948c3f48c4bfc3b6670670147d38e127a207ecc83cc3aa53b45f60ed2bea7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
963948c3f48c4bfc3b6670670147d38e127a207ecc83cc3aa53b45f60ed2bea7.exe
Resource
win10v2004-20230915-en
General
-
Target
963948c3f48c4bfc3b6670670147d38e127a207ecc83cc3aa53b45f60ed2bea7
-
Size
4.6MB
-
MD5
8fee3b5ac8a15ff9ae397a5ddd0f6537
-
SHA1
60673cca397840c9e6493779b5ba7ab643389079
-
SHA256
963948c3f48c4bfc3b6670670147d38e127a207ecc83cc3aa53b45f60ed2bea7
-
SHA512
32f24f461eb831e21d9542c37334f473a4e08666bea2b5414fc20b71c1aeb52169d9c445b3a260a5281a08ca7f47115ce15d33ddd211d43760554cc78c74b47f
-
SSDEEP
98304:y3sTfgNExN4boq/NVfLwh/BlF7usTfgNExN4boq/NVfLw6:ZTfgNExN4bhf2/JTfgNExN4bhf3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 963948c3f48c4bfc3b6670670147d38e127a207ecc83cc3aa53b45f60ed2bea7
Files
-
963948c3f48c4bfc3b6670670147d38e127a207ecc83cc3aa53b45f60ed2bea7.exe windows x86
bac345189475ec22a4ed71bb6bea3b98
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
GetModuleHandleA
GetProcAddress
CreateRemoteThread
QueueUserAPC
ResumeThread
CreateDirectoryA
MoveFileA
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetPrivateProfileStringA
WritePrivateProfileStringA
FindClose
CreateFileMappingA
DeleteFileA
RemoveDirectoryA
FindFirstFileA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LoadLibraryA
LCMapStringA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
RtlMoveMemory
lstrcpyn
CloseHandle
GetTickCount
SetEnvironmentVariableA
CompareStringW
CreateToolhelp32Snapshot
FindNextFileA
Sleep
GetStdHandle
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetFileAttributesA
SetFilePointer
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
SetStdHandle
FlushFileBuffers
CreateFileA
CompareStringA
user32
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetMessageA
PeekMessageA
GetWindowThreadProcessId
FindWindowA
FindWindowExA
GetParent
GetWindowTextA
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.5MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ