FDWFdw
Behavioral task
behavioral1
Sample
40cff788cf6deb843350fb80a6017bc08bc6fa02b239d78422e0b6e85186c9b3.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
40cff788cf6deb843350fb80a6017bc08bc6fa02b239d78422e0b6e85186c9b3.dll
Resource
win10v2004-20230915-en
General
-
Target
40cff788cf6deb843350fb80a6017bc08bc6fa02b239d78422e0b6e85186c9b3
-
Size
612KB
-
MD5
7f74e6627f9e4adc58cb3f703581e5df
-
SHA1
bcf11f5927ae4669c61150ec2ed02c6e96f1ae44
-
SHA256
40cff788cf6deb843350fb80a6017bc08bc6fa02b239d78422e0b6e85186c9b3
-
SHA512
0bc75132d5fbc9100bc70aa7dafd3823cd3fbd611d0196ce00d004b2646783f601357570f2b3c5febc28079553443e96994e93e7713e434aef979fc350179f65
-
SSDEEP
12288:0HWXVWh/XWUMDd84nRBX8GGQ/lQQ4uUajjqrf0XRSlpVNIyK+WMrX:0HWXVWh/XWUy82Rd8GRtN4i+ruRSlpnV
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40cff788cf6deb843350fb80a6017bc08bc6fa02b239d78422e0b6e85186c9b3
Files
-
40cff788cf6deb843350fb80a6017bc08bc6fa02b239d78422e0b6e85186c9b3.dll windows x86
7c415d000a262fa7541b414ee7f54a09
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateProcess
RtlUnwind
GetOEMCP
GetCPInfo
SetWaitableTimer
RaiseException
HeapSize
GetACP
VirtualQueryEx
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
GetCommandLineA
SetFilePointer
GetFileSize
ReadFile
WriteFile
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
WriteProcessMemory
ReadProcessMemory
VirtualProtectEx
FlushFileBuffers
CreateWaitableTimerA
GetCurrentThreadId
VirtualAllocEx
OpenProcess
CreateThread
Module32Next
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetTickCount
GetCurrentProcessId
CloseHandle
Module32First
GetCurrentProcess
GetProcessVersion
CreateToolhelp32Snapshot
FindResourceA
LoadResource
LockResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
SetLastError
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
MulDiv
GetVersion
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
lstrlenA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
DeleteCriticalSection
user32
CreateDialogIndirectParamA
EndDialog
DestroyMenu
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
IsWindow
AdjustWindowRectEx
GetClientRect
CopyRect
PostThreadMessageA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
SetForegroundWindow
SetActiveWindow
AttachThreadInput
SetWindowTextA
GetWindowTextW
GetWindowTextLengthW
GetParent
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindowVisible
EnumWindows
FindWindowExA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
SetWindowsHookExA
GetCursorPos
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnhookWindowsHookEx
UnregisterClassA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
ole32
CoInitialize
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
winhttp
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCheckPlatform
WinHttpCrackUrl
WinHttpOpen
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpSetCredentials
WinHttpCloseHandle
shlwapi
StrToIntExA
ws2_32
WSACleanup
WSAStartup
socket
htons
inet_addr
closesocket
bind
listen
accept
recv
send
connect
gdi32
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
winmm
PlaySoundA
Exports
Exports
Sections
.text Size: 208KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 348KB - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ