Behavioral task
behavioral1
Sample
6295323a677b8553dd2c91e932cc11ae670e81575e4c6685920d9acc5addf33c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6295323a677b8553dd2c91e932cc11ae670e81575e4c6685920d9acc5addf33c.exe
Resource
win10v2004-20230915-en
General
-
Target
6295323a677b8553dd2c91e932cc11ae670e81575e4c6685920d9acc5addf33c
-
Size
668KB
-
MD5
29665f3ad131b529a7e3e62e45b7fd19
-
SHA1
98c65923d3be1adc029f22c4af003d49a2911a9e
-
SHA256
6295323a677b8553dd2c91e932cc11ae670e81575e4c6685920d9acc5addf33c
-
SHA512
6e48d3e62d734bf3d2de5289ffb54cbc06da7ab91dc5a7805ab17da6b101587a03ea29c5e45a6c1998cae3ff183b78aa799fba1b0b36de7d4b261192aee6372b
-
SSDEEP
12288:IuY7HB2lPTSuFQKgMt584+eictYM6WgWcbX+WE:IuY7HB2lPTSJKgw5r+e5J6hDjM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6295323a677b8553dd2c91e932cc11ae670e81575e4c6685920d9acc5addf33c
Files
-
6295323a677b8553dd2c91e932cc11ae670e81575e4c6685920d9acc5addf33c.exe windows x86
390c4cdb720331d7ae653fa9206f54f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
GetVersionExA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
SetStdHandle
GetOEMCP
GetCPInfo
ReadFile
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
lstrcpyA
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
MoveFileA
CopyFileA
GetFileSize
DeleteFileA
GetEnvironmentVariableA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateDirectoryA
GetLocalTime
WriteFile
SetFilePointer
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
OpenMutexA
WaitForSingleObject
lstrcmpA
lstrlenA
lstrcmpiW
HeapDestroy
HeapCreate
lstrcmpW
lstrlenW
RtlZeroMemory
VirtualFree
VirtualAlloc
GetSystemTimeAsFileTime
Process32Next
Process32First
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
HeapFree
HeapAlloc
GetProcessHeap
TlsFree
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
GetFileSizeEx
CreateFileA
CreateThread
lstrcatA
RtlMoveMemory
GetComputerNameExA
SetDllDirectoryA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
CreateToolhelp32Snapshot
GlobalDeleteAtom
lstrcmpiA
GetLastError
GetCurrentThread
GetCurrentThreadId
user32
PostThreadMessageA
UnregisterClassA
LoadStringA
GetSysColorBrush
EndDialog
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CreateDialogIndirectParamA
DestroyMenu
LoadCursorA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetWindowThreadProcessId
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
shlwapi
StrToIntExW
PathRemoveFileSpecA
StrToIntW
PathRemoveBackslashA
PathFileExistsA
PathFindFileNameA
ws2_32
WSAStartup
inet_addr
WSAGetLastError
WSACleanup
gethostname
inet_ntoa
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleRun
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SystemTimeToVariantTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
iphlpapi
GetAdaptersInfo
SendARP
wininet
InternetSetCookieA
InternetQueryOptionA
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetReadFile
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
HttpOpenRequestA
InternetCloseHandle
InternetSetOptionA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
Sections
.text Size: 544KB - Virtual size: 542KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE