Behavioral task
behavioral1
Sample
e48c3c0bcce0938d2b65b9714c31fd078ec54f9d14a49fad514fad52ee85373c.exe
Resource
win7-20230831-en
General
-
Target
e48c3c0bcce0938d2b65b9714c31fd078ec54f9d14a49fad514fad52ee85373c
-
Size
5.8MB
-
MD5
c6f6dadeb87eac9fcad4db7a4f86a80b
-
SHA1
994a0dffd412a6fcf1534c7a72e2b83c4b428817
-
SHA256
e48c3c0bcce0938d2b65b9714c31fd078ec54f9d14a49fad514fad52ee85373c
-
SHA512
c10e35cb9bca4008f3f8862fb0a88ee70a0a2950aeb0d4613f85864cffb8917a39360453e16543a3980e205d5e83c62540f099d56bf9aab114e7fc56202231ba
-
SSDEEP
98304:HX4vFdRkuo92IMlQnbqPPzf83ouM3z7JYnGrxMy+FY9i3voiiPDC+kAEC:INdRdo929MWjfaoN6ILgmrnkJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e48c3c0bcce0938d2b65b9714c31fd078ec54f9d14a49fad514fad52ee85373c
Files
-
e48c3c0bcce0938d2b65b9714c31fd078ec54f9d14a49fad514fad52ee85373c.exe windows x86
3254f2357f745d2bc5780c39f262e767
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetProcAddress
FreeLibrary
lstrlenA
MultiByteToWideChar
IsBadCodePtr
GetModuleHandleA
lstrcpyn
RtlMoveMemory
VirtualAlloc
VirtualQueryEx
RtlFillMemory
LocalSize
CreateProcessA
GetThreadContext
ReadProcessMemory
WriteProcessMemory
SetThreadContext
ResumeThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
VirtualAllocEx
VirtualProtectEx
GetCurrentProcessId
CreateFileA
SetFilePointer
SetEndOfFile
GetFileAttributesW
VirtualProtect
CreateThread
LocalAlloc
IsBadReadPtr
LocalFree
lstrlenW
RtlZeroMemory
GetCurrentThreadId
WideCharToMultiByte
QueryDosDeviceW
lstrcpynA
DeviceIoControl
GetVolumeInformationA
TerminateThread
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetCommandLineA
SetCurrentDirectoryA
CopyFileA
MoveFileA
SetFileAttributesA
GetStartupInfoA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetLocalTime
Sleep
LCMapStringA
GetLastError
MulDiv
lstrcatA
lstrcpyA
DeleteCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
OpenProcess
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
GetModuleHandleW
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
WriteFile
CreateDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCommandLineW
GetFileSize
ReadFile
GetModuleFileNameA
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
GetProcessHeap
VirtualFree
user32
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
DestroyMenu
IsIconic
GetWindowPlacement
SetFocus
IsDialogMessageA
SendDlgItemMessageA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetDlgItem
UpdateWindow
ReleaseDC
FindWindowA
GetClassNameA
IsWindow
UnregisterHotKey
SetCapture
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
RegisterWindowMessageA
PeekMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
FindWindowExA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
SetWindowPos
GetWindowRect
SystemParametersInfoA
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
ShowWindow
PostMessageW
TabbedTextOutA
GetMenuItemCount
GetDlgCtrlID
SendMessageA
LoadCursorFromFileW
LoadCursorW
CallWindowProcA
MessageBoxA
wsprintfA
EndDialog
CreateDialogIndirectParamA
TranslateMessage
GetSystemMetrics
GetCursorPos
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
CheckMenuItem
GetKeyState
shell32
SHBrowseForFolderA
DragFinish
DragQueryFileA
SHGetSpecialFolderPathA
CommandLineToArgvW
DragAcceptFiles
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetObjectA
GetStockObject
SelectObject
DeleteDC
TranslateCharsetInfo
GetDeviceCaps
DeleteObject
CreateFontA
shlwapi
PathFileExistsA
PathFindExtensionA
comdlg32
GetFileTitleA
advapi32
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptAcquireContextA
GetTokenInformation
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
ole32
OleInitialize
CLSIDFromProgID
CoFreeUnusedLibraries
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CoRegisterMessageFilter
CLSIDFromString
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
CoRevokeClassObject
wininet
InternetGetConnectedState
HttpQueryInfoA
InternetOpenUrlA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetSetOptionA
InternetReadFile
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetCookieA
oleaut32
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
VariantInit
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
SafeArrayDestroyDescriptor
SystemTimeToVariantTime
LoadTypeLi
dbghelp
MakeSureDirectoryPathExists
psapi
GetProcessImageFileNameW
winhttp
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReadData
WinHttpCheckPlatform
WinHttpQueryHeaders
oledlg
ord8
comctl32
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
iphlpapi
GetAdaptersInfo
ws2_32
WSACleanup
WSAStartup
closesocket
send
recv
select
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
rasapi32
RasHangUpA
RasGetConnectStatusA
Sections
.text Size: 1024KB - Virtual size: 1022KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE