Behavioral task
behavioral1
Sample
6c542c88e0d5ac7ad46a55a5ea0a8b0581845901d7f017e2f50cbd9af17edd83.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6c542c88e0d5ac7ad46a55a5ea0a8b0581845901d7f017e2f50cbd9af17edd83.exe
Resource
win10v2004-20230915-en
General
-
Target
6c542c88e0d5ac7ad46a55a5ea0a8b0581845901d7f017e2f50cbd9af17edd83
-
Size
3.2MB
-
MD5
7d105cbe8083a2227a1f84b47d8031c4
-
SHA1
ea7816e71fd660923a52ad44ec33f2c57923c2bf
-
SHA256
6c542c88e0d5ac7ad46a55a5ea0a8b0581845901d7f017e2f50cbd9af17edd83
-
SHA512
f44bd0bdf670822702b8a4407b748969fe0924181e2d710ae8bfbee02a41a17f6993f9a93dfae82076f08ec6cafd82f9a7f882eb46580a9cd25607af190bd5ba
-
SSDEEP
49152:1iKEIbEcCA+787QZ09nL6AtIM3XhuKWi4XpxKevGWX2aSCYJ:P7QhAvgLkI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c542c88e0d5ac7ad46a55a5ea0a8b0581845901d7f017e2f50cbd9af17edd83
Files
-
6c542c88e0d5ac7ad46a55a5ea0a8b0581845901d7f017e2f50cbd9af17edd83.exe windows:4 windows x86
3df3fa1b019e823c42051c7659896006
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
InterlockedDecrement
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GetCurrentProcess
WriteFile
SetFilePointer
EnterCriticalSection
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadCodePtr
CloseHandle
CreateProcessA
DeleteCriticalSection
InitializeCriticalSection
CreateThread
IsWow64Process
VirtualAlloc
VirtualFree
WideCharToMultiByte
OpenFileMappingA
GetWindowsDirectoryA
CreateToolhelp32Snapshot
Process32Next
WaitForSingleObject
Sleep
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
CreateFileMappingA
MapViewOfFile
LCMapStringA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetDiskFreeSpaceA
MulDiv
GetModuleFileNameA
GetLocalTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetTickCount
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetCurrentProcessId
VirtualQuery
SetErrorMode
RtlMoveMemory
GetModuleHandleA
GetSystemDirectoryA
lstrlenA
GetProcAddress
LoadLibraryA
IsBadReadPtr
GetTimeFormatW
GetDateFormatW
GetLastError
MultiByteToWideChar
FlushFileBuffers
lstrlenW
shlwapi
PathFileExistsA
user32
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
PtInRect
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetDlgItem
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
RegisterWindowMessageA
MessageBoxTimeoutA
GetWindowRect
wvsprintfA
GetAsyncKeyState
GetWindowThreadProcessId
FindWindowA
GrayStringA
GetWindowLongA
UnregisterClassA
gdi32
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
GetDeviceCaps
DeleteObject
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
SetSecurityDescriptorDacl
OpenProcessToken
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
InitializeSecurityDescriptor
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
Sections
.text Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.4MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qvmp0 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ