Behavioral task
behavioral1
Sample
273fdbb037765ec8566db945aa8088d3e08fd2eb45b4b3b9841b24564df1e140.exe
Resource
win7-20230831-en
General
-
Target
273fdbb037765ec8566db945aa8088d3e08fd2eb45b4b3b9841b24564df1e140
-
Size
15.6MB
-
MD5
c5a415a43156f34f1ebd6a839851c13f
-
SHA1
33e0946d126ff9ff5f69acfb480f97e5f8dfa499
-
SHA256
273fdbb037765ec8566db945aa8088d3e08fd2eb45b4b3b9841b24564df1e140
-
SHA512
e807ca5afe2b18949337648c86cfa55728d982652d47dd41e46e7ff7747d8c4c3ad59146744fff3ac2e707baa76c076027281c02f8f8ebc0c23af8bc67596f56
-
SSDEEP
393216:oUcM7Z7fSMT1E+TYkKjy9NItd0XowgQQk3hNw34ruySd:oUcC7/T1E+skqSNIZ4w34iySd
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 273fdbb037765ec8566db945aa8088d3e08fd2eb45b4b3b9841b24564df1e140
Files
-
273fdbb037765ec8566db945aa8088d3e08fd2eb45b4b3b9841b24564df1e140.exe windows:5 windows x86
7778817861c4b835a6a1fae7d9339773
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathMakeSystemFolderA
PathRemoveBlanksA
PathIsDirectoryEmptyA
PathIsDirectoryA
PathFindFileNameA
PathFileExistsA
PathIsSystemFolderA
StrTrimA
StrFormatByteSize64A
PathUnmakeSystemFolderA
PathRenameExtensionA
PathFindExtensionA
winmm
mciSendStringA
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
VirtualQueryEx
ReadProcessMemory
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
OpenProcess
CloseHandle
CreateThread
lstrcpyn
GetWindowsDirectoryA
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
LCMapStringW
MulDiv
CreateDirectoryA
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetVersion
QueryPerformanceCounter
QueryPerformanceFrequency
FindResourceA
LoadResource
LockResource
GetTickCount
LCMapStringA
WritePrivateProfileStringA
SetFileAttributesA
GetModuleFileNameA
lstrcatA
SetLastError
DeleteFileA
_lclose
MoveFileA
WriteProcessMemory
MultiByteToWideChar
WideCharToMultiByte
VirtualAllocEx
lstrcpyA
GetVersionExA
RemoveDirectoryA
GetEnvironmentVariableA
GetCommandLineA
FreeLibrary
GetLocalTime
GlobalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultLCID
GetFileSize
ReadFile
FindClose
FindFirstFileA
FindNextFileA
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
VirtualProtectEx
InitializeCriticalSection
GetCurrentThreadId
GetLongPathNameA
WriteFile
SetEndOfFile
SetFilePointer
FreeEnvironmentStringsW
GetDriveTypeA
DeviceIoControl
QueryDosDeviceA
GetLogicalDriveStringsA
GetExitCodeThread
CreateRemoteThread
CreateFileA
CreateProcessA
GetStartupInfoA
TerminateProcess
LoadLibraryA
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetModuleHandleA
GetProcAddress
WaitForSingleObject
VirtualFreeEx
DeleteCriticalSection
Sleep
IsBadCodePtr
GetCurrentProcess
GetTempPathA
SetStdHandle
InterlockedExchange
CreateWaitableTimerA
SetWaitableTimer
CreateToolhelp32Snapshot
Process32First
Process32Next
SetProcessWorkingSetSize
LeaveCriticalSection
LocalFree
LocalAlloc
FlushFileBuffers
CopyFileA
OpenThread
RtlFillMemory
MapViewOfFile
lstrcpynA
IsBadWritePtr
VirtualAlloc
RtlMoveMemory
GlobalFree
SuspendThread
GetCurrentThread
GetCurrentProcessId
VirtualFree
GetDateFormatA
HeapCreate
GetTimeFormatA
TerminateThread
Thread32Next
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
GetLastError
Thread32First
lstrlenA
ResumeThread
GlobalFlags
EnterCriticalSection
GetLocalTime
GetSystemTime
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
LocalFree
InterlockedDecrement
InterlockedIncrement
HeapSize
GetACP
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
CreateThread
CreateEventA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GetTempPathA
FindFirstFileA
FindClose
GetFileAttributesA
MoveFileA
DeleteFileA
SetCurrentDirectoryA
GetVolumeInformationA
GetModuleHandleA
GetProcAddress
MulDiv
GetCommandLineA
GetTickCount
CreateProcessA
WaitForSingleObject
CloseHandle
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
InterlockedExchange
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
RemoveDirectoryA
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
TerminateThread
LoadLibraryExA
GetWindowsDirectoryA
Beep
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
OpenProcess
GetSystemDirectoryA
MultiByteToWideChar
SetLastError
GetTimeZoneInformation
GetVersion
FileTimeToSystemTime
WideCharToMultiByte
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
GlobalFree
GetProcAddress
LocalAlloc
LocalFree
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetWindowLongA
PtInRect
GetWindow
GetParent
PostQuitMessage
SetCursor
EnableWindow
IsWindowEnabled
GetLastActivePopup
ValidateRect
GetKeyState
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
EndDialog
UnregisterClassA
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorFromFileA
ClientToScreen
SetWindowLongA
GetWindowTextA
IsWindowVisible
mouse_event
GetWindowThreadProcessId
SwapMouseButton
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
SetClassLongA
MessageBoxA
wsprintfA
GetMessageA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
PeekMessageA
GetCursorPos
GetSystemMetrics
ShowCursor
ClipCursor
GetWindowRect
SendMessageA
IsWindow
ReleaseDC
GetFocus
ReleaseCapture
SetCapture
CallWindowProcA
UnhookWindowsHookEx
TranslateMessage
DispatchMessageA
PostMessageA
CharUpperA
keybd_event
SetWindowsHookExA
CallNextHookEx
SetCursorPos
MsgWaitForMultipleObjects
BlockInput
CharLowerA
GetClassNameA
DefWindowProcA
GetClassInfoA
DefWindowProcA
GetSystemMenu
DeleteMenu
GetMenu
SetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
IsZoomed
SetScrollRange
SetScrollPos
SetRect
InflateRect
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
GetScrollRange
TranslateAcceleratorA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetClassNameA
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetSysColorBrush
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
SetWindowTextA
LoadStringA
CopyIcon
GetIconInfo
CreateIconIndirect
GetDesktopWindow
GetWindowThreadProcessId
FindWindowA
GetDlgItem
GetForegroundWindow
wsprintfA
WaitForInputIdle
UnregisterClassA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
GetParent
GetFocus
GetClientRect
InvalidateRect
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
IsChild
ReleaseDC
IsRectEmpty
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
GetUserObjectInformationW
CharUpperBuffW
MessageBoxW
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
TextOutA
ExtTextOutA
Escape
SaveDC
ScaleViewportExtEx
GetDeviceCaps
SelectObject
DeleteDC
RectVisible
RestoreDC
ScaleWindowExtEx
SetTextColor
SetMapMode
OffsetViewportOrgEx
PtVisible
GetObjectA
GetStockObject
SetViewportExtEx
GetClipBox
DeleteObject
CreateBitmap
SetWindowExtEx
SetBkColor
SetViewportOrgEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CombineRgn
PatBlt
CreatePen
GetObjectA
SelectObject
CreateBitmap
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
SelectClipRgn
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
CreateDIBSection
CreateRectRgnIndirect
SetBkColor
FrameRgn
OffsetRgn
GetTextMetricsA
SetTextColor
LineTo
MoveToEx
ExtSelectClipRgn
GetViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateRectRgn
FillRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
GetTextExtentPoint32A
GetDeviceCaps
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetBkMode
comdlg32
ChooseColorA
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
advapi32
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
CryptEncrypt
CryptDestroyHash
CryptGetHashParam
CryptDecrypt
RegOpenKeyExA
RegCloseKey
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptDestroyKey
CryptReleaseContext
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
SHGetFileInfoA
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
ole32
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
CoUninitialize
CoInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
OleInitialize
OleUninitialize
CLSIDFromString
OleRun
OleInitialize
wininet
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetGetCookieA
InternetGetCookieExA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetTimeFromSystemTime
InternetTimeToSystemTime
FtpOpenFileA
FtpGetFileSize
InternetSetCookieA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
winhttp
WinHttpTimeFromSystemTime
WinHttpOpen
WinHttpCrackUrl
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpConnect
WinHttpReceiveResponse
WinHttpCheckPlatform
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpTimeToSystemTime
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpSetTimeouts
oleaut32
dbghelp
MakeSureDirectoryPathExists
psapi
GetModuleFileNameExA
EnumProcesses
crypt32
CryptStringToBinaryA
CryptBinaryToStringA
setupapi
CM_Request_Device_EjectW
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
oledlg
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_Destroy
ImageList_Read
ImageList_Duplicate
ws2_32
rasapi32
RasGetConnectStatusA
RasHangUpA
wtsapi32
WTSSendMessageW
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 608KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ezdun0 Size: 10.1MB - Virtual size: 10.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ezdun1 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE