Behavioral task
behavioral1
Sample
33f50a66eb2f1797e02d94ec292a94933e4510869779883dbcc48baa12e7a37b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
33f50a66eb2f1797e02d94ec292a94933e4510869779883dbcc48baa12e7a37b.exe
Resource
win10v2004-20230915-en
General
-
Target
33f50a66eb2f1797e02d94ec292a94933e4510869779883dbcc48baa12e7a37b
-
Size
572KB
-
MD5
2037f9700d9ae9219c8862d00e1fa6aa
-
SHA1
4e5bbc2cad001c39248419c7c23646681cedc828
-
SHA256
33f50a66eb2f1797e02d94ec292a94933e4510869779883dbcc48baa12e7a37b
-
SHA512
a69a314a680096cec3a197094178e99bd0c061e793fac9cd3e191a5db62f5a1f99d0f1639ab0905b4bb37d940a97aa34ab66dc91cf98d317e0a03d115b670fc5
-
SSDEEP
12288:pCS9QDiAFUXIWk5e1mGNG+lUW/JHxQOkb0F:4S9QDiAFcIWkeFGUrJ4u
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33f50a66eb2f1797e02d94ec292a94933e4510869779883dbcc48baa12e7a37b
Files
-
33f50a66eb2f1797e02d94ec292a94933e4510869779883dbcc48baa12e7a37b.exe windows:4 windows x86
fedb9bc1ad858dcfcd24cfb3db4b62e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadWritePtr
GetVersionExA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
LCMapStringW
GetProcessHeap
GetOEMCP
GetCPInfo
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
MoveFileA
CopyFileA
GetFileSize
DeleteFileA
GetEnvironmentVariableA
CreateDirectoryA
GetLocalTime
WriteFile
SetFilePointer
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpA
lstrlenA
WaitForSingleObject
ReleaseMutex
OpenMutexA
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
RtlZeroMemory
VirtualFree
VirtualAlloc
GetLastError
Process32Next
Process32First
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
HeapFree
HeapAlloc
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
ReadFile
GetFileSizeEx
CreateFileA
CreateThread
lstrcatA
RtlMoveMemory
GetComputerNameExA
SetDllDirectoryA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
CreateToolhelp32Snapshot
SetLastError
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
MulDiv
GlobalFlags
lstrcpyA
user32
CreateDialogIndirectParamA
EndDialog
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetWindowThreadProcessId
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
shlwapi
PathRemoveFileSpecA
PathRemoveBackslashA
StrToIntExW
StrToIntW
PathFindFileNameA
PathFileExistsA
ws2_32
WSACleanup
gethostname
WSAGetLastError
WSAStartup
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoFreeUnusedLibraries
CoRevokeClassObject
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
OleUninitialize
OleInitialize
CoInitialize
oleaut32
SystemTimeToVariantTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
Sections
.text Size: 460KB - Virtual size: 456KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE