Behavioral task
behavioral1
Sample
b349da08f3a7b0717278f118485f4304be7422c52d3d042018c4c6f1bf162970.exe
Resource
win7-20230831-en
General
-
Target
b349da08f3a7b0717278f118485f4304be7422c52d3d042018c4c6f1bf162970
-
Size
8.8MB
-
MD5
44e42600c18095dc027391541800e19a
-
SHA1
592e79a186476096c1c51dd4bca1d4620764d566
-
SHA256
b349da08f3a7b0717278f118485f4304be7422c52d3d042018c4c6f1bf162970
-
SHA512
c5eea2f86916c702ba595349825dfb3344bd1df6edc6ba5556720713800d5197f5ec5c7aec92ce67152fb40341a8ba65264e05e921a05ac6400bc51e55405084
-
SSDEEP
98304:JZ7cvDXGsUgG1/Q/g+ZmiPDC+kAEDKBSzqiNoEqmSCG02GYG1MqvMYfVCetV6EYj:IDZHFg+ZTrnkJGTiNyG2Gd1McQelYj
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b349da08f3a7b0717278f118485f4304be7422c52d3d042018c4c6f1bf162970
Files
-
b349da08f3a7b0717278f118485f4304be7422c52d3d042018c4c6f1bf162970.exe windows:4 windows x86
ea85e6d8d931a93d286f5a3e7b1a49e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetVersionExA
LCMapStringA
GetCommandLineA
SetFilePointer
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
CopyFileA
MoveFileA
FormatMessageA
GetUserDefaultLCID
SetFileAttributesA
DeleteFileA
CreateDirectoryA
GetPrivateProfileStringA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
WriteFile
CreateFileA
GetFileSize
ReadFile
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpiW
lstrcmpW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
RtlZeroMemory
HeapAlloc
HeapFree
GetProcessHeap
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualQueryEx
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
lstrcpyA
VirtualFree
lstrcpyn
LoadLibraryA
VirtualAlloc
lstrcpynA
IsBadCodePtr
FreeLibrary
LoadLibraryW
GetModuleHandleW
GetProcAddress
RtlMoveMemory
GetModuleHandleA
GetFileAttributesW
GetLocalTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetWaitableTimer
CreateWaitableTimerA
GetCurrentProcessId
FindClose
FindFirstFileW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
Process32Next
CloseHandle
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
CreateThread
DeleteCriticalSection
Sleep
GetTimeZoneInformation
SetLastError
TerminateProcess
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
FlushFileBuffers
MulDiv
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
Process32First
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
WideCharToMultiByte
lstrlenW
lstrlenA
MultiByteToWideChar
user32
IsDialogMessageA
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
PostMessageA
PostQuitMessage
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
SendDlgItemMessageA
LoadCursorA
SetCursor
PostMessageW
MsgWaitForMultipleObjects
SetWindowPos
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
FindWindowExA
PeekMessageA
TranslateMessage
DispatchMessageA
SendMessageA
RegisterWindowMessageA
FindWindowA
CallWindowProcA
IsWindow
CreateIconFromResource
SetPropA
GetPropA
GetClientRect
GetWindowThreadProcessId
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
GetWindowRect
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
MessageBoxA
wsprintfA
GetMessageA
GetSystemMetrics
ClientToScreen
RegisterClipboardFormatA
GetLastActivePopup
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
shell32
SHFreeNameMappings
Shell_NotifyIconA
SHAppBarMessage
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationW
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitialize
OleRun
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
gdi32
DeleteObject
DeleteDC
SelectObject
GetStockObject
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
wininet
InternetOpenUrlA
InternetGetConnectedState
InternetTimeToSystemTime
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetCanonicalizeUrlA
InternetCrackUrlA
shlwapi
PathIsDirectoryW
PathIsURLA
StrToIntExW
StrToIntW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdiplus
GdipLoadImageFromFile
GdipLoadImageFromStream
GdipGetImageWidth
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
oleaut32
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
SafeArrayGetDim
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SafeArrayGetLBound
oledlg
ord8
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
WSACleanup
WSAStartup
select
closesocket
recv
send
Sections
yibLr Size: 788KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
vmNzuL Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
nXQoE Size: 8.0MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
beJlX Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE