Behavioral task
behavioral1
Sample
NEAS.0e6915ed0873516358943558236d78cd00a2ca3c090cfb73f114143345bbea52_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0e6915ed0873516358943558236d78cd00a2ca3c090cfb73f114143345bbea52_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0e6915ed0873516358943558236d78cd00a2ca3c090cfb73f114143345bbea52_JC.exe
-
Size
865KB
-
MD5
aeb94255920a7124a33aed103becbbf6
-
SHA1
57ed46cf5de24f60f99b8be2d69a0376e4e87f90
-
SHA256
0e6915ed0873516358943558236d78cd00a2ca3c090cfb73f114143345bbea52
-
SHA512
2b538992a88375831d97353d782d00b00937d09b7443ec3450e4c85076fbcbb51cc539bcbe2ec72a0d0fabad707077be37c88c99ea334f5a8776fb5c36fdc85a
-
SSDEEP
24576:VLCWNQa39clGyRBXXgsCeFalhl5HzcW2JY:VqBRbCesgdY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0e6915ed0873516358943558236d78cd00a2ca3c090cfb73f114143345bbea52_JC.exe
Files
-
NEAS.0e6915ed0873516358943558236d78cd00a2ca3c090cfb73f114143345bbea52_JC.exe.exe windows:4 windows x86
dd99af05a4e5a6d9827bff22918f9c96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapFree
IsBadReadPtr
MultiByteToWideChar
WideCharToMultiByte
GetTickCount
DeleteFileA
Sleep
WriteFile
CreateProcessA
GetStartupInfoA
GetUserDefaultLCID
FormatMessageA
GetModuleFileNameA
GetStdHandle
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
FreeLibrary
GetProcAddress
HeapAlloc
LCMapStringA
GetVersionExA
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
ExitProcess
GetModuleHandleA
GetProcessHeap
WaitForSingleObject
CreateThread
GetWindowsDirectoryA
DeviceIoControl
lstrlenA
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
CreateFileA
TerminateProcess
OpenProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
CreateMutexA
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
lstrcpyn
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
InitializeCriticalSection
GetVolumeInformationA
GetComputerNameA
GetExitCodeThread
TerminateThread
ReleaseMutex
CreateFileMappingA
GetLocalTime
CreateDirectoryA
ReadFile
GetFileSize
GetVersion
RtlUnwind
GetCurrentProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetFileType
SetHandleCount
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
OpenMutexA
user32
DispatchMessageA
PeekMessageA
wsprintfA
MessageBoxA
GetMessageA
TranslateMessage
GetDesktopWindow
advapi32
CryptDestroyHash
OpenServiceA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
StartServiceA
CreateServiceA
CryptGetHashParam
OpenSCManagerA
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
CloseServiceHandle
DeleteService
ControlService
dwmapi
DwmIsCompositionEnabled
shell32
ShellExecuteA
shlwapi
PathRemoveFileSpecA
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpSendRequestA
InternetReadFile
HttpOpenRequestA
msvcrt
calloc
__CxxFrameHandler
strncmp
memmove
strncpy
modf
realloc
_atoi64
_CIpow
_CIfmod
strtod
strchr
rand
srand
strrchr
_ftol
atoi
malloc
free
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
ole32
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
oleaut32
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
Sections
.text Size: 386KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 463KB - Virtual size: 513KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE