Behavioral task
behavioral1
Sample
NEAS.a199efa3f31d0ed5cb047423daf7be397bb8c320c05f1d962d7a50785c0244a9_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.a199efa3f31d0ed5cb047423daf7be397bb8c320c05f1d962d7a50785c0244a9_JC.exe
-
Size
4.5MB
-
MD5
ea3e3476e2a2faafa1d710c119cc65ba
-
SHA1
276a0a372da5ca69043f6bbab11bea822863149a
-
SHA256
a199efa3f31d0ed5cb047423daf7be397bb8c320c05f1d962d7a50785c0244a9
-
SHA512
2da5bceea609c98e9a766039e72ffbd595958de6bc549b0c0b31f075836caeab31b256cdb5a40eb08f8771de4cb84706ae8aea67324d0415950aa1f020e2fe57
-
SSDEEP
49152:iuWYmjXcvDgYGERUAhZjNGlY+/bM/dPy+cT/8ks22ur9tpaGADCjSkAl2+XFCU4I:5kXcvDXGsUgG1/Q/g+ZmiPDC+kAEy4
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.a199efa3f31d0ed5cb047423daf7be397bb8c320c05f1d962d7a50785c0244a9_JC.exe
Files
-
NEAS.a199efa3f31d0ed5cb047423daf7be397bb8c320c05f1d962d7a50785c0244a9_JC.exe.exe windows:4 windows x86
90dd2461c0aeb8ce6c05e04ea5c699cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
LocalAlloc
LocalFree
CloseHandle
GetModuleHandleW
LoadLibraryW
GetProcAddress
FreeLibrary
lstrlenA
MultiByteToWideChar
IsBadCodePtr
RtlMoveMemory
lstrlenW
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32First
Process32Next
QueryDosDeviceW
FindFirstFileW
FindClose
GetCurrentProcessId
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetLocalTime
GetFileAttributesW
GetModuleHandleA
lstrcpyA
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
lstrcpyn
VirtualQueryEx
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
GetProcessHeap
HeapFree
HeapAlloc
VirtualFree
RtlZeroMemory
InterlockedExchangeAdd
InterlockedIncrement
InterlockedDecrement
HeapDestroy
DeviceIoControl
GetVersionExA
LCMapStringA
LoadLibraryA
GetCommandLineA
SetFilePointer
MoveFileA
FormatMessageA
GetUserDefaultLCID
SetFileAttributesA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
Sleep
GetTimeZoneInformation
SetLastError
TerminateProcess
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
lstrcpynA
DeleteCriticalSection
FlushFileBuffers
GetCurrentProcess
MulDiv
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
DeleteFileA
CreateDirectoryA
GetPrivateProfileStringA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
WriteFile
CreateFileA
GetFileSize
ReadFile
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpiW
lstrcmpW
HeapCreate
user32
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
PostMessageA
IsIconic
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowPlacement
SetFocus
SetWindowPos
IsDialogMessageA
SendDlgItemMessageA
LoadCursorA
SetCursor
SetTimer
SendMessageA
FindWindowExA
PostMessageW
RegisterWindowMessageA
FindWindowA
CallWindowProcA
IsWindow
SetWindowLongA
CreateIconFromResource
SetPropA
GetPropA
GetClientRect
GetWindowThreadProcessId
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetWindowTextA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
GetWindowRect
GetSystemMetrics
SetWindowTextA
SetForegroundWindow
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
PostQuitMessage
CheckMenuItem
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
SHGetMalloc
ole32
OleInitialize
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
gdi32
GetDeviceCaps
CreateBitmap
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SelectObject
DeleteDC
DeleteObject
SaveDC
Escape
ExtTextOutA
TextOutA
RectVisible
GetObjectA
GetStockObject
PtVisible
wininet
InternetOpenUrlA
InternetGetConnectedState
InternetTimeToSystemTime
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetCanonicalizeUrlA
InternetCrackUrlA
shlwapi
PathIsDirectoryW
PathIsURLA
StrToIntExW
StrToIntW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdiplus
GdiplusShutdown
GdipDisposeImage
GdipGetImageWidth
GdipLoadImageFromStream
GdipLoadImageFromFile
GdiplusStartup
oleaut32
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
SafeArrayGetDim
SafeArrayDestroy
SystemTimeToVariantTime
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantClear
oledlg
ord8
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
WSACleanup
WSAStartup
select
closesocket
recv
send
Sections
SQbSe Size: 708KB - Virtual size: 707KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ogmNam Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PpWCB Size: 3.7MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vNqYZ Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE