Behavioral task
behavioral1
Sample
NEAS.aa6c226ba4ed1271b88edc114cbe831f96b3d12dc04b262aadcb88e749eb087e_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.aa6c226ba4ed1271b88edc114cbe831f96b3d12dc04b262aadcb88e749eb087e_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.aa6c226ba4ed1271b88edc114cbe831f96b3d12dc04b262aadcb88e749eb087e_JC.exe
-
Size
1.3MB
-
MD5
230504c670e32ec0549cf9d378188cf5
-
SHA1
682ce1ea57b829976bd6fc007edc8f54b7032b25
-
SHA256
aa6c226ba4ed1271b88edc114cbe831f96b3d12dc04b262aadcb88e749eb087e
-
SHA512
2874bcdb788327a38c4b9d9eb6df2ebc17c1d5439a553eb4c0bac30d1ab66823b7fee6a9f789fceaa9326da82ee17d7ff7a4f66f67c5dc5c52044d20801928b6
-
SSDEEP
24576:EPVrgJ0RFRglsHvnqStAhIykFv0N+JElTLoNHhYh2ayR9mE1O:EPtRvnqStAh/kFcNeUHWJRz4
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.aa6c226ba4ed1271b88edc114cbe831f96b3d12dc04b262aadcb88e749eb087e_JC.exe
Files
-
NEAS.aa6c226ba4ed1271b88edc114cbe831f96b3d12dc04b262aadcb88e749eb087e_JC.exe.exe windows:4 windows x86
68b0ae31a38d338b44cb62b7e7277c2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetTempPathA
WriteFile
GetLastError
GetVersionExA
GetSystemInfo
IsProcessorFeaturePresent
lstrcmpiA
GetWindowsDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
InterlockedIncrement
TerminateProcess
lstrcpyA
GlobalAlloc
SetLastError
lstrcatA
GetVersion
MulDiv
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
FlushFileBuffers
lstrcpynA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetSystemDirectoryA
lstrlenA
DeleteCriticalSection
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FindClose
FindFirstFileA
FindNextFileA
GlobalMemoryStatusEx
SetFilePointer
WritePrivateProfileStringA
CreateFileA
GetFileSize
ReadFile
GetPrivateProfileStringA
GetTickCount
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
RtlMoveMemory
IsDebuggerPresent
Sleep
CreateThread
VirtualProtect
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
GetLocalTime
GetProcAddress
VirtualFree
VirtualAlloc
GetModuleFileNameA
GetModuleHandleA
winmm
PlaySoundA
gdi32
DeleteObject
DeleteDC
CreateFontA
GetObjectA
StretchBlt
SetStretchBltMode
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
TranslateCharsetInfo
CreateBitmap
SaveDC
RestoreDC
SetBkColor
GetDeviceCaps
SelectObject
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDIBits
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
advapi32
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegQueryValueExA
user32
CreateWindowStationA
GetAsyncKeyState
GetWindowThreadProcessId
CreateDialogIndirectParamA
UpdateWindow
SendMessageA
DestroyWindow
PostQuitMessage
SetWindowTextA
GetDlgItem
ShowWindow
ScreenToClient
GetWindowTextLengthA
GetSystemMetrics
GetDC
GetDesktopWindow
GetWindowRect
ReleaseDC
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
PostMessageA
SetCursorPos
GetCursorPos
SetWindowPos
MoveWindow
ShowWindowAsync
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetForegroundWindow
GetKeyboardLayout
VkKeyScanExA
SetCapture
ReleaseCapture
keybd_event
SystemParametersInfoA
PtInRect
GetWindow
CallWindowProcA
CreateWindowExA
GetSysColor
LoadBitmapA
RegisterHotKey
UnregisterHotKey
SetLayeredWindowAttributes
SetCursor
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
GetDlgCtrlID
GetMenuItemCount
UnregisterClassA
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowLongA
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindowLongA
shell32
SHGetSpecialFolderPathA
DragAcceptFiles
DragFinish
DragQueryFileA
shlwapi
PathFileExistsA
ws2_32
getsockname
recv
WSAStartup
send
ntohs
WSAAsyncSelect
select
WSACleanup
gethostbyname
inet_ntoa
connect
htons
inet_addr
socket
closesocket
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ImageList_DragMove
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_EndDrag
ImageList_Add
ord17
Sections
.text Size: 816KB - Virtual size: 813KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 436KB - Virtual size: 597KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ