Behavioral task
behavioral1
Sample
3a09226fef97dadb62f8971c1ae8e4c40176819c66068dfce85d96cc2df6a38c.exe
Resource
win7-20230831-en
General
-
Target
3a09226fef97dadb62f8971c1ae8e4c40176819c66068dfce85d96cc2df6a38c
-
Size
8.8MB
-
MD5
d00bc1f0cef9d4f2df478e6c69be07c6
-
SHA1
a8c82d6291ffa4978c2412b390b9830ae73fce69
-
SHA256
3a09226fef97dadb62f8971c1ae8e4c40176819c66068dfce85d96cc2df6a38c
-
SHA512
eac80136e1f09b53fc1a2af893a55fade2cec16bb2125e9b9362b6c6362466ce9a96f208a4e7f934578a7ef090aef2b32ac6fe50e063c81e27384b59daff8c1c
-
SSDEEP
98304:hZ7cvDXGsUgG1/Q/g+ZmiPDC+kAEDKBSzqiNoEqmSCG02GYG1MqvMYfVCetV6EYj:wDZHFg+ZTrnkJGTiNyG2Gd1McQelYj
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a09226fef97dadb62f8971c1ae8e4c40176819c66068dfce85d96cc2df6a38c
Files
-
3a09226fef97dadb62f8971c1ae8e4c40176819c66068dfce85d96cc2df6a38c.exe windows:4 windows x86
ea85e6d8d931a93d286f5a3e7b1a49e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetVersionExA
LCMapStringA
GetCommandLineA
SetFilePointer
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
CopyFileA
MoveFileA
FormatMessageA
GetUserDefaultLCID
SetFileAttributesA
DeleteFileA
CreateDirectoryA
GetPrivateProfileStringA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
WriteFile
CreateFileA
GetFileSize
ReadFile
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpiW
lstrcmpW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
RtlZeroMemory
HeapAlloc
HeapFree
GetProcessHeap
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualQueryEx
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
lstrcpyA
VirtualFree
lstrcpyn
LoadLibraryA
VirtualAlloc
lstrcpynA
IsBadCodePtr
FreeLibrary
LoadLibraryW
GetModuleHandleW
GetProcAddress
RtlMoveMemory
GetModuleHandleA
GetFileAttributesW
GetLocalTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetWaitableTimer
CreateWaitableTimerA
GetCurrentProcessId
FindClose
FindFirstFileW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
Process32Next
CloseHandle
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
CreateThread
DeleteCriticalSection
Sleep
GetTimeZoneInformation
SetLastError
TerminateProcess
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
FlushFileBuffers
MulDiv
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
Process32First
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
WideCharToMultiByte
lstrlenW
lstrlenA
MultiByteToWideChar
user32
IsDialogMessageA
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
PostMessageA
PostQuitMessage
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
SendDlgItemMessageA
LoadCursorA
SetCursor
PostMessageW
MsgWaitForMultipleObjects
SetWindowPos
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
FindWindowExA
PeekMessageA
TranslateMessage
DispatchMessageA
SendMessageA
RegisterWindowMessageA
FindWindowA
CallWindowProcA
IsWindow
CreateIconFromResource
SetPropA
GetPropA
GetClientRect
GetWindowThreadProcessId
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
GetWindowRect
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
MessageBoxA
wsprintfA
GetMessageA
GetSystemMetrics
ClientToScreen
RegisterClipboardFormatA
GetLastActivePopup
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
shell32
SHFreeNameMappings
Shell_NotifyIconA
SHAppBarMessage
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationW
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitialize
OleRun
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
gdi32
DeleteObject
DeleteDC
SelectObject
GetStockObject
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
wininet
InternetOpenUrlA
InternetGetConnectedState
InternetTimeToSystemTime
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetCanonicalizeUrlA
InternetCrackUrlA
shlwapi
PathIsDirectoryW
PathIsURLA
StrToIntExW
StrToIntW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdiplus
GdipLoadImageFromFile
GdipLoadImageFromStream
GdipGetImageWidth
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
oleaut32
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
SafeArrayGetDim
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SafeArrayGetLBound
oledlg
ord8
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
WSACleanup
WSAStartup
select
closesocket
recv
send
Sections
HInFx Size: 788KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
AFdHBK Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
zkOyW Size: 8.0MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qsxmr Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE