Behavioral task
behavioral1
Sample
c73947e34a5752ceb18e2baa534fcdf18cf4e6a3e5ccad7eff7c35b0355dbc43.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c73947e34a5752ceb18e2baa534fcdf18cf4e6a3e5ccad7eff7c35b0355dbc43.exe
Resource
win10v2004-20230915-en
General
-
Target
c73947e34a5752ceb18e2baa534fcdf18cf4e6a3e5ccad7eff7c35b0355dbc43
-
Size
2.2MB
-
MD5
ce638296453800d8d751a48ac899879d
-
SHA1
d225c02cf075fd4133685ef5abb8e214b73bf4cf
-
SHA256
c73947e34a5752ceb18e2baa534fcdf18cf4e6a3e5ccad7eff7c35b0355dbc43
-
SHA512
a377b875b7096c566723538dafcaaea18561916082fefae010559acd2f7969e95d82c3f7188135a7a607635110a168db27e14b3dd41439d8a125ff101d3a5873
-
SSDEEP
49152:oYOPGqOx5sEhsmEDsU977xhL15iHapnxnQptqy:jOPGJfURxh2ExQpt5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c73947e34a5752ceb18e2baa534fcdf18cf4e6a3e5ccad7eff7c35b0355dbc43
Files
-
c73947e34a5752ceb18e2baa534fcdf18cf4e6a3e5ccad7eff7c35b0355dbc43.exe windows:6 windows x86
549670f01559ec985594b565cf09c153
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
SetFilePointer
GlobalFree
GetUserDefaultLCID
FindClose
FindFirstFileA
FindNextFileA
WriteFile
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
DeleteFileA
GetTickCount
CreateDirectoryA
GetEnvironmentVariableA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleA
GetLastError
HeapAlloc
GetProcessHeap
SetWaitableTimer
CreateWaitableTimerA
MoveFileExA
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
GetLocalTime
GetProcAddress
Sleep
VirtualFree
VirtualAlloc
GlobalMemoryStatusEx
MultiByteToWideChar
lstrcpyn
LocalAlloc
LocalFree
RtlMoveMemory
GetCommandLineW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
WideCharToMultiByte
GetTempPathW
lstrlenW
Module32First
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
HeapCreate
HeapDestroy
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
HeapSize
GetACP
RaiseException
GetSystemTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GetVersionExA
TerminateProcess
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
CreateThread
DeleteCriticalSection
WaitForSingleObject
GetCurrentDirectoryA
VirtualProtect
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushFileBuffers
lstrcpynA
shlwapi
PathIsDirectoryW
PathFileExistsA
ws2_32
select
WSACleanup
gethostbyname
inet_ntoa
WSAAsyncSelect
ntohs
recv
WSAStartup
closesocket
socket
inet_addr
htons
connect
send
getsockname
user32
FindWindowExA
PtInRect
GetWindow
GetParent
EnableWindow
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetActiveWindow
SetForegroundWindow
GetPropA
SetPropA
SetWindowTextA
PostQuitMessage
PostMessageA
SetCursor
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
GetCursorPos
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
GetMenuItemCount
SendDlgItemMessageA
GetDlgItem
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
UnregisterClassA
DestroyMenu
ShowWindow
SystemParametersInfoA
GetWindowLongA
IsWindowVisible
GetWindowTextA
GetClassNameA
SetWindowLongA
SetLayeredWindowAttributes
UpdateWindow
MsgWaitForMultipleObjects
PeekMessageA
FindWindowA
GetWindowThreadProcessId
IsWindow
SendMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
wsprintfA
GetMessageA
ReleaseDC
GetWindowRect
GetDesktopWindow
GetDC
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
DeleteDC
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetDeviceCaps
PtVisible
advapi32
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegCreateKeyExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
CommandLineToArgvW
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoInitialize
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetGetCookieA
InternetSetCookieA
HttpQueryInfoA
psapi
GetProcessImageFileNameW
winhttp
WinHttpCheckPlatform
WinHttpQueryHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
rasapi32
RasGetConnectStatusA
RasHangUpA
oledlg
ord8
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SafeArrayGetLBound
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 641KB - Virtual size: 640KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ