Behavioral task
behavioral1
Sample
7de690da4285c073a6f196231ce64cca210d1eaa34673a0f69cf89c2745514e6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7de690da4285c073a6f196231ce64cca210d1eaa34673a0f69cf89c2745514e6.exe
Resource
win10v2004-20230915-en
General
-
Target
7de690da4285c073a6f196231ce64cca210d1eaa34673a0f69cf89c2745514e6
-
Size
2.5MB
-
MD5
b22c9b86b4f0384ca5c1e920a54f6929
-
SHA1
ca5af0c14ffa835bd1cf7d48807891e757e303e7
-
SHA256
7de690da4285c073a6f196231ce64cca210d1eaa34673a0f69cf89c2745514e6
-
SHA512
e50b5edd7bf8698f5cc69a54da8b33f0cc7acc397723aed0bfcc7aab621d00de57e7104e352ad4ddb6623edc1cc2cc25dee4c29ad341724d5744981dfc33f9e3
-
SSDEEP
49152:6GiejEOLVU5CY4U4hww977xhL15iHapnxnQptqL:ziFF4JRxh2ExQptk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7de690da4285c073a6f196231ce64cca210d1eaa34673a0f69cf89c2745514e6
Files
-
7de690da4285c073a6f196231ce64cca210d1eaa34673a0f69cf89c2745514e6.exe windows:6 windows x86
97eb29b788a7333bf8bc86f5f8f957d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
SetFilePointer
GlobalFree
GetUserDefaultLCID
FindClose
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
WriteFile
CopyFileA
CreateFileA
GetFileSize
ReadFile
DeleteFileA
GetTickCount
CreateDirectoryA
WritePrivateProfileStringA
GetEnvironmentVariableA
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
SetWaitableTimer
CreateWaitableTimerA
MoveFileExA
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
GetLocalTime
Sleep
VirtualFree
VirtualAlloc
GlobalMemoryStatusEx
MultiByteToWideChar
lstrcpyn
LocalAlloc
LocalFree
RtlMoveMemory
GetCommandLineW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
WideCharToMultiByte
GetTempPathW
lstrlenW
Module32First
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
GetProcAddress
GetModuleHandleA
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
HeapCreate
HeapDestroy
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
HeapSize
GetACP
RaiseException
GetSystemTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GetVersionExA
TerminateProcess
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
CreateThread
DeleteCriticalSection
WaitForSingleObject
GetCurrentDirectoryA
VirtualProtect
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushFileBuffers
lstrcpynA
shlwapi
PathIsDirectoryW
PathFileExistsA
ws2_32
select
WSACleanup
gethostbyname
inet_ntoa
WSAAsyncSelect
ntohs
recv
WSAStartup
closesocket
socket
inet_addr
htons
connect
send
getsockname
user32
FindWindowExA
PtInRect
GetWindow
GetParent
EnableWindow
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetActiveWindow
SetForegroundWindow
GetPropA
SetPropA
SetWindowTextA
PostQuitMessage
PostMessageA
SetCursor
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
GetCursorPos
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
GetMenuItemCount
SendDlgItemMessageA
GetDlgItem
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
UnregisterClassA
DestroyMenu
ShowWindow
SystemParametersInfoA
GetWindowLongA
IsWindowVisible
GetWindowTextA
GetClassNameA
SetWindowLongA
SetLayeredWindowAttributes
UpdateWindow
MsgWaitForMultipleObjects
PeekMessageA
FindWindowA
GetWindowThreadProcessId
IsWindow
SendMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
wsprintfA
ReleaseDC
GetWindowRect
GetDesktopWindow
GetDC
GetMessageA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
DeleteDC
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetDeviceCaps
PtVisible
advapi32
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegCreateKeyExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
CommandLineToArgvW
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoInitialize
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetGetCookieA
InternetSetCookieA
HttpQueryInfoA
psapi
GetProcessImageFileNameW
winhttp
WinHttpCheckPlatform
WinHttpQueryHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
rasapi32
RasGetConnectStatusA
RasHangUpA
oledlg
ord8
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SafeArrayGetLBound
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 764KB - Virtual size: 763KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.6MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ