Behavioral task
behavioral1
Sample
NEAS.0831b294b9f75ba058bcded515a5727e9c38ac369d785b4b8f5fb0dbeb9ee6cc_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0831b294b9f75ba058bcded515a5727e9c38ac369d785b4b8f5fb0dbeb9ee6cc_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0831b294b9f75ba058bcded515a5727e9c38ac369d785b4b8f5fb0dbeb9ee6cc_JC.exe
-
Size
5.4MB
-
MD5
28fae868567d57c14913fe89fd7234ed
-
SHA1
c88f407e811503eedc7681c1a583255563876b4f
-
SHA256
0831b294b9f75ba058bcded515a5727e9c38ac369d785b4b8f5fb0dbeb9ee6cc
-
SHA512
0879eda847ff19594d445454b281047d488b9fef4f828a2e38d052e0711edb273dd551fb2b56ce0c9298faff0080a03c02599db9e38d9f0a8c4b6167585816fa
-
SSDEEP
98304:y8EZ6zczQKCc8iEhRUTCEKVKRDP75kKiL8plh/eV9EQVAhVdvYP6wWcrlIfz:3EEcBvEhyTCaB6S3hW9EW8A6wWOIf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0831b294b9f75ba058bcded515a5727e9c38ac369d785b4b8f5fb0dbeb9ee6cc_JC.exe
Files
-
NEAS.0831b294b9f75ba058bcded515a5727e9c38ac369d785b4b8f5fb0dbeb9ee6cc_JC.exe.exe windows:4 windows x86
91345faa0c7d040591ba662e03f75855
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
Sleep
WriteFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
WideCharToMultiByte
GetUserDefaultLCID
GetModuleFileNameA
GetStdHandle
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
GetVersionExA
GetTickCount
HeapFree
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
GetCurrentProcessId
VirtualFreeEx
VirtualAllocEx
GetCurrentProcess
MultiByteToWideChar
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
DeviceIoControl
Process32Next
CloseHandle
lstrlenA
Process32First
CreateToolhelp32Snapshot
CreateFileA
RtlMoveMemory
HeapAlloc
GetProcessHeap
CreateMutexA
OpenMutexA
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetDesktopWindow
MessageBoxA
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
DeleteService
ControlService
OpenServiceA
OpenSCManagerA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegOpenKeyA
wininet
InternetOpenUrlA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetOpenA
msvcrt
__CxxFrameHandler
strncmp
memmove
modf
realloc
_atoi64
strncpy
malloc
free
_CIfmod
sprintf
atoi
_ftol
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
srand
rand
strchr
strtod
ole32
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitialize
oleaut32
SafeArrayGetDim
VariantInit
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE