Behavioral task
behavioral1
Sample
NEAS.9c6efbe0f4e781624a4abfe34dd0e2407a19beaa31267d305ce4568a396214a9_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.9c6efbe0f4e781624a4abfe34dd0e2407a19beaa31267d305ce4568a396214a9_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.9c6efbe0f4e781624a4abfe34dd0e2407a19beaa31267d305ce4568a396214a9_JC.exe
-
Size
7.6MB
-
MD5
d4105ba24ee16643a7b3f894e4660bd8
-
SHA1
a4c42ebab9a86e9c321074e7fdafece9a5ac512b
-
SHA256
9c6efbe0f4e781624a4abfe34dd0e2407a19beaa31267d305ce4568a396214a9
-
SHA512
f7cde9ef3006b87fb7c78b194875f9ef846726c32ebe7e373b6092f2b8c155f19870948fb64f8d5bf511a27824157bd26dcce6a11ecb00648d2995a377780346
-
SSDEEP
196608:RVBs6sKBD7430ftxI4LL6+OYof/uZrZRMwnYI/H0A:W6sgDW0ftTLbq+M+YI/3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.9c6efbe0f4e781624a4abfe34dd0e2407a19beaa31267d305ce4568a396214a9_JC.exe
Files
-
NEAS.9c6efbe0f4e781624a4abfe34dd0e2407a19beaa31267d305ce4568a396214a9_JC.exe.exe windows:4 windows x86
714a440b7d85350ad375868ca932c713
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
GetFileSize
CreateFileA
ReadConsoleA
SetWaitableTimer
WritePrivateProfileStringA
FindNextFileA
FindFirstFileA
FindClose
SetFileAttributesA
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
CreateWaitableTimerA
lstrcpyn
Process32Next
Process32First
CreateToolhelp32Snapshot
WideCharToMultiByte
lstrlenW
GetTickCount
FreeConsole
GetLocalTime
IsDebuggerPresent
Sleep
GetLogicalProcessorInformation
GetVersion
CreateEventA
OpenEventA
CreateFileMappingA
OpenFileMappingA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
CreateMutexA
GlobalMemoryStatusEx
GetProcAddress
VirtualFree
VirtualAlloc
SetConsoleTitleA
VirtualProtect
GetCurrentProcessId
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetPrivateProfileStringA
GetCurrentProcess
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetLastError
GetVersionExA
GetSystemInfo
IsProcessorFeaturePresent
GetWindowsDirectoryA
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
gdi32
CreateFontA
TranslateCharsetInfo
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
StretchBlt
GetObjectA
GetDIBits
DeleteDC
DeleteObject
GetDeviceCaps
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
user32
GetWindowTextLengthW
GetWindowTextW
FindWindowA
IsWindow
GetAsyncKeyState
FindWindowExA
MessageBoxTimeoutA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
GetDesktopWindow
GetWindowRect
ReleaseDC
GetSystemMetrics
CreateWindowStationA
MessageBoxA
MsgWaitForMultipleObjects
SendInput
GetParent
CallWindowProcA
CreateWindowExA
GetCursorPos
GetSysColor
LoadBitmapA
RegisterHotKey
ReleaseCapture
ScreenToClient
SendMessageA
SetCapture
UnregisterHotKey
SetLayeredWindowAttributes
SetWindowLongA
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
wsprintfA
ws2_32
closesocket
socket
inet_addr
htons
connect
send
recv
getsockname
ntohs
WSAAsyncSelect
select
WSACleanup
gethostbyname
inet_ntoa
WSAStartup
shlwapi
PathFileExistsA
shell32
DragAcceptFiles
SHGetSpecialFolderPathA
DragFinish
DragQueryFileA
comctl32
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_EndDrag
ord17
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
ImageList_DragShowNolock
Sections
.text Size: 592KB - Virtual size: 591KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.9MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ