Behavioral task
behavioral1
Sample
341c50dff68d0845f5a8debe170fc103088e863cd60d6595ac266641f25ff2bf.exe
Resource
win7-20230831-en
General
-
Target
341c50dff68d0845f5a8debe170fc103088e863cd60d6595ac266641f25ff2bf
-
Size
4.2MB
-
MD5
0f47607cfa613c0c819a723ee252b6f1
-
SHA1
ad5fedb0668816d65906c7dc3fc0bdddd0b82b02
-
SHA256
341c50dff68d0845f5a8debe170fc103088e863cd60d6595ac266641f25ff2bf
-
SHA512
a2a7513524d14ed5714d1be715453b9f5cff8bf0f5faf47066dc7e759447f6472eeca3f33adbc707bb8b4cff7d904589cec0c7aea73b5069fa631edebd9f095d
-
SSDEEP
49152:OJDMN1oZP7YY8YhXz53wJWqD2Nr61Ai2oB9Kgk6EaXtgjMdHCX0lXAlAvC:0D+1oR9bDE+N+SiLKwESgjMxSb
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 341c50dff68d0845f5a8debe170fc103088e863cd60d6595ac266641f25ff2bf
Files
-
341c50dff68d0845f5a8debe170fc103088e863cd60d6595ac266641f25ff2bf.exe windows:4 windows x86
205449ce983c8ad076a7058f2276e8cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateRemoteThread
GetStartupInfoA
GetDiskFreeSpaceExA
GetCurrentDirectoryA
GetUserDefaultLCID
HeapCreate
SetFileAttributesA
Sleep
SetCurrentDirectoryA
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
LoadLibraryA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
VirtualQuery
GetVersionExA
SetProcessAffinityMask
lstrcpynW
Module32Next
Module32First
LeaveCriticalSection
TerminateThread
VirtualProtect
FreeLibrary
LoadLibraryExA
MultiByteToWideChar
DuplicateHandle
CreateThread
RtlMoveMemory
GetCurrentProcess
Process32Next
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetExitCodeThread
InitializeCriticalSection
GetCurrentThreadId
EnterCriticalSection
DeleteCriticalSection
GetModuleFileNameA
Process32First
CreateToolhelp32Snapshot
WriteFile
GetTickCount
DeleteFileA
GetFileSize
ReadFile
CheckRemoteDebuggerPresent
VirtualQueryEx
ReadProcessMemory
DeviceIoControl
CreateFileA
GetLastError
CreateProcessA
PeekNamedPipe
lstrlenW
lstrcpyA
RtlZeroMemory
HeapAlloc
HeapFree
GetCPInfo
lstrcmpW
lstrcmpiW
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
lstrcpyn
CopyFileA
VirtualAllocEx
CloseHandle
WideCharToMultiByte
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
IsWow64Process
lstrcpynA
WaitForSingleObject
OpenProcess
OpenThread
WriteProcessMemory
VirtualFreeEx
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
SetWaitableTimer
CreateWaitableTimerA
GetNativeSystemInfo
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
SetFilePointer
LCMapStringW
LCMapStringA
LoadResource
TlsSetValue
TlsFree
GlobalHandle
SetStdHandle
IsBadCodePtr
IsBadReadPtr
CompareStringW
CompareStringA
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
TerminateProcess
GetLocalTime
GetSystemTime
GetTimeZoneInformation
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
GetFileSize
TlsGetValue
CloseHandle
WaitForSingleObject
CreateProcessA
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
ReadFile
LockResource
TlsAlloc
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
LocalAlloc
lstrcmpA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
lstrcpynA
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
InterlockedDecrement
InterlockedIncrement
LocalReAlloc
shlwapi
StrToIntExA
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
StrToIntW
StrToIntExW
ws2_32
htons
WSAStartup
WSACleanup
accept
getpeername
recv
ioctlsocket
recvfrom
WSAAsyncSelect
closesocket
WSACleanup
inet_ntoa
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
user32
SendMessageA
GetDlgItem
FindWindowA
GetClassNameA
WindowFromPoint
GetCursorPos
ClientToScreen
MsgWaitForMultipleObjects
MessageBoxA
ShowWindow
RegisterWindowMessageA
EnumWindows
GetAncestor
SetTimer
CallWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
GetMessageA
GetSystemMetrics
GetParent
GetWindowThreadProcessId
IsWindowVisible
GetWindowTextA
GetForegroundWindow
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
UnregisterClassA
GetWindowPlacement
RegisterWindowMessageA
GetForegroundWindow
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
PeekMessageA
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
GetClassNameA
GetDesktopWindow
LoadStringA
GetSysColorBrush
IsIconic
SetFocus
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
DestroyIcon
PtInRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
GetActiveWindow
GetWindow
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WaitForInputIdle
CharUpperA
GetWindowTextA
OffsetRect
GetWindowTextLengthA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CreateProcessAsUserA
RegQueryValueExA
CryptHashData
CryptGetHashParam
OpenSCManagerA
CreateServiceA
RegSetValueExA
RegOpenKeyA
RegCloseKey
OpenServiceA
DeleteService
ControlService
StartServiceA
CloseServiceHandle
RegCreateKeyExA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Shell_NotifyIconA
ole32
OleRun
CoUninitialize
CoCreateInstance
CoInitialize
CLSIDFromProgID
CLSIDFromString
CLSIDFromString
OleUninitialize
OleInitialize
psapi
GetModuleInformation
oleaut32
VariantChangeType
SafeArrayUnaccessData
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayGetDim
SafeArrayCreate
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
VariantCopy
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
gdi32
SetBkColor
GetTextMetricsA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBitmap
SelectObject
GetObjectA
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
Ellipse
winmm
midiStreamClose
midiOutReset
midiStreamStop
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
midiStreamRestart
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
ImageList_Destroy
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.9MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ