Behavioral task
behavioral1
Sample
NEAS.ff91722be22585bfb2edd7cf02c3564bf7d74dbeb7d63a6fd400e972dd64b6ce_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.ff91722be22585bfb2edd7cf02c3564bf7d74dbeb7d63a6fd400e972dd64b6ce_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.ff91722be22585bfb2edd7cf02c3564bf7d74dbeb7d63a6fd400e972dd64b6ce_JC.exe
-
Size
384KB
-
MD5
d6c73f6cdde209da2c113eb1d7e3e849
-
SHA1
40ea67d53dc36928a4b3ca7e04b90ad610e96bf7
-
SHA256
ff91722be22585bfb2edd7cf02c3564bf7d74dbeb7d63a6fd400e972dd64b6ce
-
SHA512
e2d61424a9ef969fb581d061e6e3a7facc7f11c8c584904b997617b0d620060e119d5e11db74d7ae3c7b95a1919601aca19908162c8a7fcb6f362bec95d8ed49
-
SSDEEP
6144:h5ZQwamGrUUP4VpH8hHzuPwrNFV5qfqiOEUYVdnH9SBc1E7dX3ptZZxHnQbAKE9Z:h5Zem/I4VpclzNc4A652mjQGNGe
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.ff91722be22585bfb2edd7cf02c3564bf7d74dbeb7d63a6fd400e972dd64b6ce_JC.exe
Files
-
NEAS.ff91722be22585bfb2edd7cf02c3564bf7d74dbeb7d63a6fd400e972dd64b6ce_JC.exe.exe windows:4 windows x86
897f2779617ead5fd43b25323620bbed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
ExitProcess
HeapReAlloc
IsBadReadPtr
GetPrivateProfileStringA
WritePrivateProfileStringA
WriteFile
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
FindClose
FindNextFileA
RemoveDirectoryA
FindFirstFileA
GetLocalTime
GetCommandLineA
FreeLibrary
LCMapStringA
GetProcAddress
CreateThread
WideCharToMultiByte
lstrlenW
GetTickCount
Process32Next
Process32First
FlushFileBuffers
CreateToolhelp32Snapshot
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LeaveCriticalSection
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
InterlockedIncrement
InterlockedDecrement
RtlUnwind
GetVersion
GetStartupInfoA
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
CloseHandle
LocalFree
DeleteCriticalSection
InitializeCriticalSection
MoveFileA
CreateDirectoryA
GetLastError
DeviceIoControl
CreateFileA
TerminateThread
LoadLibraryA
OpenThread
Thread32Next
Thread32First
LocalSize
LocalAlloc
HeapAlloc
HeapFree
GetProcessHeap
MultiByteToWideChar
RtlMoveMemory
CreateWaitableTimerA
SetWaitableTimer
Sleep
GetOEMCP
lstrcpyn
OpenProcess
GetCurrentProcess
SetStdHandle
GetModuleHandleA
user32
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
CheckMenuItem
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
GetMenuItemInfoA
GetMenuStringA
TrackPopupMenu
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
PeekMessageA
SetMenuInfo
InsertMenuA
GetMenuItemCount
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
CreateMenu
ReleaseDC
GetDC
RegisterClassExA
SetActiveWindow
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSubMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
SetParent
PostMessageA
SetWindowPos
MoveWindow
UpdateWindow
ValidateRect
InvalidateRect
ScreenToClient
GetWindowRect
GetFocus
SetFocus
GetDlgItem
GetWindowLongA
CreateWindowExA
DestroyCursor
SetWindowLongA
PostQuitMessage
DestroyIcon
TrackMouseEvent
SetCursor
LoadCursorA
DefMDIChildProcA
SendMessageA
DefWindowProcA
DestroyWindow
GetClientRect
GetAsyncKeyState
EndPaint
BeginPaint
DispatchMessageA
TranslateMessage
IsDialogMessageA
TranslateAcceleratorA
GetMessageA
SendInput
MapVirtualKeyA
GetForegroundWindow
IsWindow
MsgWaitForMultipleObjects
CallWindowProcA
SetTimer
GetWindowTextW
GetWindowTextLengthW
GetClassNameA
GetParent
GetWindowThreadProcessId
IsWindowVisible
FindWindowExA
AppendMenuA
advapi32
StartServiceA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
shell32
DragFinish
SHGetSpecialFolderPathA
Shell_NotifyIconA
DragQueryFileA
DragAcceptFiles
ole32
CLSIDFromString
atl
ord42
ord47
comctl32
InitCommonControlsEx
gdi32
DeleteObject
GetObjectA
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
BitBlt
ExtCreateRegion
CombineRgn
CreateRoundRectRgn
StretchBlt
CreateSolidBrush
CreatePatternBrush
SetTextColor
SetBkMode
SetBkColor
GetStockObject
psapi
GetMappedFileNameA
shlwapi
PathFileExistsA
Sections
.text Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ