Behavioral task
behavioral1
Sample
708b0b3091d1c0981c90f02c414f0b6ab8609a89bff923da47964106f5ca651d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
708b0b3091d1c0981c90f02c414f0b6ab8609a89bff923da47964106f5ca651d.exe
Resource
win10v2004-20230915-en
General
-
Target
708b0b3091d1c0981c90f02c414f0b6ab8609a89bff923da47964106f5ca651d
-
Size
7.6MB
-
MD5
92b8df0f7e97b853d02772c640797f6c
-
SHA1
a3d8aa9bc11cb6bad4d4a05d4a040b0b904d8a66
-
SHA256
708b0b3091d1c0981c90f02c414f0b6ab8609a89bff923da47964106f5ca651d
-
SHA512
5e03d1a7479d65605a66003634858e6247e6178abe6148c65ce0ea2bf48a6aaf8655ab2c4663f21963231de9a649e306123a90f192e67c951516b981ae252412
-
SSDEEP
196608:SV1uF/KBD7430ftxI4LL6+OYof/uZrZRMwnYI/H0S:7F/gDW0ftTLbq+M+YI/R
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 708b0b3091d1c0981c90f02c414f0b6ab8609a89bff923da47964106f5ca651d
Files
-
708b0b3091d1c0981c90f02c414f0b6ab8609a89bff923da47964106f5ca651d.exe windows:4 windows x86
f75198e82815c1bc61e1145e16446542
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
GetFileSize
CreateFileA
ReadConsoleA
SetWaitableTimer
WritePrivateProfileStringA
FindNextFileA
FindFirstFileA
FindClose
SetFileAttributesA
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
CreateWaitableTimerA
lstrcpyn
Process32Next
Process32First
CreateToolhelp32Snapshot
WideCharToMultiByte
lstrlenW
GetTickCount
FreeConsole
GetLocalTime
IsDebuggerPresent
Sleep
GetLogicalProcessorInformation
GetVersion
CreateEventA
OpenEventA
CreateFileMappingA
OpenFileMappingA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
CreateMutexA
GlobalMemoryStatusEx
GetProcAddress
VirtualFree
VirtualAlloc
SetConsoleTitleA
CloseHandle
LocalFree
LocalAlloc
GetCurrentProcess
VirtualProtect
OpenProcess
GetPrivateProfileStringA
GetCurrentProcessId
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
GetLastError
GetVersionExA
GetSystemInfo
IsProcessorFeaturePresent
GetWindowsDirectoryA
MultiByteToWideChar
MulDiv
lstrcatA
lstrcpyA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
gdi32
CreateFontA
TranslateCharsetInfo
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetStretchBltMode
StretchBlt
GetObjectA
GetDIBits
DeleteDC
DeleteObject
GetDeviceCaps
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
user32
GetWindowTextLengthW
GetWindowTextW
FindWindowA
IsWindow
GetAsyncKeyState
FindWindowExA
MessageBoxTimeoutA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
GetDesktopWindow
GetWindowRect
ReleaseDC
GetSystemMetrics
CreateWindowStationA
MessageBoxA
MsgWaitForMultipleObjects
SendInput
GetParent
CallWindowProcA
CreateWindowExA
GetCursorPos
GetSysColor
LoadBitmapA
RegisterHotKey
ReleaseCapture
ScreenToClient
SendMessageA
SetCapture
UnregisterHotKey
SetLayeredWindowAttributes
SetWindowLongA
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
wsprintfA
ws2_32
closesocket
socket
inet_addr
htons
connect
send
recv
getsockname
ntohs
WSAAsyncSelect
select
WSACleanup
gethostbyname
inet_ntoa
WSAStartup
shlwapi
PathFileExistsA
shell32
DragAcceptFiles
SHGetSpecialFolderPathA
DragFinish
DragQueryFileA
comctl32
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_EndDrag
ord17
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
ImageList_DragShowNolock
Sections
.text Size: 592KB - Virtual size: 591KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.9MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ