Behavioral task
behavioral1
Sample
0231a8ae29f5b0797e54838d23e609bd4e821b4ae11646c320ec0b6c6b1a9dbe.exe
Resource
win7-20230831-en
General
-
Target
0231a8ae29f5b0797e54838d23e609bd4e821b4ae11646c320ec0b6c6b1a9dbe
-
Size
10.6MB
-
MD5
4d40495c8a793562b6f0dcee168e6afc
-
SHA1
ba23cd5784e336a984988a409db46a7cace712a8
-
SHA256
0231a8ae29f5b0797e54838d23e609bd4e821b4ae11646c320ec0b6c6b1a9dbe
-
SHA512
3539a7f1ef5312466f797898b938fbbe624635cfbfe7c049301e19ede7ebe1bbffd79bf15711142337e69d58e3fc7c78a9ef4b045a04688d4d8ca0f423522344
-
SSDEEP
196608:HoxBHibYHh04HIf1lfaSqdsjlHKpfaJFukz15ahN05VM5OqEVtNiG2:wHBO4HqxaddAOkaN0M50SG2
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0231a8ae29f5b0797e54838d23e609bd4e821b4ae11646c320ec0b6c6b1a9dbe
Files
-
0231a8ae29f5b0797e54838d23e609bd4e821b4ae11646c320ec0b6c6b1a9dbe.exe windows:5 windows x86
6c1b75035c97f87a97e2cbeddffbd83a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
ws2_32
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetLocalTime
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
DeleteFileA
GetTickCount
GetModuleFileNameA
SetFileAttributesA
WriteFile
Sleep
WritePrivateProfileStringA
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
MoveFileA
CreateDirectoryA
GetLastError
DeviceIoControl
lstrcpynA
SuspendThread
IsWow64Process
GetExitCodeThread
CreateRemoteThread
VirtualFreeEx
WideCharToMultiByte
lstrlenW
QueryDosDeviceW
IsDebuggerPresent
GetCurrentProcessId
VirtualFree
VirtualAlloc
Process32Next
GlobalFree
GlobalUnlock
GlobalLock
SetFilePointer
GetVersionExA
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
lstrlenA
MultiByteToWideChar
GlobalAlloc
SetLastError
lstrcatA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
Process32First
InterlockedExchange
CreateFileA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
VirtualProtect
TerminateProcess
GetEnvironmentVariableA
WaitForSingleObject
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
RtlMoveMemory
LocalSize
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
CreateEventA
OpenEventA
CreateFileMappingA
OpenFileMappingA
CreateMutexA
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
SetStdHandle
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
DrawTextA
GrayStringA
UnhookWindowsHookEx
GetDlgCtrlID
GetMenuItemCount
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
GetCursorPos
SystemParametersInfoA
GetDC
ReleaseDC
GetSystemMetrics
IsWindowVisible
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CreateWindowStationA
FindWindowA
MsgWaitForMultipleObjects
MessageBoxA
wsprintfA
GetWindowTextLengthA
GetWindowLongA
SetWindowPos
ScreenToClient
PeekMessageA
CreateDialogIndirectParamA
UpdateWindow
GetMessageA
SendMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
GetWindowRect
SetWindowLongA
ShowWindow
GetDlgItem
SetWindowTextA
PostQuitMessage
UnregisterClassA
GetProcessWindowStation
GetUserObjectInformationW
gdi32
RestoreDC
SaveDC
CreateBitmap
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
SetTextColor
GetDeviceCaps
SelectObject
DeleteDC
DeleteObject
Escape
SetBkColor
advapi32
RegOpenKeyExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
StartServiceA
CreateServiceA
DeleteService
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
psapi
GetProcessImageFileNameW
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
Sections
.text Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EQ0 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.EQ1 Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 608B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE