Behavioral task
behavioral1
Sample
0ef5d8a0c1b1d2375a27fd55b68c669b783921496e8dfed6fbf44138a231b37f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0ef5d8a0c1b1d2375a27fd55b68c669b783921496e8dfed6fbf44138a231b37f.exe
Resource
win10v2004-20230915-en
General
-
Target
0ef5d8a0c1b1d2375a27fd55b68c669b783921496e8dfed6fbf44138a231b37f
-
Size
4.1MB
-
MD5
86d0098f7ad29d2dc564b020c866f668
-
SHA1
9b8e7b1e22e5556bccaed9dc6a6ad124b4fc7886
-
SHA256
0ef5d8a0c1b1d2375a27fd55b68c669b783921496e8dfed6fbf44138a231b37f
-
SHA512
864038578d5be4242323ab1c0d9318dce9f9ecd1a10fb0156509abecc7043aede9fd7f5489c14d936bbc5673607cd7c34139b0799035855acb6622e897c319ec
-
SSDEEP
98304:jSs9M9jBoBBfnRMACPFuDq2wiGO5AWVRPe0cLSuq:esG9jBoBBfIFuDqzb8PmLSuq
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ef5d8a0c1b1d2375a27fd55b68c669b783921496e8dfed6fbf44138a231b37f
Files
-
0ef5d8a0c1b1d2375a27fd55b68c669b783921496e8dfed6fbf44138a231b37f.exe windows:4 windows x86
659dfac141e3b165a0328f24030ef51b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
SetLastError
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
OpenProcess
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
TerminateProcess
SetFilePointer
GlobalLock
GlobalUnlock
GlobalFree
LeaveCriticalSection
OpenFileMappingA
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpyA
lstrcatA
MulDiv
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
LCMapStringA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetTickCount
WriteFile
MoveFileA
DeleteFileA
GetEnvironmentVariableA
GetFileSize
ReadFile
Sleep
GetPrivateProfileStringA
WritePrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
CloseHandle
CreateEventA
OpenEventA
CreateMutexA
GetCurrentProcessId
Process32Next
Process32First
CreateFileA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
VirtualProtect
VirtualFree
VirtualAlloc
IsDebuggerPresent
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcmpA
user32
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
IsIconic
GetWindowPlacement
RemovePropA
SetWindowPos
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
PtInRect
GetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
ReleaseDC
GetWindowRect
UnregisterHotKey
SetWindowLongA
SetCapture
SendMessageA
ScreenToClient
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
DefWindowProcA
GetMessageTime
GetMessagePos
SetFocus
RegisterWindowMessageA
GetFocus
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
ClientToScreen
GetClientRect
GetCursorPos
GetAsyncKeyState
SetTimer
GetWindowThreadProcessId
FindWindowA
CreateWindowStationA
GetClassNameA
GetWindowTextA
IsWindowVisible
wvsprintfA
ReleaseCapture
UnregisterClassA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
gdi32
CreateFontA
GetObjectA
GetStockObject
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
SelectObject
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
shlwapi
PathFileExistsA
ws2_32
WSAStartup
recv
closesocket
ntohs
WSAAsyncSelect
select
WSACleanup
socket
htons
inet_addr
connect
gethostbyname
getsockname
send
comctl32
ImageList_Add
ord17
ImageList_EndDrag
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 400KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.7MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ