Behavioral task
behavioral1
Sample
802ae2e2b97173de277969c3d1585a33384ef0cfe439297579bf1f3250ed3f1d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
802ae2e2b97173de277969c3d1585a33384ef0cfe439297579bf1f3250ed3f1d.exe
Resource
win10v2004-20230915-en
General
-
Target
802ae2e2b97173de277969c3d1585a33384ef0cfe439297579bf1f3250ed3f1d
-
Size
680KB
-
MD5
9e2873dfed8363d98668fa92e1fcd8bf
-
SHA1
d3cc9ab77e41291813caf56ccb01207dae97bb70
-
SHA256
802ae2e2b97173de277969c3d1585a33384ef0cfe439297579bf1f3250ed3f1d
-
SHA512
e277b10376a21ff153249be3072ca6124041fbea80cd7d5171b54dd7ef9aff804c335db7c07ea701a9e3cfdf4b62bc86d53f40379eeb8daf25895d49c5f3efd7
-
SSDEEP
12288:R4kiBzYaj6zaXPzT/fElKE3x8JnIy+xbX+Mxq:RDiBzYaj6zaXPzT/WKE3Ct70jB0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 802ae2e2b97173de277969c3d1585a33384ef0cfe439297579bf1f3250ed3f1d
Files
-
802ae2e2b97173de277969c3d1585a33384ef0cfe439297579bf1f3250ed3f1d.exe windows:4 windows x86
d02fba5699faa63ae6f23b48d3709b00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
GetVersionExA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
SetStdHandle
GetOEMCP
GetCPInfo
GetProcessHeap
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
lstrcpyA
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
MoveFileA
CopyFileA
GetFileSize
DeleteFileA
GetEnvironmentVariableA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateDirectoryA
GetLocalTime
WriteFile
SetFilePointer
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
OpenMutexA
WaitForSingleObject
lstrcmpA
lstrlenA
lstrcmpiW
HeapDestroy
HeapCreate
lstrcmpW
lstrlenW
RtlZeroMemory
VirtualFree
VirtualAlloc
GetLastError
GetSystemTimeAsFileTime
Process32Next
Process32First
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
HeapFree
HeapAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
ReadFile
GetFileSizeEx
CreateFileA
CreateThread
lstrcatA
RtlMoveMemory
GetComputerNameExA
SetDllDirectoryA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
GlobalDeleteAtom
lstrcmpiA
CreateToolhelp32Snapshot
GetCurrentThread
GetCurrentThreadId
user32
PostThreadMessageA
UnregisterClassA
LoadStringA
GetSysColorBrush
EndDialog
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CreateDialogIndirectParamA
DestroyMenu
LoadCursorA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetWindowThreadProcessId
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
shlwapi
StrToIntExW
PathRemoveFileSpecA
StrToIntW
PathRemoveBackslashA
PathFileExistsA
PathFindFileNameA
ws2_32
WSAStartup
inet_addr
WSAGetLastError
WSACleanup
gethostname
inet_ntoa
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleRun
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SystemTimeToVariantTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
iphlpapi
GetAdaptersInfo
SendARP
wininet
InternetSetCookieA
InternetQueryOptionA
HttpQueryInfoA
InternetConnectA
InternetOpenA
InternetReadFile
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
HttpOpenRequestA
InternetCloseHandle
InternetSetOptionA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
Sections
.text Size: 556KB - Virtual size: 555KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE