Behavioral task
behavioral1
Sample
fe37daf1e17b0685b51df60a5570c2053d3d8b4afe69f6150c760bca4ab0b5d4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fe37daf1e17b0685b51df60a5570c2053d3d8b4afe69f6150c760bca4ab0b5d4.exe
Resource
win10v2004-20230915-en
General
-
Target
fe37daf1e17b0685b51df60a5570c2053d3d8b4afe69f6150c760bca4ab0b5d4
-
Size
572KB
-
MD5
9f58bc5b2a9f77ec6bd5d6abe141ce7c
-
SHA1
474a7f485b7a3a545ae5cdb2ce2cbbfab00b1af9
-
SHA256
fe37daf1e17b0685b51df60a5570c2053d3d8b4afe69f6150c760bca4ab0b5d4
-
SHA512
aa2b96f01ae7e126ae38d99ec242aa42943cf6e8dce5e27538dce01e4833f2d86f8f8e0d7a878ad872c5d30e753b41252df81c1a5f903f974be060fa6204505e
-
SSDEEP
12288:pCS9QDiAFUXIWk5e1mGNG+lUW/JHxQOkb0D:4S9QDiAFcIWkeFGUrJ4w
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe37daf1e17b0685b51df60a5570c2053d3d8b4afe69f6150c760bca4ab0b5d4
Files
-
fe37daf1e17b0685b51df60a5570c2053d3d8b4afe69f6150c760bca4ab0b5d4.exe windows:4 windows x86
fedb9bc1ad858dcfcd24cfb3db4b62e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadWritePtr
GetVersionExA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
LCMapStringW
GetProcessHeap
GetOEMCP
GetCPInfo
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
MoveFileA
CopyFileA
GetFileSize
DeleteFileA
GetEnvironmentVariableA
CreateDirectoryA
GetLocalTime
WriteFile
SetFilePointer
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpA
lstrlenA
WaitForSingleObject
ReleaseMutex
OpenMutexA
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
RtlZeroMemory
VirtualFree
VirtualAlloc
GetLastError
Process32Next
Process32First
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
HeapFree
HeapAlloc
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
ReadFile
GetFileSizeEx
CreateFileA
CreateThread
lstrcatA
RtlMoveMemory
GetComputerNameExA
SetDllDirectoryA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
CreateToolhelp32Snapshot
SetLastError
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
MulDiv
GlobalFlags
lstrcpyA
user32
CreateDialogIndirectParamA
EndDialog
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetWindowThreadProcessId
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
shlwapi
PathRemoveFileSpecA
PathRemoveBackslashA
StrToIntExW
StrToIntW
PathFindFileNameA
PathFileExistsA
ws2_32
WSACleanup
gethostname
WSAGetLastError
WSAStartup
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoFreeUnusedLibraries
CoRevokeClassObject
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
OleUninitialize
OleInitialize
CoInitialize
oleaut32
SystemTimeToVariantTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
Sections
.text Size: 460KB - Virtual size: 456KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE