Behavioral task
behavioral1
Sample
99fb808b7add4866b89763443213e16fe2751a37c085e2b5e2661ee92b445299.exe
Resource
win7-20230831-en
General
-
Target
99fb808b7add4866b89763443213e16fe2751a37c085e2b5e2661ee92b445299
-
Size
8.8MB
-
MD5
4312308857b46482436f7e31428a8c0a
-
SHA1
450ca52e31c01b9356764f9e6e0450d1da8908b4
-
SHA256
99fb808b7add4866b89763443213e16fe2751a37c085e2b5e2661ee92b445299
-
SHA512
ba3fc91b9faa6f821dd4230efbe6c7b3cdd1c8095c6a6f975877f88c54b30b79b707a3820354c8720c20bcc3218faac38e2a73df63bd61eeb4a85fb898a0a7b0
-
SSDEEP
98304:zDSDcvDXGsUgG1/Q/g+ZmiPDC+kAEDKBSzqiNoEqmSCG02GYG1MqvMYfVCetV6Ec:zfDZHFg+ZTrnkJGTiNyG2Gd1McQelYF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99fb808b7add4866b89763443213e16fe2751a37c085e2b5e2661ee92b445299
Files
-
99fb808b7add4866b89763443213e16fe2751a37c085e2b5e2661ee92b445299.exe windows:4 windows x86
6fb796b18994499b4faaf9ab020fde77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetVersionExA
LCMapStringA
GetCommandLineA
SetFilePointer
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
CopyFileA
MoveFileA
FormatMessageA
GetUserDefaultLCID
SetFileAttributesA
DeleteFileA
CreateDirectoryA
GetPrivateProfileStringA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
WriteFile
CreateFileA
GetFileSize
ReadFile
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpiW
lstrcmpW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
RtlZeroMemory
HeapAlloc
HeapFree
GetProcessHeap
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualQueryEx
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
lstrcpyA
VirtualFree
lstrcpyn
LoadLibraryA
VirtualAlloc
lstrcpynA
GetModuleHandleA
IsBadCodePtr
FreeLibrary
GetProcAddress
LoadLibraryW
RtlMoveMemory
GetModuleHandleW
GetFileAttributesW
GetLocalTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetWaitableTimer
CreateWaitableTimerA
GetCurrentProcessId
FindClose
FindFirstFileW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
Process32Next
CloseHandle
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
CreateThread
DeleteCriticalSection
Sleep
GetTimeZoneInformation
SetLastError
TerminateProcess
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
FlushFileBuffers
MulDiv
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
Process32First
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
WideCharToMultiByte
lstrlenW
lstrlenA
MultiByteToWideChar
user32
IsDialogMessageA
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
PostMessageA
PostQuitMessage
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
SendDlgItemMessageA
LoadCursorA
SetCursor
PostMessageW
MsgWaitForMultipleObjects
SetWindowPos
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
FindWindowExA
PeekMessageA
TranslateMessage
DispatchMessageA
SendMessageA
RegisterWindowMessageA
FindWindowA
CallWindowProcA
IsWindow
CreateIconFromResource
SetPropA
GetPropA
GetClientRect
GetWindowThreadProcessId
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
GetWindowRect
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
MessageBoxA
wsprintfA
GetMessageA
GetSystemMetrics
ClientToScreen
RegisterClipboardFormatA
GetLastActivePopup
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
shell32
SHFreeNameMappings
Shell_NotifyIconA
SHAppBarMessage
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHFileOperationW
SHGetSpecialFolderPathA
ole32
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitialize
OleRun
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
gdi32
DeleteObject
DeleteDC
SelectObject
GetStockObject
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
wininet
InternetOpenUrlA
InternetGetConnectedState
InternetTimeToSystemTime
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetCanonicalizeUrlA
InternetCrackUrlA
shlwapi
PathIsDirectoryW
PathIsURLA
StrToIntExW
StrToIntW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdiplus
GdipLoadImageFromFile
GdipLoadImageFromStream
GdipGetImageWidth
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
oleaut32
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
SafeArrayGetDim
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SafeArrayGetLBound
oledlg
ord8
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
WSACleanup
WSAStartup
select
closesocket
recv
send
Sections
gdnzW Size: 788KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
iHfHDl Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
QSfvB Size: 8.0MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fzSnl Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE