Behavioral task
behavioral1
Sample
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe
Resource
win7-20230831-en
General
-
Target
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a
-
Size
5.8MB
-
MD5
e08015604f562f1409440fec6a32b1f8
-
SHA1
f84afe3ff4bf4e463a881ab1e92de37e23d3a0b9
-
SHA256
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a
-
SHA512
dda10ce2ba42e22032065942b03f51fd1d2f96247ad09725d1de10c8e3eebead7a5d1e9b40813c08830bb88beec0ff18496a9e00a0fc0cb2f5e27b61ef7b0f51
-
SSDEEP
98304:FLcFdRkuo92IMlQnbVIPzf83ouM3z7JYnGrxMy+FY9i3voKziPDC+kAECq4:F0dRdo929MxMfaoN6ILgjmrnkJ6
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a
Files
-
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe windows:4 windows x86
e2efde64c5d6fa8a1cd0214c871b3ef2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
WriteProcessMemory
SetThreadContext
ResumeThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
GetModuleHandleA
GetModuleHandleW
LoadLibraryW
GetProcAddress
FreeLibrary
lstrlenA
MultiByteToWideChar
IsBadCodePtr
lstrcpyn
VirtualAlloc
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetCommandLineA
SetCurrentDirectoryA
VirtualQueryEx
RtlFillMemory
GetCurrentProcess
VirtualAllocEx
VirtualProtectEx
GetCurrentProcessId
CreateFileA
SetFilePointer
SetEndOfFile
GetFileAttributesW
VirtualProtect
CreateThread
LocalAlloc
IsBadReadPtr
LocalFree
lstrlenW
RtlZeroMemory
GetCurrentThreadId
WideCharToMultiByte
QueryDosDeviceW
lstrcpynA
DeviceIoControl
GetVolumeInformationA
TerminateThread
CreatePipe
CreateProcessW
PeekNamedPipe
ReadFile
CopyFileA
MoveFileA
GetVersionExA
SetFileAttributesA
GetStartupInfoA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetLocalTime
LCMapStringA
GetLastError
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
WriteFile
CreateDirectoryA
WritePrivateProfileStringA
MulDiv
lstrcatA
lstrcpyA
DeleteCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
LocalSize
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GetPrivateProfileStringA
GetCommandLineW
GetFileSize
GetModuleFileNameA
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
GetProcessHeap
VirtualFree
LoadLibraryA
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
Sleep
GetExitCodeProcess
user32
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
DestroyMenu
IsDialogMessageA
SendDlgItemMessageA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
SetCursor
PostMessageA
PostQuitMessage
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetDlgItem
UpdateWindow
ReleaseDC
FindWindowA
GetClassNameA
IsWindow
UnregisterHotKey
SetCapture
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
RegisterWindowMessageA
PeekMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
FindWindowExA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
WaitForInputIdle
CallWindowProcA
SetWindowPos
GetWindowRect
SystemParametersInfoA
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
ShowWindow
PostMessageW
SendMessageA
LoadCursorFromFileW
LoadCursorW
MessageBoxA
wsprintfA
TranslateMessage
GetSystemMetrics
DestroyWindow
UnhookWindowsHookEx
GetCursorPos
GrayStringA
DrawTextA
TabbedTextOutA
CheckMenuItem
GetLastActivePopup
shell32
SHBrowseForFolderA
DragFinish
DragQueryFileA
SHGetSpecialFolderPathA
CommandLineToArgvW
DragAcceptFiles
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
SelectObject
GetObjectA
GetStockObject
DeleteDC
TranslateCharsetInfo
GetDeviceCaps
DeleteObject
CreateFontA
shlwapi
PathFileExistsA
PathFindExtensionA
comdlg32
GetFileTitleA
advapi32
CryptGetHashParam
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
CryptCreateHash
CryptHashData
CryptAcquireContextA
GetTokenInformation
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
CryptDestroyHash
CryptReleaseContext
ole32
OleInitialize
OleRun
CoFreeUnusedLibraries
CoInitialize
CoRegisterMessageFilter
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
CoRevokeClassObject
wininet
InternetOpenUrlA
InternetGetConnectedState
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetOptionA
InternetOpenA
InternetConnectA
InternetCloseHandle
InternetSetCookieA
oleaut32
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
SafeArrayAllocData
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
SafeArrayAllocDescriptor
VariantInit
SafeArrayDestroyDescriptor
SystemTimeToVariantTime
dbghelp
MakeSureDirectoryPathExists
psapi
GetProcessImageFileNameW
winhttp
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpCheckPlatform
oledlg
ord8
comctl32
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
iphlpapi
GetAdaptersInfo
ws2_32
WSACleanup
WSAStartup
closesocket
send
recv
select
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
rasapi32
RasHangUpA
RasGetConnectStatusA
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE