Behavioral task
behavioral1
Sample
e8e2cd7fef9c37f058b3c26c30d953c77436e7afb3baa7b352cb1e8a61a34875.exe
Resource
win7-20230831-en
General
-
Target
e8e2cd7fef9c37f058b3c26c30d953c77436e7afb3baa7b352cb1e8a61a34875
-
Size
13.3MB
-
MD5
f8232f4198581fdc224b3973652e44cd
-
SHA1
a88f0985ef81e6df6cb0e5036b51ab9cd587a4c6
-
SHA256
e8e2cd7fef9c37f058b3c26c30d953c77436e7afb3baa7b352cb1e8a61a34875
-
SHA512
c9b7e713c4aff9c1efbff01e31b289b9dd880bd07ea699d45954f46c833b90e2df9ec4cfa7e942ef34b66041ef798162837db0db4279f55963d61479e28d1c51
-
SSDEEP
196608:4ptWTfgNExN4bhfPGqPQNW7bPJvwO/ewZQm2Yc8Vu9JVL:WWTfawKWqYEd4O/eY2Yc8O
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e8e2cd7fef9c37f058b3c26c30d953c77436e7afb3baa7b352cb1e8a61a34875
Files
-
e8e2cd7fef9c37f058b3c26c30d953c77436e7afb3baa7b352cb1e8a61a34875.exe windows:4 windows x86
92abdc7d1edbb3b0cc0020c18ea35be1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeA
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
TerminateProcess
RtlZeroMemory
InterlockedDecrement
WaitForSingleObject
InterlockedIncrement
HeapAlloc
RtlMoveMemory
GetProcessHeap
LocalFree
LocalAlloc
GetCurrentProcess
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
HeapFree
HeapDestroy
HeapCreate
MultiByteToWideChar
ExitProcess
RtlUnwind
GetVersion
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
lstrlenW
lstrcmpW
WideCharToMultiByte
lstrcmpiW
lstrcpyn
CreateWaitableTimerA
LocalSize
VirtualProtectEx
CreateFileA
GetModuleFileNameA
GetTempPathA
GetLocalTime
GetCurrentDirectoryA
MapViewOfFile
CreateFileMappingA
GetCommandLineA
LoadLibraryW
GlobalLock
SetWaitableTimer
CloseHandle
GlobalAlloc
GlobalFree
GetLastError
SetLastError
GetModuleHandleA
FreeLibrary
HeapReAlloc
GetFileSize
ReadFile
WriteFile
IsBadReadPtr
LCMapStringA
LoadLibraryA
SetFilePointer
GetUserDefaultLCID
GetProcAddress
GetTickCount
TlsGetValue
GlobalUnlock
InterlockedExchange
SetStdHandle
IsBadCodePtr
IsBadReadPtr
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
VirtualFree
lstrcmpA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
SetUnhandledExceptionFilter
FlushFileBuffers
HeapCreate
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
InterlockedDecrement
InterlockedIncrement
SuspendThread
ReleaseMutex
CreateMutexA
GetVersion
GetTimeZoneInformation
SetLastError
OpenProcess
TerminateProcess
GetFileSize
SetFilePointer
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
TerminateThread
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
WaitForMultipleObjects
CreateFileA
SetEvent
FindResourceA
LoadResource
LockResource
ReadFile
RemoveDirectoryA
GetModuleFileNameA
WideCharToMultiByte
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
CopyFileA
DeleteFileA
MoveFileA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
ExpandEnvironmentStringsA
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
MultiByteToWideChar
user32
ReleaseDC
CallWindowProcA
IsWindow
GetPropA
TrackMouseEvent
GetCursorPos
ShowWindow
CreateWindowExA
UpdateLayeredWindow
GetSystemMetrics
OpenClipboard
GetDC
wsprintfA
MessageBoxA
TranslateMessage
GetMessageA
PeekMessageA
DispatchMessageA
GetWindowRect
GetWindowLongA
GetClassNameA
GetClipboardData
SetPropA
EnumWindows
GetAncestor
SendMessageA
CloseClipboard
EnumChildWindows
GetSysColorBrush
LoadStringA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
MoveWindow
SetWindowTextA
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
GetScrollPos
RegisterClassA
GetMenuItemCount
UnregisterClassA
GetMenuItemID
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
DrawTextA
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
GetParent
GetFocus
GetClientRect
InvalidateRect
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
IsChild
ReleaseDC
IsRectEmpty
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetNextDlgTabItem
FrameRect
DrawStateA
GetForegroundWindow
GetDesktopWindow
GetClassNameA
GetWindowThreadProcessId
FindWindowA
GetDlgItem
GetWindowTextA
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
advapi32
CryptDestroyKey
CryptDecrypt
RegCloseKey
CryptEncrypt
CryptReleaseContext
CryptImportKey
CryptSetKeyParam
CryptAcquireContextA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
CryptGetKeyParam
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
ws2_32
shlwapi
PathFileExistsA
StrToIntExW
StrToIntW
ole32
CreateStreamOnHGlobal
CLSIDFromProgID
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CLSIDFromString
OleInitialize
CLSIDFromString
OleUninitialize
wininet
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
InternetGetConnectedState
InternetOpenUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
crypt32
CertFreeCertificateContext
CryptStringToBinaryA
CertOpenSystemStoreA
CertFindCertificateInStore
CertVerifyTimeValidity
CertGetCertificateChain
CertCloseStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertVerifyRevocation
winhttp
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpCheckPlatform
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpReadData
WinHttpCrackUrl
secur32
FreeContextBuffer
InitializeSecurityContextA
DecryptMessage
QueryContextAttributesA
AcquireCredentialsHandleA
EncryptMessage
oleaut32
gdi32
DeleteDC
DeleteObject
CreateDIBSection
CreateCompatibleDC
SelectObject
CreateCompatibleDC
GetPixel
BitBlt
StartPage
StartDocA
DeleteDC
EndDoc
EndPage
CreateFontIndirectA
GetStockObject
CreateSolidBrush
FillRgn
CreateRectRgn
CombineRgn
PatBlt
CreatePen
GetObjectA
SelectObject
CreatePatternBrush
CreateBitmap
Ellipse
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
CreateDCA
ScaleViewportExtEx
SelectClipRgn
CreatePolygonRgn
GetTextMetricsA
Escape
ExtTextOutA
RectVisible
PtVisible
GetViewportExtEx
GetClipRgn
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ExtSelectClipRgn
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
SetDIBitsToDevice
SetTextColor
SetBkMode
TextOutA
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetStretchBltMode
gdiplus
GdipCreateBitmapFromScan0
GdipCreateSolidFill
GdipGetImageGraphicsContext
GdipDisposeImage
GdiplusStartup
GdipSetSmoothingMode
GdipGetImageHeight
GdipGetImageWidth
GdipDrawRectangleI
GdipLoadImageFromStream
GdipCreateFromHDC
GdipLoadImageFromFile
GdipGetRegionBounds
GdipSetTextRenderingHint
GdipDeletePen
GdipDeleteBrush
GdipSetSolidFillColor
imm32
ImmGetCompositionStringW
ImmReleaseContext
ImmAssociateContext
ImmSetCompositionWindow
ImmGetContext
shell32
SHAppBarMessage
ShellExecuteA
Shell_NotifyIconA
ShellExecuteA
winmm
PlaySoundA
midiStreamStop
midiStreamRestart
midiStreamClose
midiOutReset
midiStreamOpen
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutRestart
PlaySoundA
waveOutUnprepareHeader
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
AVIStreamGetFrame
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetFileTitleA
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
comctl32
ImageList_Destroy
_TrackMouseEvent
Sections
.text Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8.6MB - Virtual size: 8.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 868KB - Virtual size: 868KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 427KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE