Behavioral task
behavioral1
Sample
2fba21db5fc7803d452b2daac47779ef2a92216a94b634466780f7aa16db8114.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2fba21db5fc7803d452b2daac47779ef2a92216a94b634466780f7aa16db8114.exe
Resource
win10v2004-20230915-en
General
-
Target
2fba21db5fc7803d452b2daac47779ef2a92216a94b634466780f7aa16db8114
-
Size
1.3MB
-
MD5
b4df5e23c1a63b5577ab46ed3bcb38df
-
SHA1
616cc0dc714f631c15c7a422b902fc578fdc8d3b
-
SHA256
2fba21db5fc7803d452b2daac47779ef2a92216a94b634466780f7aa16db8114
-
SHA512
87f7825d6501f3e8bcb3b4bfffd315bde30e64eb23d37b4cf074d2119925325a06d36ec8b1abbf156a6b844c19452eab91b97c008ae3c39ad93443523a68ea58
-
SSDEEP
24576:oQlQmOiWU2PVf3XzXfyKlouCb9aWbUN1yPU5DadsIR9mE1mr:oQElFXfyKloVboWQ15ORzUr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fba21db5fc7803d452b2daac47779ef2a92216a94b634466780f7aa16db8114
Files
-
2fba21db5fc7803d452b2daac47779ef2a92216a94b634466780f7aa16db8114.exe windows:4 windows x86
68b0ae31a38d338b44cb62b7e7277c2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetTempPathA
WriteFile
GetLastError
GetVersionExA
GetSystemInfo
IsProcessorFeaturePresent
lstrcmpiA
GetWindowsDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
InterlockedIncrement
TerminateProcess
lstrcpyA
GlobalAlloc
SetLastError
lstrcatA
GetVersion
MulDiv
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
FlushFileBuffers
lstrcpynA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetSystemDirectoryA
lstrlenA
DeleteCriticalSection
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FindClose
FindFirstFileA
FindNextFileA
GlobalMemoryStatusEx
SetFilePointer
WritePrivateProfileStringA
CreateFileA
GetFileSize
ReadFile
GetPrivateProfileStringA
GetTickCount
DeleteFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
RtlMoveMemory
IsDebuggerPresent
Sleep
CreateThread
VirtualProtect
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
GetLocalTime
GetProcAddress
VirtualFree
VirtualAlloc
GetModuleFileNameA
GetModuleHandleA
winmm
PlaySoundA
gdi32
DeleteObject
DeleteDC
CreateFontA
GetObjectA
StretchBlt
SetStretchBltMode
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
TranslateCharsetInfo
CreateBitmap
SaveDC
RestoreDC
SetBkColor
GetDeviceCaps
SelectObject
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDIBits
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
advapi32
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegQueryValueExA
user32
CreateWindowStationA
GetAsyncKeyState
GetWindowThreadProcessId
CreateDialogIndirectParamA
UpdateWindow
SendMessageA
DestroyWindow
PostQuitMessage
SetWindowTextA
GetDlgItem
ShowWindow
ScreenToClient
GetWindowTextLengthA
GetSystemMetrics
GetDC
GetDesktopWindow
GetWindowRect
ReleaseDC
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
PostMessageA
SetCursorPos
GetCursorPos
SetWindowPos
MoveWindow
ShowWindowAsync
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetForegroundWindow
GetKeyboardLayout
VkKeyScanExA
SetCapture
ReleaseCapture
keybd_event
SystemParametersInfoA
PtInRect
GetWindow
CallWindowProcA
CreateWindowExA
GetSysColor
LoadBitmapA
RegisterHotKey
UnregisterHotKey
SetLayeredWindowAttributes
SetCursor
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
GetDlgCtrlID
GetMenuItemCount
UnregisterClassA
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowLongA
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindowLongA
shell32
SHGetSpecialFolderPathA
DragAcceptFiles
DragFinish
DragQueryFileA
shlwapi
PathFileExistsA
ws2_32
getsockname
recv
WSAStartup
send
ntohs
WSAAsyncSelect
select
WSACleanup
gethostbyname
inet_ntoa
connect
htons
inet_addr
socket
closesocket
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ImageList_DragMove
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_EndDrag
ImageList_Add
ord17
Sections
.text Size: 816KB - Virtual size: 813KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 436KB - Virtual size: 597KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ