Behavioral task
behavioral1
Sample
d4d2c6db98d2c939b11390e5bf2885bd4a0233ab6e92dd86fcbb1927165cd40a.exe
Resource
win7-20230831-en
General
-
Target
d4d2c6db98d2c939b11390e5bf2885bd4a0233ab6e92dd86fcbb1927165cd40a
-
Size
5.8MB
-
MD5
1818cc50bf20d36261856c011edd533d
-
SHA1
64c6479d32f34be8058b91b1c464a8cdfe17ae7e
-
SHA256
d4d2c6db98d2c939b11390e5bf2885bd4a0233ab6e92dd86fcbb1927165cd40a
-
SHA512
462cec73e95d213bbac30f93f9f517dd8c0ebb4ea59e8c8273347bc058d41a55607f8151dff5fc48baed62196f5270414f2e0bcc8e6af2d652674f13c426785f
-
SSDEEP
98304:c8FdRkuo92IMlQnbN0Pzf83ouM3z7JYnGrxMy+FY9i3vowiPDC+kAEC14:LdRdo929MhAfaoN6ILg8rnkJL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4d2c6db98d2c939b11390e5bf2885bd4a0233ab6e92dd86fcbb1927165cd40a
Files
-
d4d2c6db98d2c939b11390e5bf2885bd4a0233ab6e92dd86fcbb1927165cd40a.exe windows:4 windows x86
2e63c0dce432a3d90fe9ff147a7db462
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
CloseHandle
LocalSize
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ResumeThread
WaitForSingleObject
GetEnvironmentVariableA
TerminateProcess
GetCurrentProcessId
CreateFileA
SetFilePointer
SetEndOfFile
MultiByteToWideChar
GetFileAttributesW
lstrcpyn
VirtualAlloc
VirtualProtect
CreateThread
lstrlenA
RtlFillMemory
VirtualQueryEx
IsBadCodePtr
LocalAlloc
IsBadReadPtr
LocalFree
lstrlenW
RtlZeroMemory
GetCurrentThreadId
WideCharToMultiByte
QueryDosDeviceW
lstrcpynA
DeviceIoControl
GetVolumeInformationA
TerminateThread
GetProcAddress
GetLocaleInfoA
GetDateFormatA
GetTimeFormatA
FreeLibrary
GetModuleHandleW
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetCommandLineA
SetCurrentDirectoryA
CopyFileA
MoveFileA
SetFileAttributesA
GetStartupInfoA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetLocalTime
Sleep
LCMapStringA
GetLastError
MulDiv
lstrcatA
lstrcpyA
DeleteCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
OpenProcess
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
GetModuleHandleA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
WriteFile
GetFileSize
ReadFile
CreateDirectoryA
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetCommandLineW
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
GetProcessHeap
VirtualFree
user32
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
DestroyMenu
IsIconic
GetWindowPlacement
SetFocus
IsDialogMessageA
SendDlgItemMessageA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetNextDlgTabItem
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetDlgItem
UpdateWindow
ReleaseDC
FindWindowA
GetClassNameA
IsWindow
UnregisterHotKey
SetCapture
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
RegisterWindowMessageA
PeekMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
FindWindowExA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
SetWindowPos
GetWindowRect
SystemParametersInfoA
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
ShowWindow
PostMessageW
TabbedTextOutA
GetMenuItemCount
GetDlgCtrlID
SendMessageA
LoadCursorFromFileW
LoadCursorW
CallWindowProcA
MessageBoxA
wsprintfA
EndDialog
CreateDialogIndirectParamA
TranslateMessage
GetSystemMetrics
GetCursorPos
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
CheckMenuItem
GetKeyState
shell32
SHBrowseForFolderA
DragFinish
DragQueryFileA
SHGetSpecialFolderPathA
CommandLineToArgvW
DragAcceptFiles
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetObjectA
GetStockObject
SelectObject
DeleteDC
TranslateCharsetInfo
GetDeviceCaps
DeleteObject
CreateFontA
shlwapi
PathFileExistsA
PathFindExtensionA
comdlg32
GetFileTitleA
advapi32
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptAcquireContextA
GetTokenInformation
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
ole32
OleInitialize
CLSIDFromProgID
CoFreeUnusedLibraries
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CoRegisterMessageFilter
CLSIDFromString
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
CoRevokeClassObject
wininet
InternetGetConnectedState
HttpQueryInfoA
InternetOpenUrlA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetSetOptionA
InternetReadFile
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetCookieA
oleaut32
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
VariantInit
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
SafeArrayDestroyDescriptor
SystemTimeToVariantTime
LoadTypeLi
dbghelp
MakeSureDirectoryPathExists
psapi
GetProcessImageFileNameW
winhttp
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReadData
WinHttpCheckPlatform
WinHttpQueryHeaders
oledlg
ord8
comctl32
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
iphlpapi
GetAdaptersInfo
ws2_32
WSACleanup
WSAStartup
closesocket
send
recv
select
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
rasapi32
RasHangUpA
RasGetConnectStatusA
Sections
.text Size: 1020KB - Virtual size: 1017KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE