Behavioral task
behavioral1
Sample
6fa5b8d6d4ba23fae4f1ca7c71efad6bc64a02668ff085d0521892c91472ed83.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6fa5b8d6d4ba23fae4f1ca7c71efad6bc64a02668ff085d0521892c91472ed83.exe
Resource
win10v2004-20230915-en
General
-
Target
6fa5b8d6d4ba23fae4f1ca7c71efad6bc64a02668ff085d0521892c91472ed83
-
Size
368KB
-
MD5
72f8605227f502c7669991abdf8c4581
-
SHA1
20b18034febaef4edc9447c34379a4aea623602c
-
SHA256
6fa5b8d6d4ba23fae4f1ca7c71efad6bc64a02668ff085d0521892c91472ed83
-
SHA512
c936f016afcacddef8f9c92eef171cbf38891403e5dfd604e883293b45f2383877e785e426edbe424ea5135598d523d757490692e29b57a4db7cabc4dddca8fb
-
SSDEEP
6144:m6VbwbzfFc0I4np/+uOg0vHErxSoafyewd:m2bwHO6np/+uOgwfyewd
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fa5b8d6d4ba23fae4f1ca7c71efad6bc64a02668ff085d0521892c91472ed83
Files
-
6fa5b8d6d4ba23fae4f1ca7c71efad6bc64a02668ff085d0521892c91472ed83.exe windows:4 windows x86
e705674df8a618df4fbdd08cd2896791
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
LCMapStringA
GetModuleFileNameA
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
SetFileAttributesA
lstrlenA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLastError
GetCurrentProcess
GetTickCount
GetTimeZoneInformation
SetLastError
MoveFileA
SetFilePointer
TerminateProcess
OpenProcess
lstrcpyA
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
LocalFree
lstrcpynA
EnterCriticalSection
LocalAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
FlushFileBuffers
MulDiv
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
CopyFileA
DeleteFileA
CloseHandle
GetStartupInfoA
CreateProcessA
WaitForSingleObject
Sleep
CreateFileA
WriteFile
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
RtlMoveMemory
MapViewOfFile
OpenFileMappingA
MoveFileExA
GetTempFileNameA
GetTempPathA
GetShortPathNameA
SetWaitableTimer
CreateWaitableTimerA
Module32First
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
user32
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetWindowLongA
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetSystemMetrics
SetWindowTextA
SetForegroundWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
SetActiveWindow
GetActiveWindow
IsWindowEnabled
EnableWindow
IsIconic
GetWindowPlacement
SetFocus
SetWindowPos
IsDialogMessageA
SendDlgItemMessageA
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostQuitMessage
GetWindow
PtInRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SendMessageA
GetClientRect
ClientToScreen
GetForegroundWindow
GetCursorPos
PostMessageA
FindWindowExA
FindWindowA
MsgWaitForMultipleObjects
UpdateWindow
MoveWindow
GetParent
GetWindowRect
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindowVisible
EnumWindows
IsWindow
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
ole32
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
GetObjectA
GetStockObject
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SelectObject
DeleteDC
DeleteObject
shlwapi
PathFileExistsA
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
shell32
SHGetSpecialFolderPathA
rasapi32
RasGetConnectStatusA
RasHangUpA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
wsock32
send
WSAStartup
WSACleanup
select
closesocket
recv
wininet
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetConnectA
InternetSetOptionA
InternetCloseHandle
InternetOpenA
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ