Behavioral task
behavioral1
Sample
6e7e469afbdbe8236fbd8895f8b583b6ca2d73c45f160cbdcaf847da31e7bb6c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6e7e469afbdbe8236fbd8895f8b583b6ca2d73c45f160cbdcaf847da31e7bb6c.exe
Resource
win10v2004-20230915-en
General
-
Target
6e7e469afbdbe8236fbd8895f8b583b6ca2d73c45f160cbdcaf847da31e7bb6c
-
Size
3.8MB
-
MD5
1e0d7633ff8f2de58c24d6438647e3b3
-
SHA1
523adf74b63d2891b576dfdf5565c587fde35a13
-
SHA256
6e7e469afbdbe8236fbd8895f8b583b6ca2d73c45f160cbdcaf847da31e7bb6c
-
SHA512
e6134dc553aadd9709b3b2d510461645d7b857dd52092787262cf438573e1406d30a2f0b8c85237504c562c4b1f58983aa66e203b3c83df7511ed6e65f6215da
-
SSDEEP
98304:reJBAUZLKNDUVwlRbUehdb69exOEy2DYV:qJVuNAylhUADS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e7e469afbdbe8236fbd8895f8b583b6ca2d73c45f160cbdcaf847da31e7bb6c
Files
-
6e7e469afbdbe8236fbd8895f8b583b6ca2d73c45f160cbdcaf847da31e7bb6c.exe windows:4 windows x86
fe73290b91ded88c3667e4b2b43d68c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
FreeLibrary
GetCommandLineA
GetEnvironmentVariableA
GetLocalTime
CreateDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
SetFilePointer
SetFileAttributesA
Sleep
GetStartupInfoA
WaitForSingleObject
DeleteFileA
GetFileSize
ReadFile
CreateFileA
WriteFile
GetModuleFileNameA
GetTickCount
IsBadReadPtr
ExitProcess
GetModuleHandleA
HeapReAlloc
HeapDestroy
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
ReadProcessMemory
VirtualQueryEx
Module32Next
Module32First
CreateToolhelp32Snapshot
GetQueuedCompletionStatus
CreateThread
RtlMoveMemory
InitializeCriticalSection
HeapAlloc
HeapCreate
CreateIoCompletionPort
GetSystemInfo
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CloseHandle
PostQueuedCompletionStatus
ResumeThread
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetLastError
SetLastError
CreateProcessA
TerminateProcess
OpenProcess
InterlockedExchange
SetEnvironmentVariableA
GetCurrentProcessId
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
VirtualAlloc
VirtualFree
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
LoadLibraryA
Process32Next
Process32First
GetCurrentProcess
GetVersionExA
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
VerLanguageNameA
lstrlenA
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
TerminateThread
SetSystemPowerState
GetACP
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
LocalFree
FlushFileBuffers
SetEndOfFile
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadBitmapA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
ExitWindowsEx
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
PtInRect
IsWindowVisible
FindWindowExA
GetCursorPos
GetDlgItem
UpdateWindow
SystemParametersInfoA
IsWindow
SetWindowLongA
ShowWindow
SetTimer
SetForegroundWindow
GetWindowLongA
LoadImageA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
SendMessageA
KillTimer
PostQuitMessage
DestroyWindow
CallWindowProcA
EnumWindows
PostMessageA
SetWindowTextA
GetWindowThreadProcessId
GetClassNameA
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindow
EnumChildWindows
PeekMessageW
TranslateMessage
DispatchMessageW
SendMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
MessageBoxA
wsprintfA
GetSystemMetrics
DispatchMessageA
GetMessageA
PeekMessageA
ReleaseDC
GetDesktopWindow
LoadCursorA
GetDC
gdi32
PtVisible
RectVisible
TextOutA
Escape
GetDeviceCaps
ExtTextOutA
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
DeleteDC
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetClipBox
advapi32
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegOpenKeyExA
RegSetValueExA
iphlpapi
GetExtendedTcpTable
GetAdaptersInfo
shlwapi
PathFileExistsA
ws2_32
send
recv
WSACleanup
gethostname
connect
ntohs
inet_ntoa
getpeername
WSASend
WSARecv
listen
bind
inet_addr
htons
getsockname
WSASocketA
WSAStartup
closesocket
select
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleRun
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
wininet
InternetCrackUrlA
InternetCanonicalizeUrlA
HttpOpenRequestA
InternetOpenA
InternetOpenUrlA
InternetSetOptionA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetConnectA
HttpSendRequestA
wsock32
ord1142
ord1141
gdiplus
GdiplusStartup
oledlg
ord8
oleaut32
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
rasapi32
RasGetConnectStatusA
RasHangUpA
Sections
.text Size: 420KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 828KB - Virtual size: 827KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.6MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE