Behavioral task
behavioral1
Sample
954badee1054c1beae6170b3ded367d347dc21e382c621ebb55d34ae20f92edd.exe
Resource
win7-20230831-en
General
-
Target
954badee1054c1beae6170b3ded367d347dc21e382c621ebb55d34ae20f92edd
-
Size
3.3MB
-
MD5
a77b591a73aad47d84bb9be21ca11a69
-
SHA1
7805dc2aa7350b4b15c2cdb39fec920af5273f35
-
SHA256
954badee1054c1beae6170b3ded367d347dc21e382c621ebb55d34ae20f92edd
-
SHA512
f4ede05cd2e993acf87da6d155cc4bbd6f4151d6ae464f3aef252c7f3e3c297fc2f181c472c358730a88c0516db200e7c42f2cb3f7249b64eb53f3c19e8cf1ba
-
SSDEEP
49152:/pLtFmwWD/XT+nEDA/k7XQIvMNrj7Gxelq3rA/AZxDDA/C:RZsnD/XYHX18elqk/uyK
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 954badee1054c1beae6170b3ded367d347dc21e382c621ebb55d34ae20f92edd
Files
-
954badee1054c1beae6170b3ded367d347dc21e382c621ebb55d34ae20f92edd.exe windows:4 windows x86
6bdbe344e7c93e0ac9345c77677a5ea2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
ResumeThread
TryEnterCriticalSection
SetEvent
ReleaseSemaphore
WaitForMultipleObjects
CreateEventA
CreateSemaphoreA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LocalAlloc
LocalFree
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
GetModuleHandleA
TlsSetValue
LocalReAlloc
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
SetEndOfFile
SetCurrentDirectoryA
WritePrivateProfileStringA
SetFilePointer
WaitForSingleObject
CreateDirectoryA
FindClose
FindFirstFileA
FindNextFileA
WriteFile
DeleteFileA
CreateFileA
GetFileSize
ReadFile
Sleep
GetTickCount
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
LocalSize
HeapAlloc
HeapFree
GetProcessHeap
lstrcpyn
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateProcessA
GetStartupInfoA
LoadResource
SizeofResource
FindResourceA
MulDiv
GlobalUnlock
RtlMoveMemory
GlobalFree
GlobalLock
GlobalAlloc
CloseHandle
OpenProcess
GetACP
HeapSize
RaiseException
TerminateProcess
ExitThread
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
TerminateThread
DeleteCriticalSection
CreateThread
lstrcpynA
GlobalFlags
GetCurrentProcessId
GetExitCodeThread
lstrcatA
lstrcpyA
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
GetProcessVersion
SetErrorMode
RtlUnwind
GetOEMCP
GetCPInfo
FlushFileBuffers
TlsGetValue
user32
LoadIconA
CopyImage
CopyIcon
GetDC
ReleaseDC
LoadCursorA
SetWindowLongA
wvsprintfA
BeginPaint
EndPaint
CallWindowProcA
GetAsyncKeyState
DefWindowProcA
GetClientRect
EndDialog
DestroyWindow
SendMessageA
SetCapture
ReleaseCapture
DefMDIChildProcA
SetCursor
TrackMouseEvent
DestroyIcon
PostQuitMessage
DestroyCursor
CreateWindowExA
GetWindowLongA
GetDlgItem
IsWindow
GetClassNameA
SetFocus
GetFocus
GetWindowRect
GetParent
ScreenToClient
InvalidateRect
ValidateRect
UpdateWindow
MoveWindow
SetWindowPos
PostMessageA
SetParent
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
CheckMenuItem
RemoveMenu
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
GetMenuItemInfoA
GetMenuStringA
TrackPopupMenu
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
GetSubMenu
SetMenuInfo
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
GetForegroundWindow
GetActiveWindow
SetActiveWindow
GetLastActivePopup
SetWindowsHookExA
GetCursorPos
CallNextHookEx
GetKeyState
GetNextDlgTabItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnhookWindowsHookEx
PtInRect
GetDlgCtrlID
GetWindow
ClientToScreen
TabbedTextOutA
GrayStringA
IsDialogMessageA
GetWindowPlacement
SystemParametersInfoA
GetMessagePos
GetMessageTime
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
CreateDialogIndirectParamA
CreateMenu
InvertRect
DrawTextA
GetIconInfo
DrawIconEx
DrawIcon
GetDialogBaseUnits
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItemTextA
SetDlgItemInt
GetDlgItemInt
CreateDialogParamA
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
UnregisterHotKey
RegisterHotKey
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
gdi32
CreateBitmap
GetMapMode
GetTextMetricsA
TextOutA
GetTextExtentPointA
GetCurrentPositionEx
Polygon
RoundRect
Rectangle
Pie
Chord
ArcTo
Ellipse
LineTo
MoveToEx
SetPixel
SetROP2
SetMapMode
SetBkColor
GetTextColor
SetTextColor
CreatePatternBrush
CreateSolidBrush
StretchBlt
SetStretchBltMode
CreateRoundRectRgn
CombineRgn
ExtCreateRegion
BitBlt
SelectObject
CreateBrushIndirect
CreateCompatibleDC
GetObjectA
DeleteObject
GetStockObject
CreateFontA
GetDeviceCaps
SaveDC
RestoreDC
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetCurrentObject
GetBkColor
GetROP2
GetDIBits
CreateRectRgn
GetPixel
CreateCompatibleBitmap
FillRgn
FrameRgn
DeleteDC
CreatePen
SetBkMode
Escape
ExtTextOutA
RectVisible
PtVisible
CreateDIBSection
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
comctl32
ord17
InitCommonControlsEx
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoUninitialize
CoInitialize
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CreateStreamOnHGlobal
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayAllocData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
OleLoadPicture
shell32
ShellExecuteA
DragQueryFileA
DragFinish
Shell_NotifyIconA
DragAcceptFiles
SHGetSpecialFolderPathA
wsock32
recv
ioctlsocket
gethostbyname
WSASetLastError
htons
connect
select
__WSAFDIsSet
closesocket
htonl
bind
WSAGetLastError
send
listen
accept
WSACleanup
WSAStartup
setsockopt
getpeername
getsockname
inet_addr
ntohs
recvfrom
socket
sendto
wininet
InternetReadFile
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpQueryInfoA
shlwapi
StrDupA
PathFileExistsA
atl
ord42
msimg32
GradientFill
AlphaBlend
oledlg
ord8
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
Sections
CODE Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 608KB - Virtual size: 606KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE