Behavioral task
behavioral1
Sample
fa0c0f8b78d82e551307f82653476b528019d9b6a244b4926cffedaa7fdebb20.exe
Resource
win7-20230831-en
General
-
Target
fa0c0f8b78d82e551307f82653476b528019d9b6a244b4926cffedaa7fdebb20
-
Size
1.4MB
-
MD5
a290036850c46087bef2e9397f679765
-
SHA1
a819e551ee45e25583505389c3b63da7dc340cb2
-
SHA256
fa0c0f8b78d82e551307f82653476b528019d9b6a244b4926cffedaa7fdebb20
-
SHA512
d61c2af16f6d8acac4c591d5cda1c50f3f925e2079c1697ef8da608483f9958474fd7e47826789bc8ecd9acb0a6c0b06be1ac0a082d7264db00496b4316c2572
-
SSDEEP
24576:kOQpwBCp2TjRg3SMlowWhI0PIpxRVInc6TEtAjLprdCiuU0Oqcdli:kJOjx6owWhI0PIpLKH/jVr9h+
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa0c0f8b78d82e551307f82653476b528019d9b6a244b4926cffedaa7fdebb20
Files
-
fa0c0f8b78d82e551307f82653476b528019d9b6a244b4926cffedaa7fdebb20.exe windows:4 windows x86
9a7388c9aab1455238e862a3c8a12ada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
HeapDestroy
GetEnvironmentVariableA
OpenProcess
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
lstrlenW
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
LocalAlloc
LocalFree
CloseHandle
GetStringTypeW
IsBadCodePtr
SetStdHandle
OpenEventA
CreateEventA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateDirectoryA
MoveFileA
CreateThread
RtlMoveMemory
GetTickCount
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetStartupInfoA
CreateProcessA
SetFileAttributesA
FindFirstFileA
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindClose
GetModuleFileNameA
CreateFileA
WriteFile
Sleep
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
SuspendThread
WaitForSingleObject
ResumeThread
TerminateThread
QueueUserAPC
GetLastError
TerminateProcess
WideCharToMultiByte
GetFileType
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
VirtualFree
GetCurrentProcess
GetACP
lstrlenA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
user32
FindWindowExA
ShowWindowAsync
IsWindowVisible
GetWindowThreadProcessId
GetParent
GetClassNameA
GetWindowTextLengthW
GetWindowTextW
MsgWaitForMultipleObjects
GetWindowTextA
DestroyMenu
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
IsWindow
SendMessageTimeoutA
PostMessageA
SetWindowPos
FindWindowA
SendMessageA
EnableWindow
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetForegroundWindow
PostQuitMessage
SetCursor
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
GetCursorPos
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
advapi32
RegCloseKey
GetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
winhttp
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSetOption
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpCheckPlatform
gdi32
GetObjectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
ord17
shlwapi
PathFileExistsA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE