Behavioral task
behavioral1
Sample
5cdb43db0336cbee942a3c725fe4a76a7e590174bccacbf2e2618859934336c9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5cdb43db0336cbee942a3c725fe4a76a7e590174bccacbf2e2618859934336c9.exe
Resource
win10v2004-20230915-en
General
-
Target
5cdb43db0336cbee942a3c725fe4a76a7e590174bccacbf2e2618859934336c9
-
Size
2.2MB
-
MD5
01a33394c50015ad754879b009f11a77
-
SHA1
726731a5ca182d9125a2fc57143399d2ad580893
-
SHA256
5cdb43db0336cbee942a3c725fe4a76a7e590174bccacbf2e2618859934336c9
-
SHA512
00fd9693483760c9c20c8bb462defbb5c37583d66db441eb39879680756907bc96afc2665602d2630a2c60fab7acde9e2d8b5f44ee2985d584358df663e8e8c6
-
SSDEEP
49152:oYOPGqOx5sEhsmEDsU977xhL15iHapnxnQptqG:jOPGJfURxh2ExQptX
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cdb43db0336cbee942a3c725fe4a76a7e590174bccacbf2e2618859934336c9
Files
-
5cdb43db0336cbee942a3c725fe4a76a7e590174bccacbf2e2618859934336c9.exe windows:6 windows x86
549670f01559ec985594b565cf09c153
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
SetFilePointer
GlobalFree
GetUserDefaultLCID
FindClose
FindFirstFileA
FindNextFileA
WriteFile
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
DeleteFileA
GetTickCount
CreateDirectoryA
GetEnvironmentVariableA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleA
GetLastError
HeapAlloc
GetProcessHeap
SetWaitableTimer
CreateWaitableTimerA
MoveFileExA
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
GetCurrentProcessId
GetLocalTime
GetProcAddress
Sleep
VirtualFree
VirtualAlloc
GlobalMemoryStatusEx
MultiByteToWideChar
lstrcpyn
LocalAlloc
LocalFree
RtlMoveMemory
GetCommandLineW
QueryDosDeviceW
OpenProcess
GetCurrentProcess
WideCharToMultiByte
GetTempPathW
lstrlenW
Module32First
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
HeapCreate
HeapDestroy
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
HeapSize
GetACP
RaiseException
GetSystemTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GetVersionExA
TerminateProcess
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
CreateThread
DeleteCriticalSection
WaitForSingleObject
GetCurrentDirectoryA
VirtualProtect
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushFileBuffers
lstrcpynA
shlwapi
PathIsDirectoryW
PathFileExistsA
ws2_32
select
WSACleanup
gethostbyname
inet_ntoa
WSAAsyncSelect
ntohs
recv
WSAStartup
closesocket
socket
inet_addr
htons
connect
send
getsockname
user32
FindWindowExA
PtInRect
GetWindow
GetParent
EnableWindow
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetActiveWindow
SetForegroundWindow
GetPropA
SetPropA
SetWindowTextA
PostQuitMessage
PostMessageA
SetCursor
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
GetCursorPos
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
GetMenuItemCount
SendDlgItemMessageA
GetDlgItem
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
UnregisterClassA
DestroyMenu
ShowWindow
SystemParametersInfoA
GetWindowLongA
IsWindowVisible
GetWindowTextA
GetClassNameA
SetWindowLongA
SetLayeredWindowAttributes
UpdateWindow
MsgWaitForMultipleObjects
PeekMessageA
FindWindowA
GetWindowThreadProcessId
IsWindow
SendMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
wsprintfA
GetMessageA
ReleaseDC
GetWindowRect
GetDesktopWindow
GetDC
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
DeleteDC
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetDeviceCaps
PtVisible
advapi32
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegCreateKeyExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
CommandLineToArgvW
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoInitialize
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetGetCookieA
InternetSetCookieA
HttpQueryInfoA
psapi
GetProcessImageFileNameW
winhttp
WinHttpCheckPlatform
WinHttpQueryHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpOpen
rasapi32
RasGetConnectStatusA
RasHangUpA
oledlg
ord8
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SafeArrayGetLBound
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 641KB - Virtual size: 640KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ