Behavioral task
behavioral1
Sample
5cc7194f62fc24776bc1ab7a91c3f08e8b9ba803fe317243ef47b433b2ba56c3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5cc7194f62fc24776bc1ab7a91c3f08e8b9ba803fe317243ef47b433b2ba56c3.exe
Resource
win10v2004-20230915-en
General
-
Target
5cc7194f62fc24776bc1ab7a91c3f08e8b9ba803fe317243ef47b433b2ba56c3
-
Size
1.0MB
-
MD5
eb0a3d6ff1f83da3188a4c04aed977a7
-
SHA1
3f29957f865247d4f955e657e28d86af92f64f76
-
SHA256
5cc7194f62fc24776bc1ab7a91c3f08e8b9ba803fe317243ef47b433b2ba56c3
-
SHA512
9d9505a626a81dc316e30ffa4cc0969721e8bbfc01b959a9a5ad16b900a4bb3ead73587a374fe2641e8b9c3868e1fcd8229083fa9696dfc699426230194a9432
-
SSDEEP
24576:tC+CoUHo/dOo6qKvLYtprCcv4ClI4xOoX2dgFOFoa:tPXF8J
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
resource yara_rule sample detect_ak_stuff -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cc7194f62fc24776bc1ab7a91c3f08e8b9ba803fe317243ef47b433b2ba56c3
Files
-
5cc7194f62fc24776bc1ab7a91c3f08e8b9ba803fe317243ef47b433b2ba56c3.exe windows:4 windows x86
ecd3844837d8b5262b1ed3236b080734
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
WritePrivateProfileStringA
GetTickCount
GetPrivateProfileStringA
GetFileSize
WriteFile
SetFilePointer
Sleep
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetStartupInfoA
CreateProcessA
DeleteFileA
CreateDirectoryA
GetModuleFileNameA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
lstrcpynA
DeleteTimerQueueEx
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLocalTime
GetSystemTimeAsFileTime
CreateTimerQueue
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpA
ReleaseMutex
CreateMutexA
lstrcpyn
WaitForSingleObject
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
RtlZeroMemory
VirtualFree
lstrcatA
WideCharToMultiByte
lstrlenA
VirtualAlloc
RtlMoveMemory
GetCurrentThreadId
LocalSize
GetModuleHandleW
MultiByteToWideChar
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
CloseHandle
GetFileSizeEx
CreateFileA
CreateThread
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
LCMapStringW
IsBadWritePtr
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeZoneInformation
GetACP
RaiseException
TerminateProcess
RtlUnwind
GetOEMCP
GetCPInfo
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
GetTimeFormatA
GetDateFormatA
GetLastError
lstrcpyA
GlobalFlags
MulDiv
UnmapViewOfFile
UnlockFileEx
UnlockFile
SystemTimeToFileTime
SetEndOfFile
QueryPerformanceCounter
MapViewOfFile
LockFileEx
LockFile
LocalFree
LoadLibraryW
HeapValidate
HeapSize
GetVersionExA
GetTempPathW
GetTempPathA
GetSystemTime
GetSystemInfo
GetFullPathNameW
GetFullPathNameA
GetFileAttributesExW
GetFileAttributesW
GetFileAttributesA
GetDiskFreeSpaceW
GetDiskFreeSpaceA
GetCurrentProcessId
FormatMessageW
FlushFileBuffers
DeleteFileW
CreateMutexW
CreateFileMappingW
CreateFileMappingA
CreateFileW
AreFileApisANSI
InterlockedCompareExchange
GetCurrentThread
lstrcmpiA
GlobalDeleteAtom
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
user32
MapVirtualKeyA
GetMessageW
CallWindowProcW
BeginPaint
GetClientRect
IntersectRect
EndPaint
GetFocus
SetFocus
SetCapture
LoadIconW
CreateWindowExW
SystemParametersInfoW
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
GetKeyState
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
UpdateLayeredWindow
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
CallNextHookEx
IsDialogMessageA
SetWindowLongA
DefWindowProcW
SetWindowPos
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
CallWindowProcA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
ShowWindow
DispatchMessageW
TranslateMessage
SetWindowsHookExW
PeekMessageA
GetMessageA
DispatchMessageA
MessageBeep
wsprintfA
MessageBoxA
wvsprintfA
RemovePropA
InvalidateRect
ReleaseDC
GetDC
OffsetRect
GetWindowRect
RegisterClassExW
LoadCursorW
DefWindowProcA
GetPropA
ReleaseCapture
ScreenToClient
IsRectEmpty
IsZoomed
PtInRect
IsWindow
GetWindowLongW
SetWindowLongW
SetPropA
gdi32
GetClipBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
ScaleWindowExtEx
DeleteDC
DeleteObject
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
GetCurrentObject
BitBlt
PtVisible
GetDeviceCaps
GetStockObject
SetWindowExtEx
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
advapi32
CryptDestroyHash
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
RegCloseKey
CryptGetHashParam
CryptDeriveKey
CryptEncrypt
CryptDestroyKey
CryptDecrypt
CryptReleaseContext
ole32
OleIsCurrentClipboard
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleFlushClipboard
CoRevokeClassObject
OleInitialize
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleRun
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
oleaut32
VariantTimeToSystemTime
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
SafeArrayDestroy
SystemTimeToVariantTime
ws2_32
WSACleanup
WSAStartup
setsockopt
WSAGetLastError
inet_addr
ntohs
WSASetLastError
htons
connect
select
__WSAFDIsSet
inet_ntoa
getpeername
getsockname
gethostbyname
closesocket
htonl
bind
send
recv
listen
accept
socket
sendto
recvfrom
gdiplus
GdipCreateFromHDC
GdipDeleteGraphics
GdipDisposeImage
GdipDrawImageRect
GdiplusStartup
GdipGetImageDimension
GdipLoadImageFromStream
GdiplusShutdown
iphlpapi
GetAdaptersInfo
shell32
ShellExecuteA
shlwapi
StrToIntW
StrToIntExW
PathFileExistsA
wininet
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
InternetReadFile
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetSetOptionA
InternetQueryOptionA
InternetSetCookieA
HttpQueryInfoA
InternetCloseHandle
comdlg32
GetSaveFileNameA
GetOpenFileNameW
imm32
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
oledlg
ord8
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
Sections
.text Size: 904KB - Virtual size: 901KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE