Behavioral task
behavioral1
Sample
baec003322f67dcfc446c635883fc632d4c73f570e0381b5ab06ff4b04d6ec86.exe
Resource
win7-20231020-en
General
-
Target
baec003322f67dcfc446c635883fc632d4c73f570e0381b5ab06ff4b04d6ec86
-
Size
1.3MB
-
MD5
b2fb427a66bf8642cc697f413c89259a
-
SHA1
31f3ccdfd134360080acf334af109fde583bfe64
-
SHA256
baec003322f67dcfc446c635883fc632d4c73f570e0381b5ab06ff4b04d6ec86
-
SHA512
1689f5425175d80ed515d0406fddc937b33d7c6ee987abd3f8980ad985289b5030e14e19fe84288ee01027755dd835065769189b8fb48a518cffaf2fa090c36a
-
SSDEEP
24576:pV0UzXHaZU59u1VUY4fA8sycIht2J14/4aoy13CDIMwZZgV0r0JynfBX4W:pE1VUYd8DcI3gao4SDk30JyfB
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource baec003322f67dcfc446c635883fc632d4c73f570e0381b5ab06ff4b04d6ec86
Files
-
baec003322f67dcfc446c635883fc632d4c73f570e0381b5ab06ff4b04d6ec86.exe windows:4 windows x86
bd444d625c055ac6d391c3e9350d9009
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
FreeLibrary
GetCommandLineA
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
GetModuleFileNameA
GetLocalTime
GetProcAddress
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
TryEnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
InitializeCriticalSection
SetFileAttributesA
LoadLibraryA
GetWindowsDirectoryA
GetFileAttributesA
MoveFileA
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
GetQueuedCompletionStatus
CreateIoCompletionPort
Sleep
SetWaitableTimer
CreateWaitableTimerA
GetEnvironmentVariableA
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
GetStartupInfoW
FlushViewOfFile
MapViewOfFileEx
SetEndOfFile
SetFilePointerEx
MapViewOfFile
CreateFileMappingA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
UnmapViewOfFile
GetFileSizeEx
GlobalFree
GlobalAlloc
CloseHandle
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
SetHandleCount
GetCommandLineW
GetFileType
GetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
WritePrivateProfileStringA
lstrcatA
lstrcpyA
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
shlwapi
PathIsDirectoryA
PathFindFileNameA
user32
LoadIconA
MapWindowPoints
LoadCursorA
GetSysColorBrush
LoadStringA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
WaitForInputIdle
DestroyMenu
DrawTextA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
UnregisterClassA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateGuid
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 892KB - Virtual size: 963KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE