Behavioral task
behavioral1
Sample
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe
Resource
win10v2004-20231023-en
General
-
Target
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b
-
Size
1.3MB
-
MD5
4f6be8b0a37123f64dc6c5c64d3ac731
-
SHA1
3cc764ed720c10ca1f35f2c15e64c58b054788e0
-
SHA256
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b
-
SHA512
ff559524ae0ad1f5a7385db97cf2ef0b44a9b8b328056f879f7b0f3566d38df04864e25d7c099ac1e0bbf00bb42034a59f60c9486548f17838ac47dad08d0904
-
SSDEEP
24576:DkACnTTsXcJu1VUY4fA8sycIht2J14/4aoy13CDIMwZZgV0rtJynfBX4W:Dx1VUYd8DcI3gao4SDk3tJyfB
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b
Files
-
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe windows:4 windows x86
bd444d625c055ac6d391c3e9350d9009
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
FreeLibrary
GetCommandLineA
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
GetModuleFileNameA
GetLocalTime
GetProcAddress
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
TryEnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
InitializeCriticalSection
SetFileAttributesA
LoadLibraryA
GetWindowsDirectoryA
GetFileAttributesA
MoveFileA
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
GetQueuedCompletionStatus
CreateIoCompletionPort
Sleep
SetWaitableTimer
CreateWaitableTimerA
GetEnvironmentVariableA
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
GetStartupInfoW
FlushViewOfFile
MapViewOfFileEx
SetEndOfFile
SetFilePointerEx
MapViewOfFile
CreateFileMappingA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
UnmapViewOfFile
GetFileSizeEx
GlobalFree
GlobalAlloc
CloseHandle
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
SetHandleCount
GetCommandLineW
GetFileType
GetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
WritePrivateProfileStringA
lstrcatA
lstrcpyA
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
shlwapi
PathIsDirectoryA
PathFindFileNameA
user32
LoadIconA
MapWindowPoints
LoadCursorA
GetSysColorBrush
LoadStringA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
WaitForInputIdle
DestroyMenu
DrawTextA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
UnregisterClassA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateGuid
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
comctl32
ord17
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 892KB - Virtual size: 963KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE