Behavioral task
behavioral1
Sample
NEAS.e131eaa9dc0afcc1aa582db64c9d0090_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e131eaa9dc0afcc1aa582db64c9d0090_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.e131eaa9dc0afcc1aa582db64c9d0090_JC.exe
-
Size
106KB
-
MD5
e131eaa9dc0afcc1aa582db64c9d0090
-
SHA1
5e6eeb24e563bb2ba71283a93b9ea60c15bf4909
-
SHA256
1c13eaa842a10226f06ae408c81a2b40b64525854093d2f6d10689bff1c02122
-
SHA512
b82c65609a8406050691c9429b5d3894e9e5bb5a8ad4670344c7372717f2d14b74c51ead6c10fe81e6ab26b53313df070cc6e58d5104cab87e1337f688b5bddd
-
SSDEEP
1536:DHPaisoc013lwRacN2zgrUzQ5lfuEAw45YyN6C9maUiDExdudVCSlixSpe15FOQQ:DP57c2zgwIuXHOpq64qA7M/yuO
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.e131eaa9dc0afcc1aa582db64c9d0090_JC.exe
Files
-
NEAS.e131eaa9dc0afcc1aa582db64c9d0090_JC.exe.exe windows:4 windows x86
1ca76329db205a6ccbbfd19605f042fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
ExitProcess
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
DeleteFileA
CopyFileA
MoveFileA
WriteFile
SetCurrentDirectoryA
GetCurrentDirectoryA
lstrlenW
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
HeapReAlloc
MultiByteToWideChar
lstrlenA
HeapDestroy
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
HeapFree
HeapAlloc
GetProcessHeap
GetTickCount
RtlMoveMemory
GetModuleFileNameA
SetFilePointer
GetModuleHandleA
user32
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
wsprintfA
MoveWindow
GetDlgItem
PostQuitMessage
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
SystemParametersInfoA
AdjustWindowRectEx
TrackMouseEvent
GetClientRect
GetSysColorBrush
GetSysColor
SetWindowLongA
SetWindowPos
ScreenToClient
PeekMessageA
SendMessageA
ShowWindow
DestroyWindow
DefWindowProcW
SetWindowLongW
RegisterClassExW
LoadCursorA
LoadIconA
MessageBoxA
AppendMenuA
CreateMenu
GetWindowRect
SetWindowTextA
DispatchMessageA
GetMessageA
UpdateWindow
CreateDialogIndirectParamA
shell32
DragQueryFileW
DragFinish
SHGetSpecialFolderPathA
gdi32
DeleteObject
SetTextColor
CreateSolidBrush
SetBkColor
SetBkMode
GetStockObject
msvcrt
_ftol
tolower
strncmp
atoi
atof
_atoi64
strncpy
??2@YAPAXI@Z
??3@YAXPAX@Z
_CIfmod
rand
srand
sprintf
strchr
modf
memmove
free
malloc
_strnicmp
__CxxFrameHandler
strrchr
shlwapi
PathFileExistsA
comdlg32
GetOpenFileNameA
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE