Behavioral task
behavioral1
Sample
d8385676c7765c5d86f93dd0e40e9b8a1d9b4a53dccc01a041901bcb18977223.exe
Resource
win7-20231020-en
General
-
Target
d8385676c7765c5d86f93dd0e40e9b8a1d9b4a53dccc01a041901bcb18977223
-
Size
4.4MB
-
MD5
f076fe62902f78dff1045d7e4c4725d3
-
SHA1
7ddc4202bc1d8da259b64402830c32466007f021
-
SHA256
d8385676c7765c5d86f93dd0e40e9b8a1d9b4a53dccc01a041901bcb18977223
-
SHA512
7fd923fbd0dfc014af8b88b8df294fd8fa93bbcf38e3045fc4fcaa753e0cfd5433b8dda5e6e545df4037d789505c053648418e71dbf7f7a67feecba2888547bf
-
SSDEEP
49152:0yR/n37jKl+/MwrZJRw4WafOkQx2WTz53wJWqW2NaD:d1n/I+/hZjw4WpvETN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d8385676c7765c5d86f93dd0e40e9b8a1d9b4a53dccc01a041901bcb18977223
Files
-
d8385676c7765c5d86f93dd0e40e9b8a1d9b4a53dccc01a041901bcb18977223.exe windows:4 windows x86
5c8ab5679f3595f67053aaae8ad52633
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetCurrentProcess
GetVersionExA
LeaveCriticalSection
OpenThread
Module32Next
Process32Next
Module32First
VirtualQueryEx
CreateFileA
DeviceIoControl
CreateProcessA
PeekNamedPipe
lstrlenW
lstrcpyA
InitializeCriticalSection
GetCurrentThreadId
SetProcessAffinityMask
EnterCriticalSection
DeleteCriticalSection
RtlZeroMemory
Process32First
CreateToolhelp32Snapshot
VirtualQuery
SetWaitableTimer
GetExitCodeThread
ReadProcessMemory
CreateRemoteThread
RtlMoveMemory
LoadLibraryExA
FreeLibrary
VirtualFreeEx
TerminateThread
GetNativeSystemInfo
CreateWaitableTimerA
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
WriteFile
ReadFile
GetFileSize
DeleteFileA
LCMapStringA
GetTickCount
GetModuleFileNameA
GetUserDefaultLCID
lstrcpynA
GetDiskFreeSpaceExA
WaitForSingleObject
GetCurrentDirectoryA
SetFileAttributesA
GetLastError
SetCurrentDirectoryA
GetStartupInfoA
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
LoadLibraryA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
GetProcAddress
GetWindowsDirectoryA
WideCharToMultiByte
lstrcpynW
CloseHandle
OpenProcess
IsWow64Process
GetModuleHandleA
lstrcpyn
VirtualAllocEx
WriteProcessMemory
VirtualProtect
DuplicateHandle
CopyFileA
GetTempFileNameA
GetSystemDirectoryA
GetTempPathA
MultiByteToWideChar
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
VirtualFree
VirtualAlloc
IsBadWritePtr
RaiseException
SetFilePointer
LCMapStringW
GetCPInfo
GetACP
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
GetLocalTime
GetSystemTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
InterlockedDecrement
InterlockedIncrement
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetEnvironmentStrings
SuspendThread
ReleaseMutex
CreateMutexA
GetVersion
GetTimeZoneInformation
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetCurrentDirectoryA
DeleteFileA
GetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
DeviceIoControl
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
TerminateThread
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
shlwapi
StrToIntExW
StrToIntW
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
StrToIntExA
ws2_32
htons
WSACleanup
WSAStartup
inet_ntoa
WSACleanup
closesocket
WSAAsyncSelect
recvfrom
ioctlsocket
recv
getpeername
accept
ntohl
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
user32
GetDlgItem
WindowFromPoint
GetCursorPos
GetForegroundWindow
ClientToScreen
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
MsgWaitForMultipleObjects
SendMessageA
RegisterWindowMessageA
GetParent
GetAncestor
CallWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
FindWindowA
MessageBoxA
GetMessageA
EnumWindows
ShowWindow
wsprintfA
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
UnregisterClassA
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
OffsetRect
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
SetWindowLongA
GetDesktopWindow
GetClassNameA
GetDlgItem
GetWindowTextA
GetForegroundWindow
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
IsWindowVisible
EnableWindow
RedrawWindow
CreateMenu
GetWindowLongA
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
LoadStringA
GetSysColorBrush
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
PostQuitMessage
advapi32
RegCloseKey
DeleteService
ControlService
StartServiceA
CloseServiceHandle
OpenServiceA
CreateServiceA
OpenSCManagerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CryptGetHashParam
CryptHashData
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegQueryValueA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
CLSIDFromString
OleUninitialize
OleInitialize
OleRun
CLSIDFromProgID
CLSIDFromString
psapi
GetModuleInformation
oleaut32
VariantInit
SafeArrayGetDim
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
LoadTypeLi
SafeArrayGetLBound
VariantChangeType
SafeArrayDestroy
VariantClear
LHashValOfNameSys
SafeArrayCreate
RegisterTypeLi
SysAllocString
UnRegisterTypeLi
LoadTypeLi
RegisterTypeLi
winmm
waveOutUnprepareHeader
midiStreamRestart
midiStreamClose
midiOutReset
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutRestart
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
midiStreamStop
waveOutGetNumDevs
gdi32
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
SetBkColor
CreateRectRgnIndirect
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBitmap
SelectObject
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
CreateFontIndirectA
GetStockObject
GetObjectA
EndPage
EndDoc
GetTextExtentPoint32A
RoundRect
GetCurrentObject
ExtSelectClipRgn
GetViewportExtEx
PtVisible
DPtoLP
LPtoDP
Rectangle
Ellipse
CreateCompatibleDC
BitBlt
StartPage
StartDocA
DeleteDC
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ImageList_Destroy
ord17
comdlg32
GetFileTitleA
ChooseColorA
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 760KB - Virtual size: 758KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.6MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ