Behavioral task
behavioral1
Sample
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe
Resource
win7-20231020-en
General
-
Target
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d
-
Size
320KB
-
MD5
c80040ba82ca50d848427d5a643441ee
-
SHA1
9f14ba8601223091a5bfe20dd3367aa83379bcfa
-
SHA256
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d
-
SHA512
b5dcd16db37c79c9614b4301ffce3274667e345a39325ae2ea65c696ea8ba81216dac4bcf59b6babd43869a8b845d7ed4c66fca0a7aed6109c369fe0f5aaf3b3
-
SSDEEP
3072:m4gQvLzOEFqxNpIKPM6Oqdb2mCXhH02xoX0uL+9N21bjz7pr2OhEtDoYTGSHJty1:m4gQvLzxqLpIKk6l2mX0KNT8xGSRt3E
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d
Files
-
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe windows:4 windows x86
9278d540f74f08568db88762e172b20e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GetEnvironmentVariableA
GetTickCount
GetFileSize
ReadFile
CreateFileA
WriteFile
SetFileAttributesA
DeleteFileA
MoveFileA
CopyFileA
GetModuleFileNameA
GetVersionExA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualFree
VirtualAlloc
RtlZeroMemory
lstrcmpiW
lstrcmpW
lstrlenW
GetSystemInfo
Module32First
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
LCMapStringW
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
SetWaitableTimer
CreateWaitableTimerA
WideCharToMultiByte
MulDiv
MultiByteToWideChar
ReadProcessMemory
GetCurrentProcess
GetVersion
RtlMoveMemory
lstrcpyn
CloseHandle
WaitForSingleObject
MoveFileExA
GetTempFileNameA
GetTempPathA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetCurrentProcessId
OpenProcess
Process32Next
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
Process32First
CreateToolhelp32Snapshot
GetModuleHandleW
GetStartupInfoA
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
user32
ReleaseDC
GetMessageW
GetParent
GetDC
IsDialogMessageW
TranslateMessage
DispatchMessageW
IsWindow
TranslateAcceleratorW
CallWindowProcA
SetFocus
MoveWindow
GetSystemMetrics
GetCursorPos
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
PeekMessageA
GetMessageA
DispatchMessageA
wsprintfA
MessageBoxA
CharLowerW
CharUpperW
DestroyIcon
SetClassLongW
GetClassLongW
SetRect
DestroyCursor
PostQuitMessage
SendMessageA
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PtInRect
GetDlgCtrlID
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
TabbedTextOutA
DrawTextA
SetWindowRgn
SetWindowLongA
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
RemovePropW
GetPropW
SetPropW
MessageBoxW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
ShowWindow
IsWindowVisible
GrayStringA
SetParent
PostMessageW
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
GetFocus
GetDlgItem
GetWindowLongW
SendMessageW
CreateWindowExW
SetWindowLongW
TrackMouseEvent
SetCursor
LoadCursorW
ScreenToClient
DefMDIChildProcW
DefWindowProcW
CallWindowProcW
EndPaint
BeginPaint
SetWindowPos
CreateWindowExA
IsWindowEnabled
EnableWindow
MapWindowPoints
GetWindowRect
GetWindowTextLengthA
mouse_event
SetCursorPos
ClientToScreen
PostMessageA
KillTimer
MessageBeep
GetAsyncKeyState
SetTimer
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
MsgWaitForMultipleObjects
GetClassNameW
UnregisterClassA
shell32
DragQueryFileW
DragFinish
DragAcceptFiles
ole32
CLSIDFromString
gdi32
GetObjectA
GetStockObject
DeleteDC
SetBkColor
BitBlt
SetBkMode
SetTextColor
CreateCompatibleDC
CreateFontW
GetDeviceCaps
SelectObject
ExtCreateRegion
CombineRgn
CreateRoundRectRgn
CreateSolidBrush
GetPixel
CreateDIBSection
DeleteObject
CreateBitmap
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comctl32
ord17
wininet
InternetOpenA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
shlwapi
StrTrimW
ntdll
RtlAdjustPrivilege
ZwUnmapViewOfSection
atl
ord47
ord42
psapi
EnumProcesses
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
Sections
.text Size: 240KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE