_�����ӳ���
Behavioral task
behavioral1
Sample
ead59c713efd13582b484fbd95409dd5d222e743bbe0c4c6b2759976407237fc.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ead59c713efd13582b484fbd95409dd5d222e743bbe0c4c6b2759976407237fc.dll
Resource
win10v2004-20231020-en
General
-
Target
ead59c713efd13582b484fbd95409dd5d222e743bbe0c4c6b2759976407237fc
-
Size
468KB
-
MD5
fe3e219141b35188cefad84194cc6af0
-
SHA1
c23489673790d965bdf4bdbc2141e10f6d486c02
-
SHA256
ead59c713efd13582b484fbd95409dd5d222e743bbe0c4c6b2759976407237fc
-
SHA512
49b622d7853960ea9bdc1b83d1bd86e061b44f5ca8b863520c791b5c7b6cb19ac021c2026cd74b4e03529f36115207210c3a530f4844ae4a117e52695363dca0
-
SSDEEP
6144:fXZJb/ALzHBxVymuMWYs9s+E8HIQQ48oRtSBUeSI74G:xe3HDVymuMW/9gxQQ48Ot+S84G
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ead59c713efd13582b484fbd95409dd5d222e743bbe0c4c6b2759976407237fc
Files
-
ead59c713efd13582b484fbd95409dd5d222e743bbe0c4c6b2759976407237fc.dll windows:4 windows x86
7c2e6573e9eed759b1003d06ce305690
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
GetCommandLineA
LCMapStringA
GlobalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultLCID
GetPrivateProfileStringA
GetTickCount
CreateFileA
GetFileSize
ReadFile
IsBadReadPtr
HeapFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WriteFile
SetFilePointer
GetLastError
GetVersionExA
HeapReAlloc
TerminateProcess
Sleep
lstrcpyA
VerLanguageNameA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushFileBuffers
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
HeapAlloc
GetCurrentProcess
ExitProcess
GetProcessHeap
GetLocalTime
GetModuleHandleA
FreeLibrary
GlobalFree
OpenThread
Thread32Next
Thread32First
VirtualProtect
VirtualFreeEx
MultiByteToWideChar
ReadProcessMemory
VirtualQueryEx
GetProcAddress
LoadLibraryA
GetQueuedCompletionStatus
CreateIoCompletionPort
TerminateThread
GetExitCodeThread
VirtualFree
CreateThread
VirtualAlloc
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
GetProcessId
RtlMoveMemory
WideCharToMultiByte
Module32First
lstrcpynA
GetCurrentProcessId
CloseHandle
LocalFree
LocalAlloc
OpenProcess
shlwapi
StrToInt64ExA
user32
SetActiveWindow
EndDialog
UnregisterClassA
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CreateDialogIndirectParamA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
GetWindowRect
GetSystemMetrics
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
PostMessageA
PostQuitMessage
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallWindowProcA
RegisterWindowMessageA
SetWindowLongA
GetWindowTextA
GetWindowThreadProcessId
GetInputState
MsgWaitForMultipleObjects
IsWindow
SendMessageA
gdi32
DeleteObject
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
GetDeviceCaps
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
DeleteDC
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
ole32
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleRun
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
psapi
GetModuleInformation
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Exports
Exports
Sections
.text Size: 340KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ