Behavioral task
behavioral1
Sample
e3cf3bed2f21f1c27dac1cf2b7d17fc7603c309c385ffadf34cd906ae6983587.exe
Resource
win7-20231025-en
General
-
Target
e3cf3bed2f21f1c27dac1cf2b7d17fc7603c309c385ffadf34cd906ae6983587
-
Size
5.8MB
-
MD5
6f3f663bd748aa851e019befaa6f23bf
-
SHA1
f444ae6826f45880150154f89458834bb9d40b5d
-
SHA256
e3cf3bed2f21f1c27dac1cf2b7d17fc7603c309c385ffadf34cd906ae6983587
-
SHA512
c44d52d253ff4329adb267ac28b88b4a5add50d676c712b9fad19ef6a98c3cad34923d33b143364b25c41ad18d4ff306a629af262ff1ad50b500146b3c04dcc5
-
SSDEEP
98304:sSXXPzHN4XFdRkuo92IMlQnblZPzf83ouM3z7JYnGrxMy+FY9i3vo4iPDC+kAEC:/XrqVdRdo929M5hfaoN6ILgCrnkJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3cf3bed2f21f1c27dac1cf2b7d17fc7603c309c385ffadf34cd906ae6983587
Files
-
e3cf3bed2f21f1c27dac1cf2b7d17fc7603c309c385ffadf34cd906ae6983587.exe windows:4 windows x86 arch:x86
98cc5906c12bc1268e09d4063afc4488
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetProcAddress
FreeLibrary
lstrlenA
MultiByteToWideChar
IsBadCodePtr
GetModuleHandleA
lstrcpyn
RtlMoveMemory
VirtualAlloc
VirtualQueryEx
RtlFillMemory
LocalSize
CreateProcessA
GetThreadContext
ReadProcessMemory
WriteProcessMemory
SetThreadContext
ResumeThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
VirtualAllocEx
VirtualProtectEx
GetCurrentProcessId
CreateFileA
SetFilePointer
SetEndOfFile
GetFileAttributesW
VirtualProtect
CreateThread
LocalAlloc
IsBadReadPtr
LocalFree
lstrlenW
RtlZeroMemory
GetCurrentThreadId
WideCharToMultiByte
QueryDosDeviceW
lstrcpynA
DeviceIoControl
GetVolumeInformationA
CreatePipe
CreateProcessW
PeekNamedPipe
ReadFile
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetCommandLineA
SetCurrentDirectoryA
CopyFileA
MoveFileA
GetVersionExA
SetFileAttributesA
GetStartupInfoA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetLocalTime
LCMapStringA
GetLastError
DeleteFileA
MulDiv
lstrcatA
lstrcpyA
DeleteCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
GetModuleHandleW
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
WriteFile
CreateDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCommandLineW
GetFileSize
GetModuleFileNameA
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
GetProcessHeap
VirtualFree
LoadLibraryA
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
Sleep
user32
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
DestroyMenu
GetMessagePos
IsIconic
GetWindowPlacement
SetFocus
IsDialogMessageA
SendDlgItemMessageA
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
GetFocus
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
SetWindowTextA
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetDlgItem
UpdateWindow
ReleaseDC
FindWindowA
GetClassNameA
IsWindow
UnregisterHotKey
SetCapture
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
RegisterWindowMessageA
PeekMessageA
GetMessageA
DispatchMessageA
PostThreadMessageA
FindWindowExA
GetWindowThreadProcessId
WaitForInputIdle
CallWindowProcA
SetWindowPos
GetWindowRect
SystemParametersInfoA
SetForegroundWindow
GetDesktopWindow
SetWindowLongA
ShowWindow
UnhookWindowsHookEx
GetMenuItemCount
GetDlgCtrlID
PostMessageW
SendMessageA
LoadCursorFromFileW
LoadCursorW
MessageBoxA
wsprintfA
TranslateMessage
GetSystemMetrics
GetCursorPos
EndDialog
CreateDialogIndirectParamA
DestroyWindow
CheckMenuItem
GetNextDlgTabItem
shell32
SHBrowseForFolderA
DragFinish
DragQueryFileA
SHGetSpecialFolderPathA
CommandLineToArgvW
DragAcceptFiles
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetObjectA
GetStockObject
SelectObject
DeleteDC
TranslateCharsetInfo
GetDeviceCaps
DeleteObject
CreateFontA
shlwapi
PathFileExistsA
PathFindExtensionA
comdlg32
GetFileTitleA
advapi32
CryptReleaseContext
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptAcquireContextA
GetTokenInformation
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
LookupPrivilegeValueA
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleInitialize
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
InternetSetOptionA
InternetConnectA
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
oleaut32
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
SafeArrayAllocDescriptor
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
VariantInit
SafeArrayDestroyDescriptor
SystemTimeToVariantTime
dbghelp
MakeSureDirectoryPathExists
psapi
GetProcessImageFileNameW
winhttp
WinHttpOpenRequest
WinHttpSetCredentials
WinHttpCloseHandle
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpQueryHeaders
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpSendRequest
WinHttpCheckPlatform
oledlg
ord8
comctl32
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
iphlpapi
GetAdaptersInfo
ws2_32
WSACleanup
select
recv
send
closesocket
WSAStartup
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
rasapi32
RasHangUpA
RasGetConnectStatusA
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE