Behavioral task
behavioral1
Sample
5d516d5151b1aeece6a4fa23980c27e6c14edfe3d4c2abffde58c1a59e2b0754.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5d516d5151b1aeece6a4fa23980c27e6c14edfe3d4c2abffde58c1a59e2b0754.exe
Resource
win10v2004-20231023-en
General
-
Target
5d516d5151b1aeece6a4fa23980c27e6c14edfe3d4c2abffde58c1a59e2b0754
-
Size
3.2MB
-
MD5
dc50fafb76fac825dc6605e254abed7f
-
SHA1
9d4945177d6ab5b01277a2b993aba0d3765f92f8
-
SHA256
5d516d5151b1aeece6a4fa23980c27e6c14edfe3d4c2abffde58c1a59e2b0754
-
SHA512
004b8d5e913202d47faf7253c858fa1059a91826e1f4a9f500c43e4171f259dfae290ee9da0bf417aa5be42f1962203e1c67a0912fea176e4443a5ce82e398b0
-
SSDEEP
98304:eMZVOY3CWO/m59p4LuO2r5b+sIggQk0Jk7LA0FXGhJ:TbNBN5Aglk7LA0Fi
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d516d5151b1aeece6a4fa23980c27e6c14edfe3d4c2abffde58c1a59e2b0754
Files
-
5d516d5151b1aeece6a4fa23980c27e6c14edfe3d4c2abffde58c1a59e2b0754.exe windows:6 windows x64 arch:x64
00d2f50618a9ebab4119f57c8ad1803f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GlobalFlags
GetSystemInfo
GetCurrentProcessId
CreateProcessW
WideCharToMultiByte
VirtualQuery
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
lstrcmpiW
LoadLibraryExW
WriteConsoleW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
GetStdHandle
GetCommandLineA
GetModuleHandleExW
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GetFileAttributesW
FindClose
TerminateProcess
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryW
GetTickCount
FindResourceW
LoadResource
LockResource
FreeResource
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
CreateThread
WriteFile
TryEnterCriticalSection
InitializeCriticalSection
ExitProcess
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
GetModuleFileNameW
CloseHandle
CreateFileW
Sleep
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
LCMapStringW
HeapFree
user32
RegisterClassExW
PostQuitMessage
GetClassInfoExW
CharNextW
SetWindowLongPtrW
DeleteMenu
DestroyAcceleratorTable
GetClassNameW
DestroyMenu
TranslateAcceleratorW
GetWindowTextW
EndPaint
GetNextDlgTabItem
BeginPaint
IsIconic
GetDlgItem
SetFocus
UnregisterClassW
MessageBoxW
DestroyWindow
IsWindow
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
GetWindowLongW
SendMessageW
IntersectRect
IsRectEmpty
WinHelpW
SetMenu
IsWindowEnabled
GetSysColor
IsChild
GetDlgCtrlID
IsDialogMessageW
DrawIcon
FillRect
SetWindowRgn
IsWindowVisible
GetFocus
CallWindowProcW
GetSystemMenu
GetLastActivePopup
GetWindowTextLengthW
SetRect
IsZoomed
GetTopWindow
DestroyIcon
RedrawWindow
ScreenToClient
ClientToScreen
SetWindowTextW
InvalidateRect
SetWindowPos
SetWindowLongW
GetKeyState
SetCursor
GetWindow
ShowWindow
EnableWindow
AdjustWindowRectEx
ReleaseDC
GetClientRect
GetSystemMetrics
GetDC
GetWindowRect
LoadImageW
GetParent
GetDesktopWindow
LoadCursorW
LoadIconW
GetActiveWindow
LoadStringW
GetWindowLongPtrW
GetWindowThreadProcessId
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
GetMonitorInfoW
EnumWindows
PostMessageW
CreateWindowExW
gdi32
CreateEllipticRgn
CreateSolidBrush
CreateRoundRectRgn
GetClipBox
CreateFontIndirectW
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GdiAlphaBlend
GetStockObject
DeleteObject
SetStretchBltMode
GetObjectW
DeleteDC
GetDeviceCaps
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
DragFinish
DragQueryFileW
SHGetSpecialFolderPathW
Shell_NotifyIconW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
ws2_32
WSACleanup
Sections
.text Size: 245KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ