Behavioral task
behavioral1
Sample
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe
Resource
win7-20231025-en
General
-
Target
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71
-
Size
1.1MB
-
MD5
46538d346292f9a646b76630e550033d
-
SHA1
29b502ee7a8dd515540f39f83045c19517402e1f
-
SHA256
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71
-
SHA512
c40ba2d92ef757c1f3e474022401ef5617fd8ca2c4ec9c954069cfcff3b99d2ba84c4f913872e67a95cf454d05d5a4735e75a7294021f170826e8049a1ad63f3
-
SSDEEP
24576:f88FPfkO54pZylJ1qguavXeLi4SkAJxiHH1/cgX2HOEwhjHX57WlAVq7aAu4DQKD:f7UO54pZylJ1qguaWL+yHBc7vwZNW6Vi
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71
Files
-
77dcf3edc9a5704e1e4fa0c70f82bc3a4fcbbc0e77e295f10f2678925a3a6a71.exe windows:4 windows x86 arch:x86
400ad40ea6eed404e04c4058c363df3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
GetTempPathA
MoveFileA
CreateDirectoryA
WideCharToMultiByte
GetModuleHandleA
CreateFileA
DeviceIoControl
InitializeCriticalSection
RtlMoveMemory
IsDebuggerPresent
GetTempFileNameA
MoveFileExA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateThread
lstrcpyn
LoadLibraryA
Module32First
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
GetTickCount
WriteFile
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetModuleFileNameA
ReadFile
LCMapStringA
FreeLibrary
GetCommandLineA
RemoveDirectoryA
SetFileAttributesA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
MultiByteToWideChar
FindClose
FindFirstFileA
FindNextFileA
SetFilePointer
DeleteFileA
GetEnvironmentVariableA
GetCurrentProcessId
GetLocalTime
GetProcAddress
InterlockedExchange
SetStdHandle
Sleep
VirtualFree
VirtualAlloc
GlobalMemoryStatusEx
GetFileSize
GetLastError
GetCurrentProcess
GetVersionExA
TerminateProcess
OpenProcess
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
shlwapi
PathFileExistsA
PathFindFileNameA
ws2_32
WSAStartup
closesocket
socket
inet_addr
htons
connect
select
send
recv
getsockname
ntohs
WSAAsyncSelect
WSACleanup
gethostbyname
inet_ntoa
user32
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
EndDialog
GetDlgCtrlID
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
EnableMenuItem
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
SetWindowsHookExA
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
PtInRect
GetCursorPos
SystemParametersInfoA
FindWindowA
IsWindow
GetFocus
GetNextDlgTabItem
GetKeyState
GetLastActivePopup
CallNextHookEx
GetWindow
ValidateRect
SetCursor
PostMessageA
SetForegroundWindow
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetSystemMetrics
GetDC
ReleaseDC
PeekMessageA
CreateDialogIndirectParamA
UpdateWindow
GetMessageA
SendMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
SetWindowTextA
GetDlgItem
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
GetWindowTextLengthA
wsprintfA
GetDesktopWindow
CallWindowProcA
GetWindowInfo
GetWindowThreadProcessId
EnumWindows
wvsprintfA
SetLayeredWindowAttributes
SetWindowLongA
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindowLongA
MessageBoxTimeoutA
MessageBoxA
EnableWindow
GetClientRect
GetParent
RegisterClassA
gdi32
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
CreateBitmap
SelectObject
SetWindowExtEx
ScaleWindowExtEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
DeleteObject
DeleteDC
GetDIBits
GetObjectA
StretchBlt
SetStretchBltMode
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
advapi32
RegSetValueExA
RegCreateKeyExA
DeleteService
ControlService
StartServiceA
CloseServiceHandle
OpenServiceA
CreateServiceA
OpenSCManagerA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegOpenKeyExA
RegCloseKey
ole32
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
CLSIDFromString
OleFlushClipboard
OleIsCurrentClipboard
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
OleInitialize
oledlg
ord8
oleaut32
VariantClear
SysAllocString
SafeArrayCreate
SafeArrayDestroy
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantInit
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
Sections
.text Size: 360KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 704KB - Virtual size: 852KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ