Behavioral task
behavioral1
Sample
382da7b0f4dfb0d35afae9ed33ea129eb85dc6d8897c3736b950b2967fde457d.exe
Resource
win7-20231215-en
General
-
Target
382da7b0f4dfb0d35afae9ed33ea129eb85dc6d8897c3736b950b2967fde457d
-
Size
616KB
-
MD5
fbc46092a370d71616598427d1e0d7d4
-
SHA1
0b32591ae95149c88eefeb5bce812d46bb6241f5
-
SHA256
382da7b0f4dfb0d35afae9ed33ea129eb85dc6d8897c3736b950b2967fde457d
-
SHA512
aef664d24f9a9e6ffa4bb60256c8de4c8ba2cb4bdfb131eb5e6263bf5c8b3e60b095c74e133127ba6febc1b60002166205124ab6a7c9e73d44dfd329d5064498
-
SSDEEP
12288:PSuW6MEMdn8OrCu1G/uXYn/zq4VNWPHRCS1f:PcEE8CCu1GYAp3WPHJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 382da7b0f4dfb0d35afae9ed33ea129eb85dc6d8897c3736b950b2967fde457d
Files
-
382da7b0f4dfb0d35afae9ed33ea129eb85dc6d8897c3736b950b2967fde457d.exe windows:4 windows x86 arch:x86
41a78847277107bdfe653877ec7cf07c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CreateFileA
GetFileSize
ReadFile
GetEnvironmentVariableA
DeleteFileA
GetModuleFileNameA
Sleep
GetTickCount
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
ReadProcessMemory
WideCharToMultiByte
VirtualQueryEx
Module32Next
LocalAlloc
GetCurrentProcessId
TerminateProcess
QueryDosDeviceA
OpenProcess
GetCurrentProcess
GetSystemDirectoryA
Module32First
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
LocalSize
SetStdHandle
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
lstrlenA
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
VirtualAlloc
RaiseException
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
DeleteCriticalSection
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
TlsGetValue
SetLastError
TlsFree
TlsAlloc
LeaveCriticalSection
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
RtlUnwind
GetVersion
GetCommandLineA
LCMapStringA
GetProcAddress
FreeLibrary
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetModuleHandleA
LoadLibraryA
RtlMoveMemory
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetFilePointer
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
FlushFileBuffers
CloseHandle
TlsSetValue
InterlockedIncrement
user32
MessageBoxA
wsprintfA
DispatchMessageA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
GetWindowThreadProcessId
GetClassInfoExA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
UnregisterClassA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetTimer
CreateWindowExA
TranslateMessage
GetMessageA
PeekMessageA
MessageBoxA
wsprintfA
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
SelectObject
RestoreDC
SaveDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
DeleteDC
DeleteObject
CreateBitmap
GetDeviceCaps
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
psapi
GetProcessImageFileNameA
comctl32
ord17
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 244KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 272KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE