Behavioral task
behavioral1
Sample
f69293d83e596a1dd2c5a6fb8f3303f7da109fb6435ac9a1cee16010996bc8a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f69293d83e596a1dd2c5a6fb8f3303f7da109fb6435ac9a1cee16010996bc8a9.exe
Resource
win10v2004-20231215-en
General
-
Target
f69293d83e596a1dd2c5a6fb8f3303f7da109fb6435ac9a1cee16010996bc8a9
-
Size
14.5MB
-
MD5
253cc56a5ddb514e5e6656d10177c46c
-
SHA1
1c40c7007024acda8ecfde7727649e77b121034e
-
SHA256
f69293d83e596a1dd2c5a6fb8f3303f7da109fb6435ac9a1cee16010996bc8a9
-
SHA512
789af89c71e996357935871f87035d840dacaa669577bab1933d2e17a51725d5b77255a8aca9453ce796a37086706d7c3005465589ea01758a76b58ce3b5f644
-
SSDEEP
196608:TRfip6QwZbvJ5CchJqjg1WNpztyul2b0a9e:TRapBwZbl0c4psow0we
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f69293d83e596a1dd2c5a6fb8f3303f7da109fb6435ac9a1cee16010996bc8a9
Files
-
f69293d83e596a1dd2c5a6fb8f3303f7da109fb6435ac9a1cee16010996bc8a9.exe windows:4 windows x86 arch:x86
9227cd3c94a6b6c72db9fae2c81421b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
kernel32
LCMapStringA
CreateFileA
FindClose
FindFirstFileA
SetFilePointer
GetFileSize
GetLastError
GetCurrentProcess
GetVersionExA
GetVolumeInformationA
TerminateProcess
OpenProcess
GetProcAddress
FreeLibrary
lstrcpyA
LoadLibraryA
GetEnvironmentVariableA
SetLastError
lstrcatA
ReadFile
GetTimeZoneInformation
GetVersion
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetErrorMode
lstrcpynA
GetCurrentThreadId
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
LocalFree
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFullPathNameA
GetFileTime
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetPrivateProfileStringA
GetFileAttributesA
CopyFileA
DeleteFileA
GetModuleFileNameA
GetStdHandle
WriteFile
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetCommandLineA
GetModuleHandleA
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
GetWindowsDirectoryA
GetShortPathNameA
CloseHandle
WaitForSingleObject
CreateProcessA
Sleep
lstrlenA
user32
LoadStringA
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
GetParent
GetWindow
PtInRect
GetWindowLongA
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
SendMessageA
GetWindowRect
GetSystemMetrics
DestroyWindow
CharUpperA
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
CallNextHookEx
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
PostMessageA
PostQuitMessage
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindowVisible
EnumWindows
WaitForInputIdle
GetKeyState
CopyRect
gdi32
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
DeleteObject
RestoreDC
SaveDC
Escape
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
CreateBitmap
ExtTextOutA
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
SelectObject
DeleteDC
AddFontResourceA
SetBkColor
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
ole32
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
oleaut32
VariantChangeType
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHGetSpecialFolderPathA
comctl32
ord17
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14.4MB - Virtual size: 14.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ