Behavioral task
behavioral1
Sample
962122bc6806f8aaed2128a440ce4b83d1b079ac1d1e14d80d9c30404a7897b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
962122bc6806f8aaed2128a440ce4b83d1b079ac1d1e14d80d9c30404a7897b9.exe
Resource
win10v2004-20231215-en
General
-
Target
962122bc6806f8aaed2128a440ce4b83d1b079ac1d1e14d80d9c30404a7897b9
-
Size
2.0MB
-
MD5
8ab394dc55768dab87999998c66877b5
-
SHA1
15c8c91a981d142284ad9a4948653a9d69f4c405
-
SHA256
962122bc6806f8aaed2128a440ce4b83d1b079ac1d1e14d80d9c30404a7897b9
-
SHA512
d0db8a3781c98cc523d9789e63eaa5e856a253a611d4dff46336b5a5ec25dc9932de6f44ebd94fe97bc711b94a82d8492ff5b55b7e727e2b1d2cb5adf391d49b
-
SSDEEP
24576:8Xj5P6VwNLtvsi6b0FrArWUVbpyLY2RvQdpcy1XLEg9MRTfzQ/9b7jBDEvX:dwTel6UVb8bo7Eg9Or8/jBDQ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 962122bc6806f8aaed2128a440ce4b83d1b079ac1d1e14d80d9c30404a7897b9
Files
-
962122bc6806f8aaed2128a440ce4b83d1b079ac1d1e14d80d9c30404a7897b9.exe windows:4 windows x86 arch:x86
6da8b1d276f65c18b0d67541aba6d7e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetProcessVersion
lstrcmpA
GlobalFlags
InterlockedIncrement
GetCPInfo
GetOEMCP
ReadFile
SetFilePointer
FlushFileBuffers
RtlUnwind
RaiseException
HeapSize
TerminateProcess
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
Sleep
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetVersion
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalAlloc
GlobalReAlloc
GlobalLock
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetModuleHandleA
GetCurrentThreadId
lstrcpynA
SetErrorMode
lstrcpyA
lstrcatA
MulDiv
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
MoveFileA
CopyFileA
DeleteFileA
GetTickCount
CreateFileA
WriteFile
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CloseHandle
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetCommandLineA
user32
AdjustWindowRectEx
SetFocus
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
CopyRect
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
GetClassLongA
SetPropA
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetWindow
GetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
LoadStringA
GetKeyState
CallNextHookEx
SetWindowsHookExA
UnregisterHotKey
SetWindowLongA
SetCapture
SendMessageA
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
GetCursorPos
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
GetClientRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
UnhookWindowsHookEx
gdi32
CreateFontA
DeleteObject
GetObjectA
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
TranslateCharsetInfo
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
DeleteDC
SaveDC
RestoreDC
SelectObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
shlwapi
PathFileExistsA
shell32
DragAcceptFiles
DragQueryFileA
DragFinish
SHGetSpecialFolderPathA
comctl32
ord17
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
., H Size: 4KB - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
._@_ Size: 232KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 834B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ