True
Behavioral task
behavioral1
Sample
d101c71142ff647f12c470862a5c8ba6219c08ad876656e6661a514af593a005.dll
Resource
win7-20231215-en
General
-
Target
d101c71142ff647f12c470862a5c8ba6219c08ad876656e6661a514af593a005
-
Size
2.6MB
-
MD5
14ea94a75bf47d5b218ad980f3699a81
-
SHA1
e6e1ca241ed65425207af216e70c16da29d07aee
-
SHA256
d101c71142ff647f12c470862a5c8ba6219c08ad876656e6661a514af593a005
-
SHA512
3612975df367991c9fc9c5ecdc15fbadce34c4f95e79db095b86d7cbbdbcc6171ba23528cebd39d676321e4e213a30cd97f444278d45e2715a4d8cc1ce6db8eb
-
SSDEEP
24576:6kUfEO8FZjp3JFWTUHT++PRf8+LUc5OEcdPpfWh13y16uzM7k3wJmOKMCmLb2NCf:gfuBflmz53wJWqb2N
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d101c71142ff647f12c470862a5c8ba6219c08ad876656e6661a514af593a005
Files
-
d101c71142ff647f12c470862a5c8ba6219c08ad876656e6661a514af593a005.dll windows:4 windows x86 arch:x86
a83c772018be74314ea860c05b4074e8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadProcessMemory
lstrcpyn
GetCurrentThreadId
CopyFileA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
MultiByteToWideChar
ResumeThread
CreateRemoteThread
OpenThread
GetVersionExA
GetLogicalDriveStringsA
QueryDosDeviceA
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
Sleep
ReadFile
GetFileSize
CreateFileA
DeleteFileA
MulDiv
GetDiskFreeSpaceA
VirtualAllocEx
GetCommandLineA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
VirtualAlloc
VirtualFree
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
WriteProcessMemory
WideCharToMultiByte
DuplicateHandle
GetProcessHandleCount
GetCurrentProcess
CloseHandle
GetCurrentDirectoryA
GetLastError
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
WriteFile
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetACP
GetCPInfo
LCMapStringW
SetFilePointer
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
GetLastError
MultiByteToWideChar
WaitForSingleObject
VirtualFreeEx
lstrcpynA
FindClose
lstrcpyn
GetNativeSystemInfo
OpenProcess
GetModuleHandleA
CloseHandle
GetModuleFileNameA
GetCurrentProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
TerminateProcess
InterlockedIncrement
GetOEMCP
RtlUnwind
GetVersion
CreateToolhelp32Snapshot
Process32First
Process32Next
DuplicateHandle
CopyFileA
VirtualAllocEx
WideCharToMultiByte
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
RtlMoveMemory
WriteProcessMemory
GetWindowsDirectoryA
lstrcpynW
CreateWaitableTimerA
SetWaitableTimer
Module32First
Module32Next
VirtualProtect
VirtualQuery
LoadLibraryExA
FreeLibrary
CreateRemoteThread
GetExitCodeThread
OpenThread
TerminateThread
LeaveCriticalSection
GetVersionExA
HeapCreate
ReadProcessMemory
VirtualQueryEx
CreateProcessA
PeekNamedPipe
lstrlenW
lstrcpyA
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
LoadLibraryA
InterlockedDecrement
GetCurrentThreadId
SetProcessAffinityMask
EnterCriticalSection
DeleteCriticalSection
RtlZeroMemory
IsWow64Process
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
ReadFile
GetFileSize
CreateFileA
DeleteFileA
WriteFile
GetTickCount
LCMapStringA
GetProcAddress
GetUserDefaultLCID
GetDiskFreeSpaceExA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetStartupInfoA
FindNextFileA
FindFirstFileA
GetCommandLineA
shlwapi
PathFindFileNameA
PathFindFileNameA
StrToIntW
StrToIntExW
PathFindExtensionA
PathFileExistsA
StrToIntExA
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetAncestor
IsWindowVisible
GetParent
EnumWindows
RegisterWindowMessageA
MsgWaitForMultipleObjects
PostThreadMessageA
CallWindowProcA
SetWindowLongA
GetWindowLongA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
GetForegroundWindow
RegisterWindowMessageA
ClientToScreen
SendMessageA
WindowFromPoint
ShowWindow
EnumWindows
GetParent
GetAncestor
CallWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
GetMessageA
MessageBoxA
GetDlgItem
FindWindowA
GetCursorPos
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptHashData
CryptGetHashParam
RegCloseKey
RegQueryValueExA
RegOpenKeyA
ws2_32
WSAStartup
htons
WSACleanup
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shell32
SHGetSpecialFolderPathA
ole32
CoCreateInstance
OleRun
CoInitialize
CLSIDFromString
CLSIDFromProgID
CoUninitialize
psapi
GetModuleInformation
oleaut32
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SysFreeString
Exports
Exports
Sections
.text Size: 1004KB - Virtual size: 1001KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ