Behavioral task
behavioral1
Sample
452383d67f8e25647f56db90774731f3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
452383d67f8e25647f56db90774731f3.exe
Resource
win10v2004-20231222-en
General
-
Target
452383d67f8e25647f56db90774731f3
-
Size
156KB
-
MD5
452383d67f8e25647f56db90774731f3
-
SHA1
9b149f4dd502984a8ec60eff03ad7dc4d7074b17
-
SHA256
26d3fc81064580c6676cec8d10b56282a60c35b109c91184b5b74f6f6223bea2
-
SHA512
8e6396b53bff0c9b256a1c3699a1330ef16c73d7ce0e62244ad4f38b24bd98a88309b353a35fd0d1d944cd00558ac490a7ddaa033ebab4ad725fb331649a2593
-
SSDEEP
3072:VTgPmBOuLLAwFW740JTJTGZzIx+QtilB:VDPAwFWE0JTJTG6s
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 452383d67f8e25647f56db90774731f3
Files
-
452383d67f8e25647f56db90774731f3.exe windows:4 windows x86 arch:x86
c55e46c941f94f31da3d8abbc1cce869
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetStartupInfoA
GetCommandLineA
LCMapStringA
WaitForSingleObject
CreateFileA
WriteFile
CloseHandle
FlushFileBuffers
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
GetStringTypeW
GetStringTypeA
RaiseException
MoveFileA
VirtualAlloc
LCMapStringW
MultiByteToWideChar
GetProcAddress
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
InterlockedIncrement
InterlockedDecrement
GetVersion
Sleep
TerminateThread
CreateThread
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetModuleHandleA
lstrlenA
ReadProcessMemory
GetCurrentProcess
LocalFree
RtlFillMemory
LocalAlloc
RtlMoveMemory
lstrcpyn
LocalSize
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ws2_32
WSAStartup
gethostname
WSACleanup
inet_ntoa
send
__WSAFDIsSet
select
closesocket
htons
socket
shutdown
ioctlsocket
connect
inet_addr
WSAGetLastError
recv
gethostbyname
advapi32
OpenSCManagerA
CloseServiceHandle
CreateServiceA
user32
SetTimer
KillTimer
GetClassInfoExA
RegisterClassExA
LoadIconA
LoadCursorA
MoveWindow
BeginPaint
EndPaint
PeekMessageA
wsprintfA
MessageBoxA
SetWindowPos
SetWindowRgn
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
EqualRect
IntersectRect
GetWindowLongA
SetWindowLongA
PostQuitMessage
CreateWindowExA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
IsWindow
EnableWindow
UpdateWindow
ShowWindow
IsWindowVisible
GetWindowRect
CallWindowProcA
ReleaseDC
FillRect
GetSysColor
GetDC
DefWindowProcA
TrackMouseEvent
SendMessageA
GetParent
InvalidateRect
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
HttpQueryInfoA
shell32
ShellExecuteA
gdi32
CreateRectRgn
CreateDIBitmap
SetTextColor
TextOutA
SetBkColor
DeleteObject
GetPixel
CreateSolidBrush
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
GetObjectA
CombineRgn
StretchBlt
CreatePatternBrush
msimg32
TransparentBlt
shlwapi
PathFileExistsA
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE