Behavioral task
behavioral1
Sample
fe906534ac77f1cce78cc684b214ad73b8bac1c7a568d1412b54f7ae02b9fcc3.exe
Resource
win7-20231129-en
General
-
Target
fe906534ac77f1cce78cc684b214ad73b8bac1c7a568d1412b54f7ae02b9fcc3
-
Size
496KB
-
MD5
11fb727af406b2a95b2cf4e585336429
-
SHA1
eeafa730f895db7f82850a6d197fb38e7db1a137
-
SHA256
fe906534ac77f1cce78cc684b214ad73b8bac1c7a568d1412b54f7ae02b9fcc3
-
SHA512
d7888b1c5c2c941bb30b38ad6d1d5904016c814a9873002e460a4407b6e1bc7b3065b567589e5f4ed46d5036fc7b88ca44f1be0b76fc042d5d6526e110056eb0
-
SSDEEP
3072:qFL8M3jb/AXURoWZB/LH4qzOIVpAVAmYtZ5/E9/a/1mGFaaBpbIzcnEHVPtAL:qn3jbIkRoO/LY8B0O89wmGFXfEFy
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe906534ac77f1cce78cc684b214ad73b8bac1c7a568d1412b54f7ae02b9fcc3
Files
-
fe906534ac77f1cce78cc684b214ad73b8bac1c7a568d1412b54f7ae02b9fcc3.exe windows:4 windows x86 arch:x86
a978c77d50e233b559117160435d8417
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
GetTempPathW
GetCurrentProcess
OpenProcess
QueryDosDeviceW
lstrcpyn
RtlMoveMemory
RtlZeroMemory
VirtualQueryEx
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
lstrcpynA
LocalAlloc
LocalFree
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
Module32First
IsBadReadPtr
Process32First
GetFileSize
CreateFileA
GetEnvironmentVariableA
GetTickCount
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LCMapStringA
IsBadCodePtr
SetUnhandledExceptionFilter
CloseHandle
HeapFree
Process32Next
FlushFileBuffers
SetStdHandle
CreateToolhelp32Snapshot
ReadFile
LocalSize
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
GetStartupInfoA
GetVersion
InterlockedDecrement
InterlockedIncrement
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetVersionExA
HeapDestroy
HeapCreate
WriteFile
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
MultiByteToWideChar
user32
PeekMessageA
MessageBoxA
wsprintfA
DispatchMessageA
GetMessageA
TranslateMessage
shell32
ShellExecuteA
SHGetSpecialFolderPathW
CommandLineToArgvW
iphlpapi
GetIpForwardTable
psapi
GetProcessImageFileNameW
advapi32
AdjustTokenPrivileges
CreateProcessAsUserA
ws2_32
WSAStartup
oleaut32
VariantTimeToSystemTime
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE