Behavioral task
behavioral1
Sample
be2417be805d47741f11ed139e46318ad34dc4a992efca5a1044859609e96774.exe
Resource
win7-20240221-en
General
-
Target
be2417be805d47741f11ed139e46318ad34dc4a992efca5a1044859609e96774
-
Size
496KB
-
MD5
127c84fd7ad6892f0402ecaa103e6285
-
SHA1
fd6edafacabe64d5eda178f87af13c7f6bb015ec
-
SHA256
be2417be805d47741f11ed139e46318ad34dc4a992efca5a1044859609e96774
-
SHA512
b7be7a11505fb178f665823a9baebbd9bb892ed050f120dcfcd4b2b1c54fd6001da3d65b9eeef14d659d116932180219d62b036d00d4700665a54d8082d0e3e7
-
SSDEEP
3072:qFL8M3jb/AXURoWZB/LH4qzOIVpAVAmYtRE9/a/1mGFaa8pbIzcnEHVPtAL:qn3jbIkRoO/LY8B0/9wmGFX6EFy
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be2417be805d47741f11ed139e46318ad34dc4a992efca5a1044859609e96774
Files
-
be2417be805d47741f11ed139e46318ad34dc4a992efca5a1044859609e96774.exe windows:4 windows x86 arch:x86
a978c77d50e233b559117160435d8417
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
GetTempPathW
GetCurrentProcess
OpenProcess
QueryDosDeviceW
lstrcpyn
RtlMoveMemory
RtlZeroMemory
VirtualQueryEx
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
lstrcpynA
LocalAlloc
LocalFree
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
Module32First
IsBadReadPtr
Process32First
GetFileSize
CreateFileA
GetEnvironmentVariableA
GetTickCount
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LCMapStringA
IsBadCodePtr
SetUnhandledExceptionFilter
CloseHandle
HeapFree
Process32Next
FlushFileBuffers
SetStdHandle
CreateToolhelp32Snapshot
ReadFile
LocalSize
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
GetStartupInfoA
GetVersion
InterlockedDecrement
InterlockedIncrement
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetVersionExA
HeapDestroy
HeapCreate
WriteFile
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
MultiByteToWideChar
user32
PeekMessageA
MessageBoxA
wsprintfA
DispatchMessageA
GetMessageA
TranslateMessage
shell32
ShellExecuteA
SHGetSpecialFolderPathW
CommandLineToArgvW
iphlpapi
GetIpForwardTable
psapi
GetProcessImageFileNameW
advapi32
AdjustTokenPrivileges
CreateProcessAsUserA
ws2_32
WSAStartup
oleaut32
VariantTimeToSystemTime
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE