Behavioral task
behavioral1
Sample
2024-04-10_a2829442ff00cc349b69e305e86a2967_hacktools_xiaoba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_a2829442ff00cc349b69e305e86a2967_hacktools_xiaoba.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_a2829442ff00cc349b69e305e86a2967_hacktools_xiaoba
-
Size
4.1MB
-
MD5
a2829442ff00cc349b69e305e86a2967
-
SHA1
b868fba0ff379c7f546620106959875c32485512
-
SHA256
2b3a9fdbc6a900feb580246eb15f2e2f1296a03eee9fdb7f44813eadb2cce82a
-
SHA512
2fdde299ee705641568b8cbb76fb46e3456c891acb09029ba812805b4adaab065a6d8d69e233fde85dc5b284145d90476c6c2cffa9b256b7973357c4ec7fb0dd
-
SSDEEP
98304:oNHGz3i+1EIpkIaAAvAF6RKs91PM+FUdyRF+:oNHGn1TpjaKkKs9m+F9F+
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-10_a2829442ff00cc349b69e305e86a2967_hacktools_xiaoba
Files
-
2024-04-10_a2829442ff00cc349b69e305e86a2967_hacktools_xiaoba.exe windows:4 windows x86 arch:x86
1d9d50fd0861209cf0debcbad493c686
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
GetModuleFileNameA
IsBadReadPtr
CreateFileA
HeapFree
HeapAlloc
ExitProcess
GetProcessHeap
WriteProcessMemory
lstrcpyn
LocalFree
RtlMoveMemory
LocalAlloc
Sleep
VirtualFree
VirtualAlloc
GetLocalTime
GetProcAddress
ReadFile
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
HeapReAlloc
IsDebuggerPresent
GetModuleHandleA
VirtualAllocEx
SetStdHandle
CreateThread
InitializeCriticalSection
CloseHandle
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
GetVersionExA
SetSystemPowerState
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
WriteFile
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
IsBadCodePtr
GetStringTypeW
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
LocalFree
InterlockedDecrement
InterlockedIncrement
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RaiseException
GetSystemTime
GetLocalTime
HeapSize
GetACP
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStdHandle
SuspendThread
ReleaseMutex
CreateMutexA
FileTimeToSystemTime
TerminateThread
GetVersion
GetTimeZoneInformation
SetLastError
GetSystemDirectoryA
GetTempPathW
CreateFileW
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
InterlockedExchange
RtlUnwind
SetHandleCount
DeleteFileW
GetVersionExW
LoadLibraryW
VirtualQuery
GetModuleHandleW
Beep
GetWindowsDirectoryA
CloseHandle
WaitForSingleObject
CreateProcessA
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
CreateDirectoryA
CopyFileA
DeleteFileA
MoveFileA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
ExpandEnvironmentStringsA
Sleep
CreateEventA
CreateThread
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
WideCharToMultiByte
MultiByteToWideChar
GetUserDefaultLCID
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
RemoveDirectoryA
lstrlenW
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
LoadLibraryExA
user32
DrawTextA
GrayStringA
GetDlgItem
GetMessageA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
SetWindowTextA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
PeekMessageA
TabbedTextOutA
DispatchMessageA
wsprintfA
MessageBoxA
BringWindowToTop
CreateWindowExA
SetLayeredWindowAttributes
SetWindowLongA
GetClassNameA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetWindowTextA
IsWindowVisible
GetWindowLongA
ReleaseDC
GetDC
ExitWindowsEx
SetForegroundWindow
GetActiveWindow
TranslateMessage
GetForegroundWindow
GetMenuItemCount
IsWindowEnabled
GetParent
GetClassInfoA
EnableWindow
WinHelpA
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
EnumWindows
IsWindowEnabled
GetWindowThreadProcessId
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
SetCursorPos
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
UnregisterClassA
GetMessageA
WindowFromPoint
DrawFocusRect
GetParent
DrawFrameControl
TranslateMessage
LoadIconA
GetClassNameA
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
SetWindowTextA
LoadStringA
CopyIcon
GetIconInfo
CreateIconIndirect
MessageBoxW
GetCursor
DrawTextA
SetPropA
CallWindowProcA
MoveWindow
GetPropA
FrameRect
GetWindowDC
EnumChildWindows
WindowFromDC
GrayStringA
DrawStateA
GetTabbedTextExtentA
GetMenuStringA
GetDesktopWindow
GetDlgItem
GetForegroundWindow
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
LoadCursorA
SetCursor
GetDC
DrawIconEx
FillRect
SendMessageA
SetWindowPos
MessageBoxA
ReleaseCapture
GetCursorPos
GetWindowTextLengthA
CharUpperA
BeginPaint
EndPaint
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
GetClassLongA
CreateWindowExA
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
CheckMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetSysColorBrush
IsRectEmpty
ReleaseDC
IsChild
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WaitForInputIdle
TrackPopupMenu
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
TabbedTextOutA
GetFocus
DrawEdge
DispatchMessageA
atl
ord42
gdi32
GetStockObject
GetDeviceCaps
ScaleWindowExtEx
GetClipBox
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
CreateBitmap
DeleteObject
DeleteDC
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
SaveDC
SetWindowOrgEx
SetBkMode
MoveToEx
LineTo
SetTextColor
GetTextMetricsA
OffsetRgn
FrameRgn
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetPixel
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
FillRgn
CreateBrushIndirect
CreateBitmap
SelectObject
PatBlt
CreateRectRgn
CombineRgn
CreateSolidBrush
CreateFontIndirectA
GetStockObject
GetObjectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreatePenIndirect
RestoreDC
GetViewportExtEx
GetDeviceCaps
ExtSelectClipRgn
GetTextExtentPoint32A
RoundRect
GetCurrentObject
DPtoLP
LPtoDP
Rectangle
Ellipse
SetPixelV
CreateCompatibleDC
GetPixel
BitBlt
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExcludeClipRect
CreatePen
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
ImageList_DrawIndirect
ImageList_Read
ImageList_Create
ImageList_Destroy
ord17
ImageList_SetBkColor
_TrackMouseEvent
ImageList_Draw
ImageList_AddMasked
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_GetIcon
ImageList_Duplicate
shlwapi
PathFileExistsA
advapi32
LookupPrivilegeValueA
RegCreateKeyExA
AdjustTokenPrivileges
RegSetValueExA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueA
CryptReleaseContext
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextA
RegCreateKeyExA
CryptGetHashParam
winmm
waveOutUnprepareHeader
waveOutRestart
timeKillEvent
timeSetEvent
midiStreamRestart
midiStreamClose
midiOutReset
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
ws2_32
ntohl
accept
getpeername
recv
ioctlsocket
inet_ntoa
WSAStartup
WSACleanup
select
send
closesocket
WSAAsyncSelect
recvfrom
rasapi32
RasGetConnectStatusA
RasHangUpA
msimg32
GradientFill
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Shell_NotifyIconA
ole32
OleUninitialize
CLSIDFromString
CoCreateInstance
OleRun
CLSIDFromProgID
OleInitialize
oleaut32
VariantClear
VariantChangeType
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElement
VariantCopyInd
VariantInit
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SafeArrayPutElement
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantCopy
UnRegisterTypeLi
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
ChooseColorA
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 344KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ