Behavioral task
behavioral1
Sample
ae97e983ff6df320c4a0ee94a1dd20055ddf034ef21096d7e2cb45a5aa5485ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae97e983ff6df320c4a0ee94a1dd20055ddf034ef21096d7e2cb45a5aa5485ba.exe
Resource
win10v2004-20240226-en
General
-
Target
ae97e983ff6df320c4a0ee94a1dd20055ddf034ef21096d7e2cb45a5aa5485ba
-
Size
3.1MB
-
MD5
e72eaf0f29c54ca97a8a629737b4b104
-
SHA1
97fb0e090a9d5bde5605c7614e06fcb3b3a1d7b6
-
SHA256
ae97e983ff6df320c4a0ee94a1dd20055ddf034ef21096d7e2cb45a5aa5485ba
-
SHA512
bed4a94e45d3a414482f7a464db2d7e17006e1f5847b11f935f4a7a6323888b4e5effc959cedc1d1fbdfb33b5c45237b054f3ae93c23a7005bff522a004d7c22
-
SSDEEP
49152:SHjgXpdFkwFwvYuty9wtqZQdh7NDYd2gd:+j8pdMC9wtqZCaX
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae97e983ff6df320c4a0ee94a1dd20055ddf034ef21096d7e2cb45a5aa5485ba
Files
-
ae97e983ff6df320c4a0ee94a1dd20055ddf034ef21096d7e2cb45a5aa5485ba.exe windows:4 windows x86 arch:x86
47a8fbabbae0dadd9c8a70f5d0d386d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
LocalFree
LocalAlloc
TerminateProcess
VirtualAlloc
GetVolumeInformationA
LeaveCriticalSection
LoadLibraryW
SetThreadContext
GetThreadContext
SuspendThread
CreateEventA
Sleep
FormatMessageA
IsDBCSLeadByteEx
OpenMutexA
FileTimeToSystemTime
GetLocalTime
GetProcessTimes
CopyFileA
GetVersionExA
GetWindowsDirectoryA
GetCurrentThread
VirtualProtectEx
DeviceIoControl
IsBadReadPtr
GetThreadTimes
CreatePipe
CreateProcessA
PeekNamedPipe
ReadFile
GetExitCodeProcess
WriteFile
GetModuleFileNameW
CreateMutexA
GetModuleFileNameA
InitializeCriticalSection
TerminateThread
RtlFillMemory
OpenEventA
InterlockedDecrement
OpenFileMappingA
CreateFileMappingA
LoadLibraryA
GetProcAddress
GetCommandLineA
GetFileAttributesA
RemoveDirectoryA
SetLocalTime
WritePrivateProfileStringA
GetStartupInfoA
SetFileAttributesA
CreateDirectoryA
FindClose
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
GetFileSize
CreateFileA
MapViewOfFile
SetHandleCount
GetSystemDirectoryA
ReleaseMutex
Thread32Next
Thread32First
DeleteFileA
GetLongPathNameA
Module32Next
Module32First
SetEndOfFile
SetFilePointer
GetLastError
GetModuleHandleW
VirtualQueryEx
MoveFileA
SetWaitableTimer
CreateWaitableTimerA
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStdHandle
GetFileType
SetStdHandle
HeapSize
GetACP
GetSystemTime
RaiseException
GetUserDefaultLCID
HeapReAlloc
ExitProcess
GetTickCount
PostQueuedCompletionStatus
GetQueuedCompletionStatus
GetSystemInfo
CreateIoCompletionPort
HeapCreate
GetComputerNameA
VirtualFree
lstrcpynA
GetShortPathNameA
InterlockedIncrement
GetVersion
IsBadWritePtr
SetProcessWorkingSetSize
DebugActiveProcess
HeapDestroy
RtlUnwind
GetOEMCP
GetCPInfo
GetProcessVersion
FindResourceA
LoadResource
LockResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
MulDiv
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
DeleteCriticalSection
FreeLibrary
LoadLibraryExA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenThread
IsDebuggerPresent
GetModuleHandleA
HeapFree
GetTimeFormatA
GetDateFormatA
UnmapViewOfFile
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
ResumeThread
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
FlushFileBuffers
lstrcpyA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
SetLastError
GetTimeZoneInformation
GlobalSize
GlobalUnlock
GlobalLock
GlobalAlloc
LCMapStringA
GetTempPathA
EnterCriticalSection
CreateThread
lstrcpyn
VirtualFreeEx
RtlMoveMemory
GetExitCodeThread
CreateRemoteThread
VirtualAllocEx
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
ReadProcessMemory
OpenProcess
GetCurrentProcess
HeapAlloc
GetProcessHeap
WriteProcessMemory
lstrlenA
ExitProcess
GlobalSize
GlobalFree
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
InterlockedExchange
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
GetFileSize
GetCurrentProcess
TerminateProcess
OpenProcess
GetSystemDirectoryA
SetLastError
GetTimeZoneInformation
GetVersion
TerminateThread
FileTimeToSystemTime
CreateMutexA
ReleaseMutex
SuspendThread
InterlockedIncrement
InterlockedDecrement
GetSystemInfo
IsProcessorFeaturePresent
lstrcmpiA
LocalFree
FileTimeToLocalFileTime
lstrcpynA
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
LocalAlloc
DeleteCriticalSection
TlsAlloc
GlobalHandle
TlsFree
TlsSetValue
LocalReAlloc
TlsGetValue
GetFileTime
GetCurrentThread
GlobalFlags
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
HeapSize
GetACP
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
user32
RemovePropA
GetPropA
IsIconic
ShowWindowAsync
ClipCursor
EnableWindow
SwapMouseButton
GetKeyboardState
CharUpperA
PostThreadMessageA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
ReleaseCapture
CreateWindowStationA
GetKeyState
SendInput
PostQuitMessage
SetCursor
IsWindowEnabled
GetLastActivePopup
ValidateRect
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnregisterClassA
PtInRect
DestroyWindow
SetCursorPos
TabbedTextOutA
DrawTextA
GrayStringA
SendDlgItemMessageA
IsDialogMessageA
GetWindowPlacement
GetMessagePos
GetMessageTime
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
SetClassLongA
LoadCursorFromFileA
InvalidateRect
CallWindowProcW
ShowWindow
keybd_event
SetPropA
CreateWindowExA
IsZoomed
UpdateLayeredWindow
DefWindowProcA
FlashWindowEx
SetWindowTextA
EnumThreadWindows
GetCaretPos
SetActiveWindow
GetWindowLongA
SetLayeredWindowAttributes
SetForegroundWindow
GetDlgCtrlID
FlashWindow
UnloadKeyboardLayout
SystemParametersInfoA
GetKeyboardLayout
ActivateKeyboardLayout
GetKeyboardLayoutNameA
LoadKeyboardLayoutA
MessageBoxA
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
MapVirtualKeyA
EnumChildWindows
CharLowerA
RegisterWindowMessageA
ChangeDisplaySettingsA
EnumDisplaySettingsA
SetWindowLongA
GetCursorPos
SetFocus
OpenIcon
UpdateWindow
MoveWindow
GetParent
SetParent
GetGUIThreadInfo
SetWindowLongW
IsWindowVisible
GetWindow
MsgWaitForMultipleObjects
GetDoubleClickTime
ReleaseDC
PrintWindow
GetDC
IsWindow
ClientToScreen
KillTimer
CallWindowProcA
PostMessageA
SendMessageA
GetAsyncKeyState
GetDesktopWindow
ExitWindowsEx
FindWindowA
WindowFromPoint
ShowCursor
mouse_event
GetForegroundWindow
GetAncestor
GetWindowTextA
GetClientRect
SetTimer
wvsprintfA
GetWindowThreadProcessId
AttachThreadInput
GetFocus
GetWindowInfo
EnumWindows
GetWindowTextLengthA
GetClassNameA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
SendMessageTimeoutA
FindWindowExA
GetDlgItem
SetWindowPos
SetCapture
GetMenuItemCount
GetWindowRect
GetKeyboardLayoutList
GetMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
SetMenu
LoadIconA
GetDesktopWindow
GetClassNameA
GetWindowThreadProcessId
FindWindowA
GetDlgItem
GetWindowTextA
SetWindowTextA
GetForegroundWindow
CallWindowProcA
CreateWindowExA
RegisterHotKey
UnregisterHotKey
GetWindowTextLengthA
OffsetRect
GetWindowDC
BeginPaint
GetWindow
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
PeekMessageA
IsIconic
SetFocus
TranslateMessage
GetActiveWindow
IsWindowVisible
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
UnregisterClassA
GetSysColorBrush
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
DestroyIcon
EndPaint
PtInRect
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
GetParent
GetFocus
GetClientRect
InvalidateRect
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
IsChild
ReleaseDC
IsRectEmpty
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
CharUpperA
EnableWindow
GetMessageA
gdi32
SetWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ScaleWindowExtEx
GetClipBox
SetMapMode
GetDeviceCaps
PtVisible
ExtTextOutA
Escape
ScaleViewportExtEx
GetStockObject
GetObjectA
RectVisible
CreateRectRgn
CreateDIBSection
TextOutA
SetTextColor
SetBkMode
CreateFontIndirectA
GetTextExtentPointA
DeleteDC
DeleteObject
GetPixel
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateBitmap
SaveDC
RestoreDC
SetBkColor
CreateBitmap
CreateDCA
CreateCompatibleBitmap
GetPolyFillMode
GetStretchBltMode
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
DeleteObject
SelectClipRgn
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
Ellipse
Rectangle
LPtoDP
DPtoLP
SelectObject
GetObjectA
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
GetWindowExtEx
CreateCompatibleDC
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetROP2
Escape
GetTextMetricsA
GetDeviceCaps
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
TranslateCharsetInfo
CreateFontA
SetBkColor
CreateRectRgnIndirect
comdlg32
ChooseColorA
GetFileTitleA
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
wsock32
WSACleanup
getsockname
sendto
ord1140
ord1141
ord1142
closesocket
ntohs
inet_addr
accept
recvfrom
connect
getpeername
bind
recv
setsockopt
ioctlsocket
socket
htons
WSAStartup
select
send
listen
wininet
InternetGetConnectedState
InternetTimeFromSystemTime
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetTimeToSystemTime
FtpOpenFileA
InternetReadFile
HttpQueryInfoA
FtpGetFileSize
InternetSetCookieA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetConnectA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
shell32
SHGetPathFromIDListA
SHChangeNotify
ShellExecuteA
SHFileOperationA
SHBrowseForFolderA
SHGetSpecialFolderPathA
SHGetFileInfoA
SHGetSpecialFolderLocation
DragAcceptFiles
DragFinish
Shell_NotifyIconA
ShellExecuteA
DragQueryFileA
ole32
CLSIDFromString
OleUninitialize
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoCreateInstance
OleRun
OleUninitialize
CoInitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleInitialize
dbghelp
MakeSureDirectoryPathExists
winhttp
WinHttpTimeFromSystemTime
WinHttpTimeToSystemTime
shlwapi
PathIsDirectoryA
PathIsSystemFolderA
PathRenameExtensionA
PathMakeSystemFolderA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
PathRemoveBlanksA
StrTrimA
PathUnmakeSystemFolderA
PathIsDirectoryEmptyA
oleaut32
VariantCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
SafeArrayCreate
RegisterTypeLi
SafeArrayAllocDescriptor
LoadTypeLi
VarR8FromBool
VarR8FromCy
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantInit
VariantChangeType
VariantClear
SafeArrayAllocData
LHashValOfNameSys
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
advapi32
RegCloseKey
RegDeleteKeyA
RegOpenKeyA
LookupAccountSidA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
RegCreateKeyA
CryptAcquireContextA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
GetUserNameA
RegSetValueExA
RegDeleteValueA
CryptCreateHash
RegEnumValueA
RegFlushKey
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
RegOpenKeyA
RegCreateKeyExA
RegQueryValueExA
gdiplus
GdipDrawRectangle
GdiplusStartup
GdipDrawPath
GdipDeletePath
GdipDeletePen
GdipResetClip
GdipDeleteGraphics
GdipCreateFromHDC
GdipSetClipHrgn
GdipSetSmoothingMode
GdipCreatePen1
psapi
GetModuleFileNameExA
ws2_32
WSAEnumNetworkEvents
WSACloseEvent
WSAWaitForMultipleEvents
WSACreateEvent
WSASend
WSARecv
WSASocketA
WSAEventSelect
ntohl
accept
getpeername
recv
inet_ntoa
ioctlsocket
recvfrom
WSAStartup
WSACleanup
select
send
closesocket
WSAAsyncSelect
oledlg
ord8
rasapi32
RasGetConnectStatusA
RasHangUpA
RasGetConnectStatusA
RasHangUpA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
winmm
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
midiStreamProperty
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
waveOutRestart
waveOutClose
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 588KB - Virtual size: 877KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ