kk5070561
Behavioral task
behavioral1
Sample
6f5785f5ae4081bb8a107d03b444d4d85f017b25e8f5af988465e101caec4f9d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f5785f5ae4081bb8a107d03b444d4d85f017b25e8f5af988465e101caec4f9d.dll
Resource
win10v2004-20240226-en
General
-
Target
6f5785f5ae4081bb8a107d03b444d4d85f017b25e8f5af988465e101caec4f9d
-
Size
3.5MB
-
MD5
3e7dc4ae8a00895b91e91f40d4d85f75
-
SHA1
f495fae34f8debc0a791fae75a4d54f000876527
-
SHA256
6f5785f5ae4081bb8a107d03b444d4d85f017b25e8f5af988465e101caec4f9d
-
SHA512
14693d6e2af4f8bb2cf0ca70a0cd60faa4541bc149c65159f5240ce5642fa8c5a8e566caf95fa219cbfd5459f677441c4fde0e719ade89229b2b06d8fe8cbf61
-
SSDEEP
49152:GC7fhv4L3fUDXYIRswVIu6GLmz53wJWqI2NpzyAlA4Fd86lR:NferfUDIIy4LoE5N
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f5785f5ae4081bb8a107d03b444d4d85f017b25e8f5af988465e101caec4f9d
Files
-
6f5785f5ae4081bb8a107d03b444d4d85f017b25e8f5af988465e101caec4f9d.dll windows:4 windows x86 arch:x86
483c5918466c2dbfef870ba3ca94c970
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapCreate
GetVersionExA
DuplicateHandle
Module32Next
DeviceIoControl
CreateFileA
GetLastError
Module32First
GetCurrentThreadId
EnterCriticalSection
DeleteCriticalSection
CreateProcessA
PeekNamedPipe
lstrlenW
lstrcpyA
RtlZeroMemory
VirtualQueryEx
ReadProcessMemory
CreateRemoteThread
FreeLibrary
LoadLibraryExA
VirtualQuery
lstrcpynW
MultiByteToWideChar
SetProcessAffinityMask
GetExitCodeThread
InitializeCriticalSection
LeaveCriticalSection
TerminateThread
GetCurrentProcess
GetWindowsDirectoryA
CreateThread
GetProcAddress
OpenThread
RtlMoveMemory
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
LCMapStringA
GetModuleFileNameA
GetTickCount
GetStartupInfoA
ReadFile
GetFileSize
DeleteFileA
WriteFile
GetUserDefaultLCID
SetWaitableTimer
GetDiskFreeSpaceExA
GetNativeSystemInfo
GetCurrentDirectoryA
SetFileAttributesA
Sleep
SetCurrentDirectoryA
FindNextFileA
FindFirstFileA
FindClose
GetCommandLineA
LoadLibraryA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
lstrcpyn
VirtualAllocEx
WriteProcessMemory
VirtualProtect
WideCharToMultiByte
GetModuleHandleA
CloseHandle
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CheckRemoteDebuggerPresent
VirtualFreeEx
IsWow64Process
lstrcpynA
WaitForSingleObject
CopyFileA
GetTempFileNameA
GetSystemDirectoryA
GetTempPathA
CreateWaitableTimerA
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
SetFilePointer
LCMapStringW
GetFileType
GetStdHandle
SetHandleCount
GetACP
HeapSize
RaiseException
GetLocalTime
GetSystemTime
RtlUnwind
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
LockFile
FlushFileBuffers
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
InterlockedDecrement
InterlockedIncrement
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetStartupInfoA
SuspendThread
TerminateThread
ReleaseMutex
CreateMutexA
GetVersion
GetTimeZoneInformation
SetLastError
TerminateProcess
GetFileSize
CloseHandle
WaitForSingleObject
GetTickCount
GetCommandLineA
MulDiv
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetCurrentDirectoryA
DeleteFileA
GetFileAttributesA
FindClose
FindFirstFileA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateEventA
CreateThread
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
GetCurrentProcess
SetFilePointer
shlwapi
StrToIntExA
StrToIntExW
StrToIntW
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
ws2_32
htons
WSACleanup
WSAStartup
inet_ntoa
WSACleanup
closesocket
WSAAsyncSelect
recvfrom
ioctlsocket
ntohl
accept
getpeername
recv
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
user32
SetTimer
ShowWindow
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
MsgWaitForMultipleObjects
SendMessageA
WindowFromPoint
GetCursorPos
ClientToScreen
RegisterWindowMessageA
EnumWindows
GetAncestor
MessageBoxA
CallWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
GetMessageA
GetForegroundWindow
FindWindowA
GetSystemMetrics
GetParent
GetDlgItem
wsprintfA
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
SetActiveWindow
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
FillRect
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
GetForegroundWindow
GetDesktopWindow
GetClassNameA
GetDlgItem
GetWindowTextA
IsRectEmpty
ReleaseDC
IsChild
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
GetClientRect
SetCursorPos
LoadCursorA
SetCursor
GetSubMenu
GetDC
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
GetFocus
UnregisterClassA
LoadStringA
GetSysColorBrush
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
WindowFromPoint
advapi32
ControlService
DeleteService
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
StartServiceA
OpenServiceA
CreateServiceA
OpenSCManagerA
CreateProcessAsUserA
CryptGetHashParam
CryptHashData
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Shell_NotifyIconA
ole32
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
OleRun
CLSIDFromString
OleUninitialize
OleInitialize
CLSIDFromString
psapi
GetModuleInformation
oleaut32
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayAllocData
VariantChangeType
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
SafeArrayCreate
VarR8FromBool
VarR8FromCy
SysFreeString
SafeArrayGetElemsize
VariantCopy
SafeArrayGetUBound
SysAllocString
SafeArrayUnaccessData
VariantInit
SafeArrayAllocDescriptor
VariantClear
SafeArrayDestroy
SafeArrayAccessData
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
winmm
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
midiStreamClose
midiOutReset
midiStreamStop
midiStreamOut
midiOutPrepareHeader
midiStreamProperty
midiStreamOpen
waveOutUnprepareHeader
waveOutGetNumDevs
waveOutRestart
midiStreamRestart
midiOutUnprepareHeader
waveOutOpen
gdi32
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextMetricsA
SetBkColor
CreateRectRgnIndirect
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBitmap
SelectObject
GetObjectA
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
GetTextExtentPoint32A
RoundRect
GetCurrentObject
DPtoLP
ExtSelectClipRgn
GetViewportExtEx
LPtoDP
Rectangle
Ellipse
CreateCompatibleDC
BitBlt
StartPage
StartDocA
DeleteDC
EndDoc
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ImageList_Destroy
ord17
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
ChooseColorA
Exports
Exports
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ