Behavioral task
behavioral1
Sample
8115ebe52c2bbac66006eab790e26882a7901a5db84c6c5ab0f5c934f62b23dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8115ebe52c2bbac66006eab790e26882a7901a5db84c6c5ab0f5c934f62b23dd.exe
Resource
win10v2004-20240426-en
General
-
Target
8115ebe52c2bbac66006eab790e26882a7901a5db84c6c5ab0f5c934f62b23dd
-
Size
524KB
-
MD5
33053f5c5d0da5fbc74f1d12fbd4d74e
-
SHA1
0c2ad321da081c9e31b9cc0c8a3876d1513b45c8
-
SHA256
8115ebe52c2bbac66006eab790e26882a7901a5db84c6c5ab0f5c934f62b23dd
-
SHA512
d782ec34b8181f8cd9bd46fa76d713e40a758d40fe2d57a23c823bfca5ec49015bf4acf52f7926093d16007d6c4aa08311d4f532448ab6a498c6693be2808f8f
-
SSDEEP
6144:Zw0m8kZHU0biu/EImb9C5u1wWxclQMgMxn0nUh2q/+KmC/v0nl:Nm8H0biu8Imb9efQMgMxVH+Km4
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8115ebe52c2bbac66006eab790e26882a7901a5db84c6c5ab0f5c934f62b23dd
Files
-
8115ebe52c2bbac66006eab790e26882a7901a5db84c6c5ab0f5c934f62b23dd.exe windows:4 windows x86 arch:x86
aebfdbf8b5498e1bf025874461ce8941
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
FreeLibrary
GetCommandLineA
SetCurrentDirectoryA
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileSize
RemoveDirectoryA
SetFilePointer
GetTempPathA
GetTickCount
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateDirectoryA
GetLocalTime
GetEnvironmentVariableA
GetStartupInfoA
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualFree
GetProcAddress
LoadLibraryA
VirtualAlloc
lstrcpynA
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
CreateDirectoryW
SetLastError
GetNativeSystemInfo
GetCurrentProcessId
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessA
CreatePipe
GetCurrentThreadId
DeleteFileA
TerminateThread
GetExitCodeThread
SetWaitableTimer
CreateWaitableTimerA
lstrcpyn
TerminateProcess
Process32NextW
Sleep
Process32FirstW
QueryDosDeviceW
OpenProcess
GetTempPathW
lstrlenW
Module32First
WideCharToMultiByte
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemInfo
GetVersionExA
RtlMoveMemory
GetComputerNameA
CloseHandle
GetQueuedCompletionStatus
CreateIoCompletionPort
GetCurrentProcess
LocalFree
LocalAlloc
WaitForSingleObject
CreateThread
MoveFileA
MultiByteToWideChar
DeleteCriticalSection
lstrlenA
SetSystemPowerState
GetLastError
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
user32
PostQuitMessage
SendMessageA
SetCursor
GetWindowLongA
GetLastActivePopup
SetWindowsHookExA
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
ExitWindowsEx
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
UnregisterClassA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
IsWindowEnabled
GetParent
EnableWindow
GetForegroundWindow
PostMessageA
GetWindowThreadProcessId
GetWindowTextA
IsWindowVisible
MsgWaitForMultipleObjects
GetDesktopWindow
GetWindowTextLengthA
FindWindowExA
SetForegroundWindow
GetActiveWindow
ReleaseDC
GetCursorInfo
GetIconInfo
DrawIcon
ClientToScreen
SetCursorPos
WindowFromPoint
GetCursorPos
GetFocus
GetAncestor
AttachThreadInput
SetActiveWindow
GetSystemMetrics
GetTopWindow
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessageA
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
PeekMessageA
CallWindowProcA
PostMessageW
KillTimer
SetTimer
MapVirtualKeyA
SendInput
advapi32
GetUserNameA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathW
ShellExecuteA
ws2_32
send
gethostbyname
setsockopt
WSACleanup
connect
htons
inet_addr
socket
closesocket
recv
WSAStartup
shlwapi
PathIsDirectoryW
PathFileExistsA
psapi
GetProcessImageFileNameW
gdi32
SetTextColor
SetMapMode
SetBkColor
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
RestoreDC
SaveDC
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
DeleteObject
BitBlt
GdiFlush
GetObjectA
GetStockObject
CreateBitmap
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE