Behavioral task
behavioral1
Sample
ecb97b34b36042e868413237cd33bdb5af03dc03780b18d37d6d5e1cfc27d930.exe
Resource
win7-20231129-en
General
-
Target
ecb97b34b36042e868413237cd33bdb5af03dc03780b18d37d6d5e1cfc27d930
-
Size
656KB
-
MD5
2d18b77fae47c5958860fe4a6a21c497
-
SHA1
b6adc9419d3002194fc67444fdff3ec2e03bbe72
-
SHA256
ecb97b34b36042e868413237cd33bdb5af03dc03780b18d37d6d5e1cfc27d930
-
SHA512
cd6f52c94cd2d50bee67c11ae2bf320097b8c2fc88e79346531ae458ad473aca809008f17e5a8985e3b1a8459f9393f6de2c9acc551508a14f3a7500ad806dc5
-
SSDEEP
6144:m69WqSFr7wz4fo7bdgdztawypfrjwrNVySxn+:m69WNwwo7vlOQSV+
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecb97b34b36042e868413237cd33bdb5af03dc03780b18d37d6d5e1cfc27d930
Files
-
ecb97b34b36042e868413237cd33bdb5af03dc03780b18d37d6d5e1cfc27d930.exe windows:4 windows x86 arch:x86
a5e39730a46064c674b78ec9c3a95843
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
SetFilePointer
TerminateProcess
OpenProcess
Sleep
EnumResourceNamesA
LoadLibraryExA
lstrcpyA
SetLastError
lstrcatA
SizeofResource
LockResource
LoadResource
FindResourceA
Process32First
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GetTickCount
InterlockedIncrement
InterlockedDecrement
MulDiv
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
Process32Next
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LCMapStringA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CopyFileA
FindClose
SetFileAttributesA
FindFirstFileA
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetStartupInfoA
CreateProcessA
WaitForSingleObject
DeleteFileA
WriteFile
GetFileSize
ReadFile
CloseHandle
GetModuleFileNameA
CreateFileA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
EndUpdateResourceA
UpdateResourceA
RtlMoveMemory
lstrcpynW
BeginUpdateResourceA
user32
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
RegisterClassA
IsWindowVisible
GetWindowLongA
GetWindowTextA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
GetWindowThreadProcessId
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetClassNameA
SendMessageA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
SetActiveWindow
GetActiveWindow
IsWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
GetMessagePos
RegisterWindowMessageA
IsIconic
GetWindowPlacement
SetFocus
SetWindowPos
IsDialogMessageA
SendDlgItemMessageA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
PtInRect
SetWindowsHookExA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CLSIDFromProgID
CLSIDFromString
OleRun
CoRevokeClassObject
CoUninitialize
CoInitialize
OleFlushClipboard
CoCreateInstance
OleIsCurrentClipboard
CoRegisterMessageFilter
shlwapi
PathFileExistsA
gdi32
PtVisible
RestoreDC
SaveDC
CreateBitmap
RectVisible
Escape
GetObjectA
GetStockObject
ExtTextOutA
TextOutA
GetDeviceCaps
SelectObject
DeleteDC
DeleteObject
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
oledlg
ord8
oleaut32
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
VarR8FromBool
VarR8FromCy
SysFreeString
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
VariantClear
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantTimeToSystemTime
SafeArrayDestroy
SafeArrayGetDim
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 432KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ