Behavioral task
behavioral1
Sample
b97f3f5413623be915bf26f25265a1f2f91319109e559aef900c3d88542f2fb7.exe
Resource
win7-20240220-en
General
-
Target
b97f3f5413623be915bf26f25265a1f2f91319109e559aef900c3d88542f2fb7
-
Size
15.2MB
-
MD5
4ccb53b9a0745b170dfb21aecde70b92
-
SHA1
f43cef2e9d9f2ec95e45af669cbb0b742be52c2c
-
SHA256
b97f3f5413623be915bf26f25265a1f2f91319109e559aef900c3d88542f2fb7
-
SHA512
e92b2541558cb29bfbcaee84a3c4153e3a29512da6fac124d787df963c8c3e633a32d0f41b56d4f98c1f8fb002630a49d72e568bc1aa978161be374ab7ff93e4
-
SSDEEP
196608:DgSX4h5RgYLVr0SVi3GxdnwN8bhCgmsrpW9kElNmjd5xNoI:D9eWFSVi3GxdnwGbprAvmjd5xNoI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b97f3f5413623be915bf26f25265a1f2f91319109e559aef900c3d88542f2fb7
Files
-
b97f3f5413623be915bf26f25265a1f2f91319109e559aef900c3d88542f2fb7.exe windows:4 windows x86 arch:x86
8fbb8df7c2f435b1fd3b68ed4204948b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetWaitableTimer
VirtualProtect
RtlMoveMemory
GetProcAddress
lstrcpynA
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
CreateWaitableTimerA
HeapFree
IsBadReadPtr
GetTickCount
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LoadLibraryA
LCMapStringA
CreateThread
HeapReAlloc
GetModuleHandleExA
user32
CreateDialogIndirectParamA
UpdateWindow
SendMessageA
DestroyWindow
PostQuitMessage
wsprintfA
GetDlgItem
ShowWindow
SetWindowLongA
GetWindowRect
ScreenToClient
SetWindowPos
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
MsgWaitForMultipleObjects
SetWindowTextA
msvcrt
??2@YAPAXI@Z
__CxxFrameHandler
strncmp
memmove
modf
realloc
strchr
strrchr
atof
atoi
_ftol
sprintf
srand
free
malloc
_atoi64
??3@YAXPAX@Z
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 232KB - Virtual size: 583KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp3 Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.evmp Size: 804KB - Virtual size: 800KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE