Behavioral task
behavioral1
Sample
cdd4edefe0ea1de35fb602b603124e3c63b0a9a904fe7d084ba90e11326318a8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
cdd4edefe0ea1de35fb602b603124e3c63b0a9a904fe7d084ba90e11326318a8.exe
Resource
win11-20240508-en
General
-
Target
cdd4edefe0ea1de35fb602b603124e3c63b0a9a904fe7d084ba90e11326318a8
-
Size
1.1MB
-
MD5
138aa1d00cf7a351668d3804fa8d0b69
-
SHA1
d7ec059252cb9a84d872f4f7221d292d7d5dfea2
-
SHA256
cdd4edefe0ea1de35fb602b603124e3c63b0a9a904fe7d084ba90e11326318a8
-
SHA512
c4ac6b9609ec6a5ed065f380d53a7601f857ab53f1cba915ad3b2e53b3c96e0b3c13e9aeb8854ff7f377e770c36656fb3dba68a2f4e4b5cd827f8a3f6af078de
-
SSDEEP
24576:wlgBaH2S+9N+HG/VM/WxyLnsTtyxqe0XdUP6G7n6nL2aXBRWgMabw:wlgBaH2Sr/WsAoSmNcRWgMabw
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdd4edefe0ea1de35fb602b603124e3c63b0a9a904fe7d084ba90e11326318a8
Files
-
cdd4edefe0ea1de35fb602b603124e3c63b0a9a904fe7d084ba90e11326318a8.exe windows:4 windows x86 arch:x86
8dcc2aacd755ec519d4afd7964d2af81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
kernel32
lstrcpyn
FindFirstFileW
FindClose
VirtualQueryEx
lstrcpynA
CreateThread
CreateWaitableTimerA
SetWaitableTimer
GetModuleHandleA
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
CreateFileA
ResetEvent
WriteFile
CancelIo
ReadFile
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
DeleteFileA
GetModuleFileNameA
Sleep
GetUserDefaultLCID
GlobalUnlock
GetTickCount
SetFileAttributesA
GetPrivateProfileStringA
LCMapStringA
GetCommandLineA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
GetTempPathA
GetFileAttributesA
RtlMoveMemory
GlobalLock
GetSystemDirectoryA
InitializeCriticalSection
GetWindowsDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFilePointer
UnmapViewOfFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
CreateDirectoryA
GlobalAlloc
WideCharToMultiByte
lstrlenW
GetCurrentDirectoryW
WaitForSingleObject
MultiByteToWideChar
LocalFree
LocalAlloc
TerminateProcess
OpenProcess
GetCurrentProcess
GetCurrentProcessId
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
DeleteCriticalSection
GetFileSize
SetFileTime
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
WriteProcessMemory
GetProcAddress
LoadLibraryA
lstrcpyn
lstrcatA
SetHandleCount
GetStringTypeW
IsBadCodePtr
SetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetModuleHandleA
GetStdHandle
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetCommandLineA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
GetProcessVersion
FormatMessageA
LoadResource
LockResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
SetLastError
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
MulDiv
GetVersion
lstrcpyA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
CloseHandle
GetModuleFileNameA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetStringTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
Sleep
FreeLibrary
LCMapStringA
RtlFillMemory
WideCharToMultiByte
lstrcpynA
MultiByteToWideChar
FindResourceA
ole32
CLSIDFromString
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
OleFlushClipboard
CoInitialize
OleInitialize
OleIsCurrentClipboard
OleUninitialize
CoRevokeClassObject
CoRegisterMessageFilter
CoInitialize
CoUninitialize
OleRun
CoFreeUnusedLibraries
CoCreateInstance
CLSIDFromProgID
CoUninitialize
user32
GetDC
ReleaseDC
OpenClipboard
EmptyClipboard
CloseClipboard
GetForegroundWindow
UnhookWindowsHookEx
GetCursorInfo
GetIconInfo
DrawIcon
MsgWaitForMultipleObjects
SendInput
SetWindowsHookExA
SetClipboardData
GetCursorPos
PeekMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
MessageBoxTimeoutA
CallNextHookEx
MessageBoxA
GetWindowRect
WindowFromPoint
CallWindowProcA
GetWindow
SendMessageTimeoutA
wsprintfA
DispatchMessageA
TranslateMessage
RegisterWindowMessageA
GetMessageA
PeekMessageA
GetCursorPos
GetClassNameA
EnumChildWindows
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetMenuCheckMarkDimensions
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
RegisterClipboardFormatA
UnhookWindowsHookEx
UnregisterClassA
PtInRect
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
EndDialog
CreateDialogIndirectParamA
DestroyMenu
PostThreadMessageA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CopyRect
ShowWindow
GetSubMenu
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
GetDlgCtrlID
advapi32
OpenProcessToken
AllocateAndInitializeSid
GetTokenInformation
EqualSid
FreeSid
RegCloseKey
RegOpenKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegSetValueExA
RegCreateKeyExA
gdi32
GetDeviceCaps
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
GetDIBits
GetDIBColorTable
StretchBlt
GetBitmapBits
DeleteObject
CreateCompatibleBitmap
DeleteDC
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
ScaleWindowExtEx
SetViewportOrgEx
GetClipBox
PtVisible
RectVisible
TextOutA
SetMapMode
Escape
GetObjectA
CreateBitmap
DeleteObject
SaveDC
GetDeviceCaps
RestoreDC
DeleteDC
SelectObject
GetStockObject
SetBkColor
OffsetViewportOrgEx
ExtTextOutA
SetTextColor
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SysFreeString
VariantCopy
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
SafeArrayGetUBound
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExW
winhttp
WinHttpCrackUrl
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpOpenRequest
WinHttpQueryHeaders
WinHttpSetCredentials
WinHttpCloseHandle
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpCheckPlatform
wininet
DeleteUrlCacheEntry
urlmon
URLDownloadToFileA
shlwapi
PathFindExtensionA
PathFileExistsA
setupapi
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
oleacc
ObjectFromLresult
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
oledlg
ord8
msvcrt
_except_handler3
tolower
__CxxFrameHandler
strncmp
memmove
realloc
strrchr
modf
_CIfmod
_CIpow
floor
strtod
rand
srand
atoi
atof
strchr
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
free
_ftol
_i64toa
calloc
_mbsstr
div
atol
sprintf
Sections
.text Size: 730KB - Virtual size: 729KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 331KB - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE