Behavioral task
behavioral1
Sample
4c2c88b793777010d2dfb22bb6f5523f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4c2c88b793777010d2dfb22bb6f5523f.exe
Resource
win10v2004-20240508-en
General
-
Target
4c2c88b793777010d2dfb22bb6f5523f.bin
-
Size
1.0MB
-
MD5
4c2c88b793777010d2dfb22bb6f5523f
-
SHA1
eca94afd48730f3dd71adefc5a2c9ff5f9a22e70
-
SHA256
bcc016107407463c16cb01dd02fae3300b35efb17ad8e97968f97611b8b93099
-
SHA512
0e4914fa0489c23278dd61408b2d67703a68f6cd8f5c7667fad7885b0580908de0d6d45a99e6d2cd31fb1bcfc74648187663a8252cee8610c01243e2c6d6f040
-
SSDEEP
24576:fsWgiZ62cLb7JDx44k3GwHiqBxZo60jpbqp:fDcH9D6JPvBxZo6epbqp
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c2c88b793777010d2dfb22bb6f5523f.bin
Files
-
4c2c88b793777010d2dfb22bb6f5523f.bin.exe windows:4 windows x86 arch:x86
910c6edf80457cf7b9a181bbd24ddddb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapFree
HeapDestroy
HeapCreate
VirtualFree
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
GetTickCount
lstrlenW
WideCharToMultiByte
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetCurrentThreadId
GetModuleHandleA
GetProcAddress
lstrcpyn
CreateWaitableTimerA
SetWaitableTimer
LocalAlloc
LocalFree
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
MultiByteToWideChar
GetFileSize
ReadFile
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
GetStdHandle
OpenEventA
TerminateProcess
RtlUnwind
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
SetLastError
InterlockedIncrement
lstrcpyA
lstrcatA
WritePrivateProfileStringA
InterlockedDecrement
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
lstrlenA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
ws2_32
ioctlsocket
closesocket
connect
inet_addr
shutdown
htons
setsockopt
socket
select
WSAStartup
user32
AdjustWindowRectEx
IsWindow
IsWindowVisible
EndDialog
CreateDialogIndirectParamA
DestroyMenu
PostThreadMessageA
UnregisterClassA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
SetActiveWindow
AttachThreadInput
OpenIcon
IsIconic
SetWindowPos
GetWindowTextW
GetWindowTextLengthW
GetClassNameA
GetParent
GetWindowThreadProcessId
FindWindowExA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
SetWindowsHookExA
GetCursorPos
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
GetSysColor
advapi32
RegCreateKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
gdi32
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetObjectA
GetStockObject
CreateBitmap
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
shlwapi
PathFileExistsA
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 920KB - Virtual size: 994KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ