Behavioral task
behavioral1
Sample
2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe
Resource
win7-20240419-en
General
-
Target
2024-06-11_3bab718d577a60b66fcf421437a24186_mafia
-
Size
1.3MB
-
MD5
3bab718d577a60b66fcf421437a24186
-
SHA1
1ade733cd947eda964a4bf6e10f398713bc321cf
-
SHA256
b807c789883ffd0a0b220b4bf214423f33c22d558ce2275b617cdbc8d7af4e58
-
SHA512
dacfe01e7c67dcc6244b0600fafac5bbc9dca7ab5b0491d9735637214f0163941e57d39da2eae8106e170d934882f0c01a32ec8745605c2eeafbfc3e9f93d03d
-
SSDEEP
24576:R1UGLrmwPVsjEkazzCm8pslRI4/iK6LfGJErGCkfp0sUPYud9mj1uRyRsGyz:Ru2jkaqm8pwOOiMeGPfp0sUPYu7UQq
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-11_3bab718d577a60b66fcf421437a24186_mafia
Files
-
2024-06-11_3bab718d577a60b66fcf421437a24186_mafia.exe windows:5 windows x86 arch:x86
3de9f24603dcb1035ffa9736c3f2f4ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
LCMapStringA
GetCommandLineA
GetTickCount
WritePrivateProfileStringA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
MulDiv
GetCurrentDirectoryA
GetVolumeInformationA
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetStartupInfoA
CreateProcessA
ExitProcess
CancelWaitableTimer
VirtualAlloc
VirtualFree
TryEnterCriticalSection
CreateEventA
WaitForMultipleObjects
SetEvent
HeapReAlloc
HeapDestroy
DeleteCriticalSection
FreeLibrary
SetCriticalSectionSpinCount
HeapCreate
lstrcpyn
RtlMoveMemory
GlobalMemoryStatusEx
GetProcessId
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
GetComputerNameA
MoveFileA
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
SetFilePointerEx
CreateFileA
CreateFileW
TlsSetValue
IsBadReadPtr
TlsGetValue
DeleteFileA
GetTempPathW
lstrlenW
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
HeapSize
TerminateProcess
SetThreadAffinityMask
HeapFree
InterlockedExchange
LeaveCriticalSection
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
SwitchToThread
InterlockedCompareExchange
EnterCriticalSection
CloseHandle
CreateThread
SetProcessDEPPolicy
HeapAlloc
GetProcessHeap
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
GetModuleHandleA
IsWow64Process
GetCurrentProcess
GetSystemInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetFilePointer
GetLastError
GetDriveTypeA
Sleep
lstrcpyA
lstrlenA
SetLastError
lstrcatA
QueryPerformanceCounter
GetVersion
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RtlUnwind
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualQuery
GetStringTypeW
LoadLibraryW
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalFree
lstrcpynA
LocalAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
LocalReAlloc
GlobalFlags
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
RtlMoveMemory
GetProcAddress
FreeLibrary
LoadLibraryA
VirtualProtectEx
LCMapStringA
IsBadReadPtr
GetEnvironmentVariableA
ExitProcess
user32
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
GetWindowPlacement
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
SetWindowsHookExA
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetActiveWindow
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetForegroundWindow
SetFocus
GetWindowThreadProcessId
ShowWindowAsync
PostMessageA
PostQuitMessage
MsgWaitForMultipleObjects
IsWindow
FindWindowExA
DestroyIcon
GetForegroundWindow
GetDC
FillRect
DrawIconEx
ReleaseDC
SendInput
GetSystemMetrics
MapVirtualKeyA
GetLastInputInfo
LoadImageA
EnumDisplaySettingsA
IsIconic
IsWindowVisible
GetWindowRect
GetClientRect
ClientToScreen
OpenClipboard
GetClipboardData
GetAncestor
CloseClipboard
EmptyClipboard
SetClipboardData
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetParent
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
SetWindowPos
AttachThreadInput
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetClassNameA
SendMessageA
GetCapture
BringWindowToTop
MessageBoxA
wsprintfA
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
SystemTimeToVariantTime
OleLoadPicture
VarR8FromCy
VarR8FromBool
VariantTimeToSystemTime
VariantTimeToSystemTime
shlwapi
PathFindExtensionA
PathFindFileNameA
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
GetDeviceCaps
SetDIBitsToDevice
GetDIBits
SetPixelV
GetPixel
GdiFlush
BitBlt
GetObjectA
CreateDIBSection
SetTextColor
DeleteDC
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
RestoreDC
SaveDC
CreateBitmap
DeleteObject
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegOpenKeyA
RegCloseKey
OpenProcessToken
GetTokenInformation
RegQueryValueExA
shell32
ShellExecuteExA
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
CoInitializeEx
CoUninitialize
CoCreateGuid
CoInitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
msvcrt
sprintf
atoi
_ftol
strchr
free
malloc
strstr
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 444KB - Virtual size: 444KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 755KB - Virtual size: 881KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ