Behavioral task
behavioral1
Sample
91ce01ce38e3e1dd98a23378968b28e295f69be5765fdfaa1863f8fa0f7f091a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
91ce01ce38e3e1dd98a23378968b28e295f69be5765fdfaa1863f8fa0f7f091a.exe
Resource
win10v2004-20240508-en
General
-
Target
91ce01ce38e3e1dd98a23378968b28e295f69be5765fdfaa1863f8fa0f7f091a
-
Size
400KB
-
MD5
f46962c0b178c0ea4ddbab5dd129dc1e
-
SHA1
26271cbb4c5ea414e7a9715d084fe1698cc298a7
-
SHA256
91ce01ce38e3e1dd98a23378968b28e295f69be5765fdfaa1863f8fa0f7f091a
-
SHA512
270b48999fcbf0347188f8df2a6f366cbcb789d13f51a7ac6678dc306997a33abde72f9726e1f10ad369c550891dcd385eaef7a379dc1526e182f433f2ad70fd
-
SSDEEP
6144:pj2Ad0LQjcGIo2MjPyncjCHiq4JgI0uu6Po4/3sV0:p2Ad0HVMmncjGij90AJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91ce01ce38e3e1dd98a23378968b28e295f69be5765fdfaa1863f8fa0f7f091a
Files
-
91ce01ce38e3e1dd98a23378968b28e295f69be5765fdfaa1863f8fa0f7f091a.exe windows:4 windows x86 arch:x86
ab9877ad060d090234b8dda69e7479ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetCurrentProcessId
lstrcpyA
lstrcatA
MulDiv
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LCMapStringA
FreeLibrary
GetModuleFileNameA
GetCommandLineA
DeleteFileA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
SetFileAttributesA
WriteFile
GetTickCount
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
DeviceIoControl
GetLastError
CreateFileA
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
GetModuleHandleA
SetWaitableTimer
CreateWaitableTimerA
Sleep
Module32First
GetProcAddress
LoadLibraryA
lstrcpyn
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
WritePrivateProfileStringA
user32
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
GetMenuItemCount
UnhookWindowsHookEx
SetWindowTextA
GetDlgItem
ReleaseDC
GrayStringA
DrawTextA
TabbedTextOutA
GetDlgCtrlID
GetWindowRect
PtInRect
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
GetWindowLongA
SetCursor
PostMessageA
PostQuitMessage
UnregisterHotKey
SetWindowLongA
SetCapture
SendMessageA
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
GetCursorPos
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
LoadStringA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SendInput
MsgWaitForMultipleObjects
GetDoubleClickTime
mouse_event
BringWindowToTop
UpdateWindow
MoveWindow
GetWindowTextLengthA
GetClassNameA
IsWindowVisible
GetWindow
GetDesktopWindow
FindWindowExA
ClientToScreen
GetAsyncKeyState
GetClientRect
GetWindowInfo
GetWindowTextA
GetWindowThreadProcessId
IsWindow
EnableWindow
UnregisterClassA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
DeleteService
CreateServiceA
StartServiceA
ControlService
CloseServiceHandle
OpenServiceA
OpenSCManagerA
gdi32
SaveDC
RestoreDC
SelectObject
SetBkColor
DeleteDC
CreateBitmap
TranslateCharsetInfo
GetDeviceCaps
DeleteObject
CreateFontA
GetObjectA
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
shlwapi
PathFileExistsA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
comctl32
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_Add
ImageList_DragLeave
Sections
.text Size: 200KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 168KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE