Behavioral task
behavioral1
Sample
3119bb0112b04d3a22cff5a389224daa7b737f3b338a5102c23e3925e2fab885.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3119bb0112b04d3a22cff5a389224daa7b737f3b338a5102c23e3925e2fab885.exe
Resource
win10v2004-20240611-en
General
-
Target
3119bb0112b04d3a22cff5a389224daa7b737f3b338a5102c23e3925e2fab885
-
Size
856KB
-
MD5
4d55f5ec6ffb7851078968170f7b5873
-
SHA1
41e001f120b00bf430498f621df4f6562c5e2a1b
-
SHA256
3119bb0112b04d3a22cff5a389224daa7b737f3b338a5102c23e3925e2fab885
-
SHA512
474cadc6aaf415f467fc3eb317236db62b5bc7add57f085884d7b73e6544a2bd0d653d8a81b7831cfcdb638c8288fdecf95341066c6af19935c517210829fbc5
-
SSDEEP
24576:4I68oSNKMmJ/Fk3qN+4Dp2fvf34Gw1RZemF9eX:4fgpm83qN9k3fgfcmPK
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3119bb0112b04d3a22cff5a389224daa7b737f3b338a5102c23e3925e2fab885
Files
-
3119bb0112b04d3a22cff5a389224daa7b737f3b338a5102c23e3925e2fab885.exe windows:4 windows x86 arch:x86
7a08c6c3963ac7fb137bb00c1fc6edd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WriteFile
SetFileAttributesA
CopyFileA
SetCurrentDirectoryA
GetModuleFileNameA
FindFirstFileA
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindClose
GetTickCount
GetStartupInfoA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
Sleep
GetEnvironmentVariableA
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
lstrcpyA
ResetEvent
CreateEventA
PostQueuedCompletionStatus
SetEvent
CreateIoCompletionPort
Module32First
CreateToolhelp32Snapshot
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
HeapValidate
lstrcpyn
GetQueuedCompletionStatus
GetSystemInfo
HeapDestroy
HeapFree
CloseHandle
CreateThread
HeapAlloc
HeapCreate
LocalSize
WaitForSingleObject
CreateProcessA
GetCurrentProcessId
RtlMoveMemory
InterlockedExchange
SetStdHandle
IsBadCodePtr
GetStringTypeW
LoadResource
SizeofResource
FindResourceA
MoveFileA
CreateDirectoryA
DeleteCriticalSection
lstrlenA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetCurrentProcess
Process32Next
Process32First
TerminateProcess
OpenProcess
SetLastError
lstrcatA
LockResource
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetLastError
user32
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
PtInRect
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
RegisterClipboardFormatA
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
IsWindowVisible
GetWindowLongA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetWindowThreadProcessId
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetCursorPos
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetClientRect
GetPropA
SetPropA
CreateIconFromResource
SendMessageA
IsWindow
FindWindowExA
FindWindowA
RegisterWindowMessageA
GetClassNameA
GetWindowTextA
EnumWindows
CopyRect
GetWindow
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
TrackPopupMenu
SetForegroundWindow
CallWindowProcA
AppendMenuA
AppendMenuW
SetWindowLongA
DrawMenuBar
SetMenu
CreatePopupMenu
RegisterClassA
advapi32
CreateProcessAsUserA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteEx
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
OleUninitialize
OleInitialize
OleFlushClipboard
OleIsCurrentClipboard
CoUninitialize
CoInitialize
iphlpapi
GetExtendedTcpTable
shlwapi
PathFileExistsA
ws2_32
shutdown
WSARecv
getsockname
ntohs
inet_ntoa
WSAStartup
WSAIoctl
closesocket
setsockopt
listen
send
socket
htons
inet_addr
WSACleanup
recvfrom
sendto
accept
recv
WSAGetLastError
htonl
ioctlsocket
__WSAFDIsSet
bind
connect
WSASetLastError
gethostbyname
getpeername
WSASocketA
select
gdi32
GetClipBox
ScaleWindowExtEx
GetStockObject
GetObjectA
SetWindowExtEx
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
OffsetViewportOrgEx
SetViewportExtEx
RectVisible
PtVisible
ScaleViewportExtEx
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
winmm
timeKillEvent
timeSetEvent
comctl32
ord17
Sections
.text Size: 360KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 416KB - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE