Behavioral task
behavioral1
Sample
2024-07-06_f5f523c3e4cc55a85dea36594fbc87a2_mafia.exe
Resource
win7-20240508-en
General
-
Target
2024-07-06_f5f523c3e4cc55a85dea36594fbc87a2_mafia
-
Size
1.6MB
-
MD5
f5f523c3e4cc55a85dea36594fbc87a2
-
SHA1
7e9de91dd9f86747e3922fac754743130b25bebf
-
SHA256
f9bd8a6b51bc00b9c3c49661bf4fe56fb2ae98b36b69c7ea7ad0073001e38775
-
SHA512
65aaad31956c19572a3508b2db2789be35ff6a830bbb194c73b185d8cf1a0a5cf4920503c912cd4f7f42071990eb82d40bc31bd059cb7e8982b4658d09537aa9
-
SSDEEP
24576:HbwqYDAFDJYNv7IBv9w/YRI5OTJ7hIVymFNlMtRVblP9PIjo3rSAp0sUPYud9mjw:HbfPS7IB1w/Yf/I07SAp0sUPYu7Ub7o
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-06_f5f523c3e4cc55a85dea36594fbc87a2_mafia
Files
-
2024-07-06_f5f523c3e4cc55a85dea36594fbc87a2_mafia.exe windows:5 windows x86 arch:x86
b3a81a62d7cf3200a236bb6277c2c9f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
LCMapStringA
FreeLibrary
GetCommandLineA
GetTickCount
WritePrivateProfileStringA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
MulDiv
GetCurrentDirectoryA
GetVolumeInformationA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
HeapReAlloc
ExitProcess
CancelWaitableTimer
VirtualAlloc
VirtualFree
HeapDestroy
TryEnterCriticalSection
SetCriticalSectionSpinCount
DeleteCriticalSection
HeapFree
HeapAlloc
HeapCreate
CreateEventA
WaitForMultipleObjects
SetEvent
lstrcpyn
RtlMoveMemory
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
IsWow64Process
GetSystemInfo
GlobalMemoryStatusEx
GetProcessId
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
MoveFileA
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
SetFilePointerEx
CreateFileA
CreateFileW
TlsSetValue
IsBadReadPtr
TlsGetValue
DeleteFileA
GetTempPathW
lstrlenW
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
HeapSize
GetCurrentProcess
TerminateProcess
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetThreadAffinityMask
InterlockedExchange
LeaveCriticalSection
GetCurrentThreadId
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
SwitchToThread
InterlockedCompareExchange
EnterCriticalSection
GetProcessHeap
CloseHandle
CreateThread
SetProcessDEPPolicy
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetFilePointer
GetLastError
GetDriveTypeA
Sleep
lstrcpyA
lstrlenA
SetLastError
lstrcatA
QueryPerformanceCounter
GetVersion
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RtlUnwind
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualQuery
GetStringTypeW
LoadLibraryW
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalFree
lstrcpynA
LocalAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
LocalReAlloc
GlobalFlags
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
RtlMoveMemory
GetProcAddress
FreeLibrary
LoadLibraryA
VirtualProtectEx
LCMapStringA
IsBadReadPtr
GetEnvironmentVariableA
ExitProcess
user32
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
GetWindowPlacement
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
SetWindowsHookExA
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetActiveWindow
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetForegroundWindow
SetFocus
GetWindowThreadProcessId
ShowWindowAsync
PostMessageA
PostQuitMessage
MsgWaitForMultipleObjects
IsWindow
GetSystemMetrics
FindWindowExA
GetForegroundWindow
DestroyIcon
GetDC
FillRect
DrawIconEx
ReleaseDC
SendInput
MapVirtualKeyA
GetLastInputInfo
LoadImageA
EnumDisplaySettingsA
IsIconic
IsWindowVisible
GetWindowRect
GetClientRect
ClientToScreen
OpenClipboard
GetClipboardData
GetAncestor
CloseClipboard
EmptyClipboard
SetClipboardData
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetParent
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
SetWindowPos
AttachThreadInput
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetClassNameA
SendMessageA
GetCapture
BringWindowToTop
MessageBoxA
wsprintfA
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
SystemTimeToVariantTime
OleLoadPicture
VarR8FromCy
VarR8FromBool
VariantTimeToSystemTime
VariantTimeToSystemTime
shlwapi
PathFindExtensionA
PathFindFileNameA
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
GetDeviceCaps
SetDIBitsToDevice
GetDIBits
SetPixelV
GetPixel
GdiFlush
BitBlt
GetObjectA
CreateDIBSection
SetTextColor
DeleteDC
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
RestoreDC
SaveDC
CreateBitmap
DeleteObject
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegOpenKeyA
RegCloseKey
OpenProcessToken
GetTokenInformation
RegQueryValueExA
shell32
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
ShellExecuteA
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoUninitialize
CoCreateGuid
CoInitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
msvcrt
sprintf
atoi
_ftol
strchr
free
malloc
strstr
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 427KB - Virtual size: 427KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ