Behavioral task
behavioral1
Sample
eab1adbc75ae45d2ddb86ded1fd594de929667bd9ff063ae4ea44dd90c3528a6.exe
Resource
win7-20240705-en
General
-
Target
f5b6b79402ff575f089bb00764e71304.bin
-
Size
758KB
-
MD5
0ca15e21fb2b01602af4e0e76cf4f7ee
-
SHA1
73ededdf2b272d77dc3c3cc7af868f2df772dd2a
-
SHA256
add42e9d04da7f8172f3a4f6662e97b42aca83e448189fb398c0db82c2cad892
-
SHA512
e3f1ec9cbc71266a186233a4d6f93483dad7a056b37dc6f0b54af02240802e5333bd4000c13b5544ab6d850a8e9e6a5563ff194ebf9314a10328c69d93d322b5
-
SSDEEP
12288:qwyu2w0QmrpaJjimwDR0rNV2GzFGu+wY3yDE8qm+WI5TspEQB186lm8BZRC2v1gX:H2lQYaJw0rD7Gu+ZP8SWI5TWELgfebHD
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule static1/unpack001/eab1adbc75ae45d2ddb86ded1fd594de929667bd9ff063ae4ea44dd90c3528a6.exe family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/eab1adbc75ae45d2ddb86ded1fd594de929667bd9ff063ae4ea44dd90c3528a6.exe
Files
-
f5b6b79402ff575f089bb00764e71304.bin.zip
Password: infected
-
eab1adbc75ae45d2ddb86ded1fd594de929667bd9ff063ae4ea44dd90c3528a6.exe.exe windows:5 windows x86 arch:x86
Password: infected
0761292bf989a4e32e8f00b051c9bf24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
LCMapStringA
FreeLibrary
GetCommandLineA
GetFileSize
GetTickCount
WritePrivateProfileStringA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
MulDiv
GetCurrentDirectoryA
GetVolumeInformationA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
HeapReAlloc
ExitProcess
CancelWaitableTimer
VirtualAlloc
VirtualFree
HeapDestroy
TryEnterCriticalSection
SetCriticalSectionSpinCount
DeleteCriticalSection
HeapFree
HeapAlloc
HeapCreate
CreateEventA
WaitForMultipleObjects
SetEvent
lstrcpyn
RtlMoveMemory
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
IsWow64Process
GetSystemInfo
GlobalMemoryStatusEx
GetProcessId
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
MoveFileA
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
SetFilePointerEx
CreateFileA
CreateFileW
TlsSetValue
IsBadReadPtr
TlsGetValue
DeleteFileA
GetTempPathW
lstrlenW
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
HeapSize
GetCurrentProcess
TerminateProcess
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetThreadAffinityMask
InterlockedExchange
LeaveCriticalSection
GetCurrentThreadId
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
SwitchToThread
InterlockedCompareExchange
EnterCriticalSection
GetProcessHeap
CloseHandle
CreateThread
SetProcessDEPPolicy
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetFilePointer
GetLastError
GetDriveTypeA
Sleep
lstrcpyA
lstrlenA
SetLastError
lstrcatA
QueryPerformanceCounter
GetVersion
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RtlUnwind
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualQuery
GetStringTypeW
LoadLibraryW
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalFree
lstrcpynA
LocalAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
LocalReAlloc
GlobalFlags
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
RtlMoveMemory
GetProcAddress
FreeLibrary
LoadLibraryA
VirtualProtectEx
LCMapStringA
IsBadReadPtr
GetEnvironmentVariableA
ExitProcess
user32
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
GetWindowPlacement
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
SetWindowsHookExA
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetActiveWindow
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetForegroundWindow
SetFocus
GetWindowThreadProcessId
ShowWindowAsync
PostMessageA
PostQuitMessage
MsgWaitForMultipleObjects
IsWindow
GetSystemMetrics
FindWindowExA
GetForegroundWindow
DestroyIcon
GetDC
FillRect
DrawIconEx
ReleaseDC
SendInput
MapVirtualKeyA
GetLastInputInfo
LoadImageA
EnumDisplaySettingsA
IsIconic
IsWindowVisible
GetWindowRect
GetClientRect
ClientToScreen
OpenClipboard
GetClipboardData
GetAncestor
CloseClipboard
EmptyClipboard
SetClipboardData
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetParent
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
SetWindowPos
AttachThreadInput
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetClassNameA
SendMessageA
GetCapture
BringWindowToTop
MessageBoxA
wsprintfA
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
SystemTimeToVariantTime
OleLoadPicture
VarR8FromCy
VarR8FromBool
VariantTimeToSystemTime
VariantTimeToSystemTime
shlwapi
PathFindExtensionA
PathFindFileNameA
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
GetDeviceCaps
SetDIBitsToDevice
GetDIBits
SetPixelV
GetPixel
GdiFlush
BitBlt
GetObjectA
CreateDIBSection
SetTextColor
DeleteDC
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
RestoreDC
SaveDC
CreateBitmap
DeleteObject
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegOpenKeyA
RegCloseKey
OpenProcessToken
GetTokenInformation
RegQueryValueExA
shell32
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
ShellExecuteA
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoUninitialize
CoCreateGuid
CoInitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
msvcrt
sprintf
atoi
_ftol
strchr
free
malloc
strstr
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 433KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ