Behavioral task
behavioral1
Sample
2024-07-22_d46474a8e5812c46b127aa7e4987cf6e_mafia.exe
Resource
win7-20240708-en
General
-
Target
2024-07-22_d46474a8e5812c46b127aa7e4987cf6e_mafia
-
Size
1.7MB
-
MD5
d46474a8e5812c46b127aa7e4987cf6e
-
SHA1
f9b6a4a733ca57d7258822eec1fbacccc28dcc25
-
SHA256
c26a451b63f101f57e70b34afd52b373573d5118bf0c76c45c3c2c37e08795ae
-
SHA512
e376703ad705480723503a4d15006a4568dab2aac65d4605d3681440b38b4f5d95073f7b9d826d4a86124291619e7b99f3e212e2b4f11dd96e0f3d9a1da9de48
-
SSDEEP
49152:6+lYMoRzMVMOiMeGP0NaPNcp0sUPYu7UGHMke:RlrylGcaepMAOsk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-22_d46474a8e5812c46b127aa7e4987cf6e_mafia
Files
-
2024-07-22_d46474a8e5812c46b127aa7e4987cf6e_mafia.exe windows:5 windows x86 arch:x86
a8b97bb1fcce237e48665837abc454ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
InitializeCriticalSection
LCMapStringA
FreeLibrary
GetCommandLineA
SetFilePointer
GetFileSize
GetTickCount
WritePrivateProfileStringA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
MulDiv
GetCurrentDirectoryA
GetVolumeInformationA
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
HeapReAlloc
ExitProcess
CancelWaitableTimer
VirtualAlloc
VirtualFree
HeapDestroy
TryEnterCriticalSection
SetCriticalSectionSpinCount
DeleteCriticalSection
HeapFree
HeapAlloc
HeapCreate
CreateEventA
WaitForMultipleObjects
SetEvent
lstrcpyn
RtlMoveMemory
GlobalMemoryStatusEx
GetProcessId
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
MoveFileA
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
SetFilePointerEx
CreateFileA
CreateFileW
TlsSetValue
IsBadReadPtr
TlsGetValue
DeleteFileA
GetTempPathW
lstrlenW
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
HeapSize
TerminateProcess
SetThreadAffinityMask
InterlockedExchange
LeaveCriticalSection
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
SwitchToThread
InterlockedCompareExchange
EnterCriticalSection
CloseHandle
CreateThread
SetProcessDEPPolicy
GetProcessHeap
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
GetModuleHandleA
IsWow64Process
GetCurrentProcess
GetSystemInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
LocalReAlloc
GlobalReAlloc
GlobalHandle
LocalAlloc
lstrcpynA
GetLastError
GetDriveTypeA
Sleep
lstrcpyA
lstrlenA
SetLastError
lstrcatA
QueryPerformanceCounter
GetVersion
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RtlUnwind
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualQuery
GetStringTypeW
LoadLibraryW
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalFree
GetEnvironmentVariableA
LCMapStringA
LoadLibraryA
FreeLibrary
GetProcAddress
IsBadReadPtr
HeapFree
HeapAlloc
ExitProcess
GetProcessHeap
VirtualProtectEx
GetModuleHandleA
RtlMoveMemory
user32
PostMessageA
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
GetWindowPlacement
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
PostQuitMessage
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetClassNameA
SendMessageA
ShowWindowAsync
GetSystemMetrics
FindWindowExA
IsWindowEnabled
GetWindowThreadProcessId
DestroyIcon
GetDC
FillRect
DrawIconEx
ReleaseDC
SendInput
MapVirtualKeyA
GetLastInputInfo
LoadImageA
EnumDisplaySettingsA
IsIconic
IsWindowVisible
GetWindowRect
SetFocus
SetForegroundWindow
EnableWindow
GetClientRect
ClientToScreen
OpenClipboard
GetClipboardData
GetParent
GetWindow
PtInRect
GetWindowLongA
SetActiveWindow
CloseClipboard
EmptyClipboard
SetClipboardData
CallWindowProcA
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetWindowTextA
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetCapture
BringWindowToTop
AttachThreadInput
SetWindowPos
GetAncestor
GetForegroundWindow
IsWindow
MsgWaitForMultipleObjects
RemovePropA
wsprintfA
MessageBoxA
oleaut32
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SystemTimeToVariantTime
SysFreeString
OleLoadPicture
VarR8FromCy
VarR8FromBool
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetElemsize
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
SafeArrayGetLBound
VariantTimeToSystemTime
shlwapi
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
gdi32
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetStockObject
GetDeviceCaps
SetDIBitsToDevice
GetDIBits
SetPixelV
GetPixel
GdiFlush
BitBlt
GetObjectA
CreateDIBSection
DeleteObject
DeleteDC
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetViewportOrgEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
RegQueryValueExA
GetTokenInformation
OpenProcessToken
RegCloseKey
RegOpenKeyA
CryptGetHashParam
CryptDestroyHash
CryptHashData
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHGetSpecialFolderPathA
SHGetFileInfoA
ShellExecuteExA
ole32
CreateStreamOnHGlobal
CLSIDFromProgID
CoInitializeEx
CLSIDFromString
CoCreateInstance
OleRun
CoInitialize
CoCreateGuid
CoUninitialize
wininet
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
msvcrt
strstr
malloc
free
strchr
_ftol
atoi
sprintf
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 483KB - Virtual size: 483KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 792KB - Virtual size: 943KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 423KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ