Behavioral task
behavioral1
Sample
6b3ca5e9a2681a53f9c3338214d4cf6f53dcf64ace5eebbfa561cdc44bb6b14f.exe
Resource
win7-20240704-en
General
-
Target
6b3ca5e9a2681a53f9c3338214d4cf6f53dcf64ace5eebbfa561cdc44bb6b14f
-
Size
1.1MB
-
MD5
7d817390b4b88b682986fd9f0366b275
-
SHA1
6dc4f385013d65d3b7c56e3e2bbe16bf779f48f6
-
SHA256
6b3ca5e9a2681a53f9c3338214d4cf6f53dcf64ace5eebbfa561cdc44bb6b14f
-
SHA512
c87b6e8bb0156b3375be2fba1b178bc27a38f45c623836d2442d8d03bb909afce0004a34ebfef9f9f6c0531923fd3fb5e5b57b7f19ec92330894102fa8c9da69
-
SSDEEP
24576:672U77qt7Dd58u1lqeX6AhsnWlYxn3JHBL7Pru8TMJLduWDw0bw:Kj7qt7DdjX05xyuWDw0bw
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b3ca5e9a2681a53f9c3338214d4cf6f53dcf64ace5eebbfa561cdc44bb6b14f
Files
-
6b3ca5e9a2681a53f9c3338214d4cf6f53dcf64ace5eebbfa561cdc44bb6b14f.exe windows:4 windows x86 arch:x86
41237451ecc394bc92823b7a05e0163b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
kernel32
ResetEvent
WriteFile
CancelIo
ReadFile
lstrlenW
WideCharToMultiByte
GlobalAlloc
GlobalLock
RtlMoveMemory
GlobalUnlock
lstrcpyn
FindFirstFileW
FindClose
lstrcpynA
CreateThread
CreateWaitableTimerA
SetWaitableTimer
GetModuleHandleA
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
DeleteFileA
GetModuleFileNameA
Sleep
GetUserDefaultLCID
CreateFileA
GetTickCount
SetFileAttributesA
GetPrivateProfileStringA
LCMapStringA
GetCommandLineA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
GetTempPathA
GetFileAttributesA
GetCurrentDirectoryW
WaitForSingleObject
GetSystemDirectoryA
InitializeCriticalSection
GetWindowsDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetFilePointer
UnmapViewOfFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
CreateDirectoryA
MultiByteToWideChar
LocalFree
LocalAlloc
TerminateProcess
OpenProcess
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
GetProcAddress
LoadLibraryA
VirtualFree
VirtualAlloc
CloseHandle
VirtualQueryEx
GetCurrentProcess
DeleteCriticalSection
GetFileSize
SetFileTime
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
WriteProcessMemory
GetProcAddress
LoadLibraryA
lstrcpyn
lstrcatA
SetHandleCount
GetStringTypeW
IsBadCodePtr
SetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetModuleHandleA
GetStdHandle
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetCommandLineA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
GetProcessVersion
FormatMessageA
LoadResource
LockResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
SetLastError
InterlockedIncrement
WritePrivateProfileStringA
GlobalFlags
MulDiv
GetVersion
lstrcpyA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
CloseHandle
GetModuleFileNameA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetStringTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
Sleep
FreeLibrary
LCMapStringA
RtlFillMemory
WideCharToMultiByte
lstrcpynA
MultiByteToWideChar
FindResourceA
ole32
CLSIDFromString
OleRun
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
OleFlushClipboard
CoInitialize
OleInitialize
OleIsCurrentClipboard
OleUninitialize
CoRevokeClassObject
CoRegisterMessageFilter
CoInitialize
CoUninitialize
OleRun
CoFreeUnusedLibraries
CoCreateInstance
CLSIDFromProgID
CoUninitialize
user32
GetDC
ReleaseDC
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
UnhookWindowsHookEx
GetCursorInfo
GetIconInfo
DrawIcon
MsgWaitForMultipleObjects
SendInput
SetWindowsHookExA
GetForegroundWindow
GetSystemMetrics
GetCursorPos
PeekMessageA
wsprintfA
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
MessageBoxTimeoutA
CallNextHookEx
MessageBoxA
GetWindowRect
WindowFromPoint
CallWindowProcA
GetWindow
SendMessageTimeoutA
wsprintfA
DispatchMessageA
TranslateMessage
RegisterWindowMessageA
GetMessageA
PeekMessageA
GetCursorPos
GetClassNameA
EnumChildWindows
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetMenuCheckMarkDimensions
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
RegisterClipboardFormatA
UnhookWindowsHookEx
UnregisterClassA
PtInRect
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
EndDialog
CreateDialogIndirectParamA
DestroyMenu
PostThreadMessageA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CopyRect
ShowWindow
GetSubMenu
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
GetDlgCtrlID
advapi32
OpenProcessToken
AllocateAndInitializeSid
GetTokenInformation
EqualSid
FreeSid
RegCloseKey
RegOpenKeyExA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegSetValueExA
RegCreateKeyExA
gdi32
GetDeviceCaps
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
GetDIBits
GetDIBColorTable
StretchBlt
GetBitmapBits
DeleteObject
CreateCompatibleBitmap
DeleteDC
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
ScaleWindowExtEx
SetViewportOrgEx
GetClipBox
PtVisible
RectVisible
TextOutA
SetMapMode
Escape
GetObjectA
CreateBitmap
DeleteObject
SaveDC
GetDeviceCaps
RestoreDC
DeleteDC
SelectObject
GetStockObject
SetBkColor
OffsetViewportOrgEx
ExtTextOutA
SetTextColor
oleaut32
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SysFreeString
VariantCopy
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
SafeArrayGetUBound
shell32
ShellExecuteExW
SHGetSpecialFolderPathA
ShellExecuteA
setupapi
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
SetupDiEnumDeviceInterfaces
winhttp
WinHttpSetCredentials
WinHttpQueryHeaders
WinHttpCheckPlatform
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpReceiveResponse
wininet
DeleteUrlCacheEntry
urlmon
URLDownloadToFileA
shlwapi
PathFindExtensionA
PathFileExistsA
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
oleacc
ObjectFromLresult
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
oledlg
ord8
msvcrt
_except_handler3
tolower
__CxxFrameHandler
strncmp
memmove
realloc
strrchr
_CIfmod
_CIpow
strtod
rand
srand
atof
strchr
??2@YAPAXI@Z
malloc
free
atoi
sprintf
_ftol
floor
??3@YAXPAX@Z
_i64toa
calloc
_mbsstr
div
atol
modf
Sections
.text Size: 726KB - Virtual size: 726KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 331KB - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE