Behavioral task
behavioral1
Sample
9ede3946e18fd21f04ed3aa72610d547549c630639e4c1294c7d5122a06da97b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9ede3946e18fd21f04ed3aa72610d547549c630639e4c1294c7d5122a06da97b.exe
Resource
win10v2004-20240802-en
General
-
Target
9ede3946e18fd21f04ed3aa72610d547549c630639e4c1294c7d5122a06da97b
-
Size
508KB
-
MD5
5ee2992599e98b2efc800569080626ef
-
SHA1
2623c1b335cd5d93a08e91db46824c89578ead02
-
SHA256
9ede3946e18fd21f04ed3aa72610d547549c630639e4c1294c7d5122a06da97b
-
SHA512
4502158985b8a5910dc70274004eada9ae4e6a63d26df5ddddf0f3699982f3bd007057ede881d9880734b0bbcf1b0a9ca42fc25b8c22fee0baca4640bf9cbb97
-
SSDEEP
12288:TWzve2alfAYYtlU+cDUppZfvzKASWpYBcR:TWzve2alfAYYtlU+cDU/ZfLKASWpYBcR
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ede3946e18fd21f04ed3aa72610d547549c630639e4c1294c7d5122a06da97b
Files
-
9ede3946e18fd21f04ed3aa72610d547549c630639e4c1294c7d5122a06da97b.exe windows:4 windows x86 arch:x86
43f5ebdef8629c3c0a1fdda5feee35ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
IsBadWritePtr
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
GetProcessHeap
RaiseException
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
HeapAlloc
SetStdHandle
IsBadCodePtr
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
GetStartupInfoA
CreateProcessA
DeleteFileA
GetFileSize
WritePrivateProfileStringA
WriteFile
GetPrivateProfileStringA
GetTickCount
CreateDirectoryA
SetFilePointer
GetLocalTime
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
Sleep
GetModuleFileNameA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpA
lstrlenA
ReleaseMutex
WaitForSingleObject
CreateMutexA
VirtualFree
VirtualAlloc
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
RtlZeroMemory
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
GetLastError
Process32Next
Process32First
MultiByteToWideChar
HeapFree
FreeEnvironmentStringsW
TerminateProcess
RtlUnwind
ReadFile
GetFileSizeEx
CreateFileA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
CreateToolhelp32Snapshot
GetComputerNameExA
lstrcatA
RtlMoveMemory
CreateThread
HeapSize
SetDllDirectoryA
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
lstrcpyA
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
ws2_32
gethostname
WSACleanup
WSAGetLastError
WSAStartup
shlwapi
PathGetArgsA
PathFindExtensionA
PathRemoveFileSpecA
StrToIntExW
StrToIntW
PathFileExistsA
PathRemoveBackslashA
PathFindFileNameA
psapi
GetProcessImageFileNameW
user32
LoadStringA
GetSysColorBrush
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetWindowThreadProcessId
UnregisterClassA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
IsWindowEnabled
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
oleaut32
VariantCopy
SafeArrayDestroy
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SysAllocString
SafeArrayCreate
Sections
.text Size: 444KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE