Behavioral task
behavioral1
Sample
0a8ffaa8fccd64da045797dfddd194b91426ebfcc3ec333fe05f3e4dc21ee137.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0a8ffaa8fccd64da045797dfddd194b91426ebfcc3ec333fe05f3e4dc21ee137.exe
Resource
win10v2004-20240802-en
General
-
Target
0a8ffaa8fccd64da045797dfddd194b91426ebfcc3ec333fe05f3e4dc21ee137
-
Size
704KB
-
MD5
105c50b20f52dc3742c45ba311997b5a
-
SHA1
c009654c1dde1bd8825d7e4ddbb7239448e05abe
-
SHA256
0a8ffaa8fccd64da045797dfddd194b91426ebfcc3ec333fe05f3e4dc21ee137
-
SHA512
66de9a3f5173158572727a9e5f4327cff9930e44e9197893613418bb6dc35c76008a806b5f2bc815c5a0b91a8a010a2ed2890e65fe3fa5103dad5f7ef3b7bc4e
-
SSDEEP
12288:ZKIisPoaPlCWkc0cqsb1sAeWSSi+AGzMSbZ+4:ZKIisPoaPljkc0cqsb1sAeWSS/ZgSdN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a8ffaa8fccd64da045797dfddd194b91426ebfcc3ec333fe05f3e4dc21ee137
Files
-
0a8ffaa8fccd64da045797dfddd194b91426ebfcc3ec333fe05f3e4dc21ee137.exe windows:4 windows x86 arch:x86
9ee2d29da8659a503275c651f4c65030
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
GetVersionExA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
IsBadCodePtr
ReadFile
FlushFileBuffers
GetCurrentProcess
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
LockResource
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
lstrcpyA
GlobalFlags
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
SetStdHandle
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
MoveFileA
GetFileSize
DeleteFileA
GetEnvironmentVariableA
CopyFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateDirectoryA
WriteFile
SetFilePointer
GetTickCount
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
ReleaseMutex
OpenMutexA
WaitForSingleObject
GetLocalTime
lstrcmpA
lstrlenA
lstrcmpiW
HeapDestroy
HeapCreate
lstrcmpW
lstrlenW
RtlZeroMemory
VirtualFree
VirtualAlloc
Process32Next
Process32First
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
HeapFree
HeapAlloc
GetProcessHeap
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetFileSizeEx
CreateFileA
CreateThread
lstrcatA
RtlMoveMemory
GetComputerNameExA
SetDllDirectoryA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
CreateToolhelp32Snapshot
GetLastError
GetCurrentThreadId
user32
PostThreadMessageA
UnregisterClassA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
EndDialog
CreateDialogIndirectParamA
LoadStringA
DestroyMenu
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
wsprintfA
MessageBoxA
GetWindowThreadProcessId
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
ws2_32
inet_addr
inet_ntoa
WSAStartup
WSACleanup
gethostname
WSAGetLastError
shlwapi
PathFindFileNameA
PathRemoveBackslashA
StrToIntW
StrToIntExW
PathFileExistsA
PathRemoveFileSpecA
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoRegisterMessageFilter
OleRun
CoUninitialize
CoInitialize
oleaut32
SafeArrayGetDim
VariantChangeType
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
VarR8FromBool
VarR8FromCy
SystemTimeToVariantTime
VariantInit
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
LoadTypeLi
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
winhttp
WinHttpTimeToSystemTime
iphlpapi
GetAdaptersInfo
SendARP
wininet
InternetWriteFile
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestExA
HttpEndRequestA
InternetQueryOptionA
InternetCloseHandle
HttpQueryInfoA
InternetSetCookieA
InternetReadFile
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
oledlg
ord8
Sections
.text Size: 576KB - Virtual size: 573KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE