Behavioral task
behavioral1
Sample
48b861bb5ce692f4393d63b5793971ff4805a63f5487de833adcc3a9cf129226.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48b861bb5ce692f4393d63b5793971ff4805a63f5487de833adcc3a9cf129226.exe
Resource
win10v2004-20240802-en
General
-
Target
48b861bb5ce692f4393d63b5793971ff4805a63f5487de833adcc3a9cf129226
-
Size
4.2MB
-
MD5
7240eb78f93c012b1e7441322736f68f
-
SHA1
a0e6a4c3f8c634c2856814492f130fc00609b0aa
-
SHA256
48b861bb5ce692f4393d63b5793971ff4805a63f5487de833adcc3a9cf129226
-
SHA512
c0e6e7ca6f6e630fbd398c5e810b08ddc6419f766aa22e34d09eb7465991ec4d5d09c6bd3b23de3eb1c9d975a88aae92375b1408bf00ba35918fdf2e712939cd
-
SSDEEP
98304:yAJW6mP0RaXE88qt3R0YZcLZ9tMYC7MSiD4OLF:yAJDo+aP5tBT2tFC7MSnO
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48b861bb5ce692f4393d63b5793971ff4805a63f5487de833adcc3a9cf129226
Files
-
48b861bb5ce692f4393d63b5793971ff4805a63f5487de833adcc3a9cf129226.exe windows:4 windows x86 arch:x86
a47971dda16d5d8c6c1a245845ad24e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathFindFileNameA
kernel32
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
lstrcpyA
lstrcatA
MulDiv
CreateToolhelp32Snapshot
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
Process32First
CloseHandle
Process32Next
CreateThread
MultiByteToWideChar
GetModuleHandleA
Sleep
FreeLibrary
OpenProcess
CreateDirectoryA
MoveFileA
LoadLibraryA
GetProcAddress
GetCommandLineA
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
DeleteFileA
CopyFileA
GetLocalTime
SetFileAttributesA
LCMapStringA
GetTickCount
WriteFile
GetStartupInfoA
CreateProcessA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
WideCharToMultiByte
lstrcpynA
WaitForSingleObject
DeviceIoControl
CreateFileA
Wow64DisableWow64FsRedirection
user32
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetWindowPlacement
SetFocus
SetWindowPos
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
UnregisterHotKey
SetCapture
SendMessageA
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetCursorPos
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SendInput
MsgWaitForMultipleObjects
GetAsyncKeyState
IsWindow
ClientToScreen
SetLayeredWindowAttributes
SetWindowLongA
GetWindowLongA
UpdateWindow
ShowWindow
GetWindowThreadProcessId
FindWindowA
GetDC
UnregisterClassA
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetObjectA
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SaveDC
DeleteDC
CreateBitmap
TranslateCharsetInfo
GetDeviceCaps
DeleteObject
CreateFontA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
OpenSCManagerA
CreateServiceA
DeleteService
ControlService
StartServiceA
CloseServiceHandle
OpenServiceA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
comctl32
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
Sections
.text Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.7MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 288KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE