Behavioral task
behavioral1
Sample
eca1f932ed0563a104df2c25bbb66cf8325aec3f13b5a3a1ebd1fc258b8192f8.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eca1f932ed0563a104df2c25bbb66cf8325aec3f13b5a3a1ebd1fc258b8192f8.exe
Resource
win10v2004-20240802-en
General
-
Target
eca1f932ed0563a104df2c25bbb66cf8325aec3f13b5a3a1ebd1fc258b8192f8
-
Size
440KB
-
MD5
58d0d10302644119088449092240b90a
-
SHA1
f507d3019cac7336a25bc03ea9e9547028806375
-
SHA256
eca1f932ed0563a104df2c25bbb66cf8325aec3f13b5a3a1ebd1fc258b8192f8
-
SHA512
1d48a12ff6f11eaf2907050b341578c5d78dfbb7b17fe07e323f3b009ead986490058b28e6759d71d06890b2c8af5896037c67a76e7674f9f5c53bdcd1746518
-
SSDEEP
6144:p7K14GjEm0HCAvygT2B7jXyD0KB5pr/8ECQ+OVQp:p7K14GomWCAv/ijX0B5x8lQ9A
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eca1f932ed0563a104df2c25bbb66cf8325aec3f13b5a3a1ebd1fc258b8192f8
Files
-
eca1f932ed0563a104df2c25bbb66cf8325aec3f13b5a3a1ebd1fc258b8192f8.exe windows:4 windows x86 arch:x86
a7dae65971fab0741e483aed7f5ab9a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
IsBadCodePtr
RaiseException
TerminateProcess
Process32Next
GetStartupInfoA
GetOEMCP
GetCPInfo
SetStdHandle
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetFileSize
GetTickCount
Sleep
WriteFile
GetLocalTime
SetFilePointer
CreateDirectoryA
WritePrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
GetModuleFileNameA
GetCommandLineW
LocalFree
GetProcAddress
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpA
lstrlenA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
ReleaseMutex
CreateMutexA
IsWow64Process
WaitForSingleObject
VirtualFree
VirtualAlloc
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
RtlZeroMemory
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
RtlMoveMemory
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
GetFileSizeEx
CreateFileA
HeapSize
MultiByteToWideChar
FlushFileBuffers
GetCurrentProcess
Process32First
GetNativeSystemInfo
GetModuleHandleA
GetTimeFormatA
GetDateFormatA
GetComputerNameExA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
CreateToolhelp32Snapshot
SetDllDirectoryA
RtlUnwind
GetLastError
SetErrorMode
GetProcessVersion
FindResourceA
LoadResource
CreateThread
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
GlobalDeleteAtom
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
MulDiv
GlobalFlags
lstrcatA
lstrcpyA
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
user32
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
EndDialog
ws2_32
WSACleanup
gethostname
WSAStartup
WSAGetLastError
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
CoRegisterMessageFilter
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
shlwapi
StrToIntW
StrToIntExW
PathRemoveBackslashA
PathRemoveFileSpecA
PathFileExistsA
PathFindFileNameA
oleaut32
LoadTypeLi
SystemTimeToVariantTime
VariantChangeType
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
gdiplus
GdiplusStartup
GdiplusShutdown
shell32
CommandLineToArgvW
SHGetSpecialFolderPathA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
comctl32
ord17
oledlg
ord8
Sections
.text Size: 368KB - Virtual size: 366KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE