Behavioral task
behavioral1
Sample
fff8afa717ad54ddaa38c5d35565a5ce6f36c7265add9b672597aeb178df9f9e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
fff8afa717ad54ddaa38c5d35565a5ce6f36c7265add9b672597aeb178df9f9e.exe
Resource
win10v2004-20240802-en
General
-
Target
fff8afa717ad54ddaa38c5d35565a5ce6f36c7265add9b672597aeb178df9f9e
-
Size
564KB
-
MD5
b4ff84f70a847c8a64df54b9dc287503
-
SHA1
5d232b82b12a8dfe6164e00097cb98fc3dc0dbda
-
SHA256
fff8afa717ad54ddaa38c5d35565a5ce6f36c7265add9b672597aeb178df9f9e
-
SHA512
8508289ab4b36fa2a2b72b40b3382df7c0cb670bf14369cf7b5a3bdf9b251b015eb63aa414f61b009b0e17f55cf5b88d05b321dd909ebcb42c6b62f6ba14c4d5
-
SSDEEP
6144:8BiY3TucAPFzq2CYZjOTLKDvVDvg9yDMMgsfSGWPYhkfapawR7Qkz:8BiqucAN/ZywYBGWY+fGQk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fff8afa717ad54ddaa38c5d35565a5ce6f36c7265add9b672597aeb178df9f9e
Files
-
fff8afa717ad54ddaa38c5d35565a5ce6f36c7265add9b672597aeb178df9f9e.exe windows:4 windows x86 arch:x86
771653c45287632939edfffa033479ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
winmm
PlaySoundA
kernel32
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
WriteFile
Sleep
CreateFileA
GetFileSize
ReadFile
CloseHandle
GlobalAlloc
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetCommandLineW
WideCharToMultiByte
LocalFree
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
LCMapStringW
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
TlsAlloc
InitializeCriticalSection
LocalAlloc
LocalSize
HeapAlloc
HeapFree
lstrcpynA
FlushFileBuffers
MulDiv
InterlockedDecrement
GetProcessHeap
RtlMoveMemory
MultiByteToWideChar
GetModuleHandleA
DeleteCriticalSection
InterlockedExchange
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFilePointer
GetLastError
GetCurrentProcess
GetVersionExA
TerminateProcess
OpenProcess
lstrcpyA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GetTickCount
InterlockedIncrement
user32
RemoveMenu
MoveWindow
UpdateWindow
ValidateRect
GetMessageA
GetParent
TranslateAcceleratorA
IsDialogMessageA
TranslateMessage
DispatchMessageA
IsWindow
GetClassNameA
SetWindowLongA
RegisterHotKey
GetWindowThreadProcessId
FindWindowA
ReleaseDC
GetDC
SystemParametersInfoA
GetCursorPos
PtInRect
GetWindow
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
SendDlgItemMessageA
GetWindowPlacement
GetForegroundWindow
GetMessagePos
GetMessageTime
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
CallWindowProcA
BeginPaint
EndPaint
GetAsyncKeyState
GetClientRect
DestroyWindow
DefWindowProcA
SendMessageA
DefMDIChildProcA
LoadCursorA
SetCursor
TrackMouseEvent
DestroyIcon
PostQuitMessage
DestroyCursor
CreateWindowExA
GetWindowLongA
PeekMessageA
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
CheckMenuItem
InvalidateRect
MenuItemFromPoint
GetMenuDefaultItem
GetMenuInfo
GetMenuState
GetMenuItemRect
GetMenuItemInfoA
GetMenuStringA
TrackPopupMenu
SetForegroundWindow
CheckMenuRadioItem
GetMenuItemID
GetSubMenu
SetMenuInfo
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
CreateMenu
RegisterClassExA
SetActiveWindow
UnregisterHotKey
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
SetParent
PostMessageA
GetDlgItem
SetFocus
GetFocus
GetWindowRect
ScreenToClient
SetWindowPos
gdi32
GetStockObject
BitBlt
SaveDC
RestoreDC
SetBkColor
ExtCreateRegion
CombineRgn
CreateRoundRectRgn
StretchBlt
CreateSolidBrush
CreatePatternBrush
GetObjectA
CreateBitmap
CreateCompatibleDC
CreateDIBSection
DeleteDC
GetDeviceCaps
SelectObject
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
shell32
CommandLineToArgvW
DragAcceptFiles
Shell_NotifyIconA
DragFinish
DragQueryFileA
ole32
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleRun
CLSIDFromString
CoCreateInstance
CLSIDFromProgID
CoRegisterMessageFilter
atl
ord47
ord42
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantTimeToSystemTime
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
comctl32
ord17
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 368KB - Virtual size: 479KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE