_�����ӳ���
Behavioral task
behavioral1
Sample
f731fb9caa8234ecc6b756acbcc46ff14ca4ec428e63413c0592b90576e2c93c.dll
Resource
win7-20240903-en
General
-
Target
f731fb9caa8234ecc6b756acbcc46ff14ca4ec428e63413c0592b90576e2c93c
-
Size
496KB
-
MD5
75a437daf64743e13fa3901d200ca959
-
SHA1
34b2b88f445e9aad82a5bcb87ee14d4f98ddbe44
-
SHA256
f731fb9caa8234ecc6b756acbcc46ff14ca4ec428e63413c0592b90576e2c93c
-
SHA512
e3af9db14ada39eaec20c6f93664e35ed13befe96d9826e345928e1b5b08933aa4a2f300f6cbe63a42cb9bccb5d13a85f6016db006d2eea453d6bbf7d8dbccdb
-
SSDEEP
6144:4jZFA7n1wlgCoFKJMMZUqiR7PRQ4itQWNY9kXDUVZcl:0Ft4KOM+qiR7PRQ4iWWNYC2Z
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f731fb9caa8234ecc6b756acbcc46ff14ca4ec428e63413c0592b90576e2c93c
Files
-
f731fb9caa8234ecc6b756acbcc46ff14ca4ec428e63413c0592b90576e2c93c.dll windows:4 windows x86 arch:x86
6425b92dea1f705b263b281b1f7ef434
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WriteFile
SetFilePointer
GetLastError
GetVersionExA
TerminateProcess
Sleep
lstrcpyA
GetCommandLineA
VerLanguageNameA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetVersion
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
FlushFileBuffers
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
LCMapStringA
GetPrivateProfileStringA
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
GetUserDefaultLCID
WritePrivateProfileStringA
CreateFileA
GetFileSize
ReadFile
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
GetModuleHandleA
FreeLibrary
GlobalFree
OpenThread
Thread32Next
Thread32First
VirtualProtect
VirtualFreeEx
MultiByteToWideChar
ReadProcessMemory
VirtualQueryEx
GetProcAddress
LoadLibraryA
GetQueuedCompletionStatus
CreateIoCompletionPort
TerminateThread
GetExitCodeThread
VirtualFree
CreateThread
VirtualAlloc
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
GetLocalTime
WideCharToMultiByte
Module32First
GetProcessId
RtlMoveMemory
lstrcpynA
GetCurrentProcessId
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcess
shlwapi
StrToInt64ExA
user32
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
PostMessageA
PostQuitMessage
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetCursorPos
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
IsWindow
SendMessageA
GetWindowRect
GetSystemMetrics
MsgWaitForMultipleObjects
GetInputState
GetWindowThreadProcessId
GetWindowTextA
SetWindowLongA
RegisterWindowMessageA
CallWindowProcA
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
UnregisterClassA
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
RegisterClipboardFormatA
UnhookWindowsHookEx
GetDlgItem
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SelectObject
GetDeviceCaps
GetObjectA
GetStockObject
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
DeleteObject
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ole32
OleIsCurrentClipboard
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleFlushClipboard
OleUninitialize
OleInitialize
OleRun
CoCreateInstance
CoRevokeClassObject
CLSIDFromString
CLSIDFromProgID
wininet
InternetTimeToSystemTime
crypt32
CryptBinaryToStringA
oleaut32
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SystemTimeToVariantTime
psapi
GetModuleInformation
oledlg
ord8
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
Exports
Exports
Sections
.text Size: 368KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ