Behavioral task
behavioral1
Sample
4dd6aec0099fed4be13499a60e16bb5746d1b6934205f35db9817f51344c6a4f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4dd6aec0099fed4be13499a60e16bb5746d1b6934205f35db9817f51344c6a4f.exe
Resource
win10v2004-20240802-en
General
-
Target
4dd6aec0099fed4be13499a60e16bb5746d1b6934205f35db9817f51344c6a4f
-
Size
9.1MB
-
MD5
86f3b701e8dd39890718b82007a84a5e
-
SHA1
d03a76830402f9e99b3098339abef85b16a1fb07
-
SHA256
4dd6aec0099fed4be13499a60e16bb5746d1b6934205f35db9817f51344c6a4f
-
SHA512
e705b627b54a8db527b4bf1dd874ff691f63064f2a261c04d0ae6b9ea0c34bfdb8f2bbfca7c6a2f33377bb27d44ab2d62b2915a125f3181b8287e50b4874beec
-
SSDEEP
196608:Blh1vv2pvECT535E4vT/wANp5q3wDai2NeP/0qfMTkgf6Xi0i5q:BlhbW9BvT/pNp58NSHfM7fA3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dd6aec0099fed4be13499a60e16bb5746d1b6934205f35db9817f51344c6a4f
Files
-
4dd6aec0099fed4be13499a60e16bb5746d1b6934205f35db9817f51344c6a4f.exe windows:4 windows x86 arch:x86
a425691f92d82caddea5f8fc2f32778a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
GlobalDeleteAtom
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
lstrcmpA
lstrcmpiA
GetCurrentThread
GetVersion
SetLastError
GlobalAlloc
OpenProcess
TerminateProcess
SetFilePointer
CreateThread
GlobalLock
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcpyA
lstrcatA
MulDiv
GetCurrentProcess
GetLastError
GetVersionExA
lstrlenA
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
SetFileAttributesA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetTickCount
FindFirstFileA
RemoveDirectoryA
FindNextFileA
WritePrivateProfileStringA
GetFileSize
ReadFile
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
DeleteFileA
VirtualProtect
GetProcAddress
GetModuleHandleA
Sleep
WideCharToMultiByte
lstrlenW
GetTempPathA
MoveFileA
CreateDirectoryA
FindClose
FindFirstFileW
MultiByteToWideChar
GetCurrentThreadId
CloseHandle
InitializeCriticalSection
user32
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetClassLongA
SetPropA
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
RegisterClassA
GetWindowPlacement
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostQuitMessage
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetDlgItem
SystemParametersInfoA
GetClassNameA
GetWindowRect
UnregisterHotKey
SetWindowLongA
SetCapture
SendMessageA
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
GetMenu
GetSubMenu
GetMenuItemID
SetFocus
IsIconic
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MapVirtualKeyA
GetWindowThreadProcessId
ClientToScreen
GetClientRect
GetCursorPos
SetWindowPos
SetLayeredWindowAttributes
MoveWindow
ShowWindow
PostMessageA
FindWindowA
ReleaseDC
UnregisterClassA
gdi32
RectVisible
GetObjectA
GetStockObject
Escape
TextOutA
ExtTextOutA
CreateFontA
DeleteObject
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
SelectObject
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
PtVisible
shlwapi
PathFileExistsA
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
comctl32
ord17
ImageList_EndDrag
ImageList_Add
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 196KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8.9MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ