pengxx
Behavioral task
behavioral1
Sample
3f44753e645407c02f1b0c9c1f7a2e92d1325996a2d425a45c6011463b6b0076.dll
Resource
win7-20240903-en
General
-
Target
3f44753e645407c02f1b0c9c1f7a2e92d1325996a2d425a45c6011463b6b0076
-
Size
4.1MB
-
MD5
06bf003ad519ecdc23040fd69f71bcf7
-
SHA1
f7874136251176dee48d6ef6032bbc655172c84b
-
SHA256
3f44753e645407c02f1b0c9c1f7a2e92d1325996a2d425a45c6011463b6b0076
-
SHA512
b4c1982748d1df87abb07db095957ec4cbc90a8d8f00af0d5ad2be259c170211880699bb1150b4a6f41d0fd32dcf6660a8defe00f5a0007db5689a07a185054c
-
SSDEEP
49152:k7zuVmfzjfVX5suEkzypp4HhaIrVZs+y/fh8kMIfSN89eeCnAkZJSJN5dRlelWL9:o5fzjtXWiDrVZs34bN8oDW5p1L9
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f44753e645407c02f1b0c9c1f7a2e92d1325996a2d425a45c6011463b6b0076
Files
-
3f44753e645407c02f1b0c9c1f7a2e92d1325996a2d425a45c6011463b6b0076.dll windows:4 windows x86 arch:x86
3ed0e9dea381400bf66f115878f136ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
lstrcpyA
GlobalAlloc
SetLastError
lstrcatA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
CreateThread
DeleteCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
lstrcpynA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
TerminateProcess
VirtualProtect
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
SetFilePointer
LCMapStringA
GlobalLock
GlobalUnlock
GetTickCount
DeleteFileA
WriteFile
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
lstrlenW
SetWaitableTimer
CreateWaitableTimerA
Module32Next
Module32First
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
lstrcpyn
GetSystemTimeAsFileTime
CloseHandle
VirtualProtectEx
VirtualQueryEx
VirtualQuery
OpenProcess
GetCurrentProcessId
ReadProcessMemory
RtlMoveMemory
IsBadReadPtr
user32
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
ClientToScreen
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
UnregisterClassA
DestroyWindow
GetWindowTextA
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
GetKeyState
LoadBitmapA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
SendMessageA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoUninitialize
StringFromGUID2
CreateStreamOnHGlobal
GetHGlobalFromStream
CLSIDFromString
shlwapi
StrFromTimeIntervalA
PathFileExistsA
ws2_32
WSAStartup
gdi32
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
ExtTextOutA
GetObjectA
GetStockObject
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
ScaleViewportExtEx
gdiplus
GdipGetImageEncodersSize
GdipSetTextRenderingHint
GdipGetSmoothingMode
GdiplusStartup
GdipGetImageGraphicsContext
GdipGetImageEncoders
GdipSaveImageToStream
GdipSetSmoothingMode
GdipSetWorldTransform
GdipDrawRectangle
GdipDrawRectangleI
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipGetTextRenderingHint
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
iphlpapi
GetAdaptersInfo
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Exports
Exports
Sections
.text Size: 656KB - Virtual size: 655KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.8MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 676KB - Virtual size: 674KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ