Behavioral task
behavioral1
Sample
943edc0f9f7b78b8dc1485178d898a167043f0a7bc74d30668f903d6b3af0517.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
943edc0f9f7b78b8dc1485178d898a167043f0a7bc74d30668f903d6b3af0517.exe
Resource
win10v2004-20240802-en
General
-
Target
943edc0f9f7b78b8dc1485178d898a167043f0a7bc74d30668f903d6b3af0517
-
Size
2.0MB
-
MD5
0c732c91e2e1ebce019833fa03a043da
-
SHA1
b1c1a9a8725771c52d5a8239a4b5a7b8c70d6db7
-
SHA256
943edc0f9f7b78b8dc1485178d898a167043f0a7bc74d30668f903d6b3af0517
-
SHA512
e9b711659825a7e63d4f86bfb96a0a34231ef4e5bdb8481f3ad039ac79b8925c021e8e71964c26d1054baef2d03459c027fad4c0092e63fc3100cf67f659699a
-
SSDEEP
24576:1a/v1dcrYpcnrFUva3a9lZmYgH1c9GM+n2NgY0aUOQiUPrKvfMJ8KUfFWufp7:1xU1Yi9bRgAE2MiBfgul
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon
Files
-
943edc0f9f7b78b8dc1485178d898a167043f0a7bc74d30668f903d6b3af0517.exe windows:4 windows x86 arch:x86
c9b9d5587926e1d4160a99c0fa5adc20
Code Sign
0b:87:29:ec:8e:ac:5a:6b:b0:2c:92:93:21:7f:bf:89Certificate
IssuerCN=凌峰工作室,ST=Hubei,C=China,1.2.840.113549.1.9.1=#1300Not Before23/03/2021, 13:19Not After24/12/2040, 16:00SubjectCN=凌峰工作室,ST=Hubei,C=China,1.2.840.113549.1.9.1=#130007Certificate
IssuerCN=Starfield Root Certificate Authority - G2,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=USNot Before03/05/2011, 07:00Not After03/05/2031, 07:00SubjectCN=Starfield Secure Certificate Authority - G2,OU=http://certs.starfieldtech.com/repository/,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=USKey Usages
KeyUsageCertSign
KeyUsageCRLSign
0b:e6:3a:c9:92:ef:67:baCertificate
IssuerCN=Starfield Secure Certificate Authority - G2,OU=http://certs.starfieldtech.com/repository/,O=Starfield Technologies\, Inc.,L=Scottsdale,ST=Arizona,C=USNot Before09/09/2020, 07:00Not After09/09/2025, 07:00SubjectCN=Starfield Timestamp Authority - G2,O=Starfield Technologies\, LLC,L=Scottsdale,ST=Arizona,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
0e:ae:16:6a:58:9c:df:0d:ed:f9:f7:b7:04:7d:97:d4:67:16:58:40Signer
Actual PE Digest0e:ae:16:6a:58:9c:df:0d:ed:f9:f7:b7:04:7d:97:d4:67:16:58:40Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathIsDirectoryA
kernel32
lstrcatA
SetLastError
GlobalAlloc
lstrcpyA
GetWindowsDirectoryA
GetDriveTypeA
SetFilePointer
GetFileAttributesA
GlobalLock
GlobalUnlock
GlobalFree
LCMapStringA
GetCommandLineA
Sleep
GetCurrentDirectoryA
GetDiskFreeSpaceA
MulDiv
FindFirstFileA
RemoveDirectoryA
FindNextFileA
FindClose
GetEnvironmentVariableA
GetFileSize
ReadFile
GetStartupInfoA
CreateProcessA
WaitForSingleObject
DeleteFileA
GetTickCount
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
Thread32Next
Thread32First
GetLastError
lstrcpynA
WriteFile
CreateFileA
DeviceIoControl
RtlMoveMemory
lstrcpyn
OpenThread
LoadLibraryA
MultiByteToWideChar
GetVersionExA
GetModuleHandleA
VirtualProtect
FreeLibrary
GetProcAddress
LoadLibraryExA
QueryDosDeviceA
GetCurrentProcessId
TerminateProcess
OpenProcess
Module32Next
CreateThread
GetSystemDirectoryA
GetTempPathA
GetTempFileNameA
WideCharToMultiByte
VirtualAllocEx
CopyFileA
Module32First
lstrlenA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
CloseHandle
GetCurrentProcess
QueryPerformanceFrequency
InterlockedExchange
GetLocaleInfoW
CompareStringW
CompareStringA
SetStdHandle
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
SetEnvironmentVariableA
SetEnvironmentVariableW
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
RtlUnwind
GetOEMCP
GetCPInfo
SetErrorMode
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
GlobalFlags
LocalReAlloc
GlobalReAlloc
GlobalHandle
LocalAlloc
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
LocalFree
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
InterlockedDecrement
CreateSemaphoreA
InterlockedIncrement
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
OpenFileMappingA
MapViewOfFile
SetEvent
UnmapViewOfFile
WaitNamedPipeA
SetNamedPipeHandleState
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersion
GetLocaleInfoA
GetTimeZoneInformation
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetProcAddress
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetACP
HeapSize
RaiseException
TerminateProcess
FindResourceA
RtlUnwind
GetCommandLineA
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
GetProcessVersion
LoadLibraryExA
FreeLibrary
GetModuleHandleA
lstrcpyn
DeviceIoControl
GetWindowsDirectoryA
ResumeThread
LocalSize
WriteProcessMemory
ReadProcessMemory
IsWow64Process
CloseHandle
CreateToolhelp32Snapshot
Process32First
GlobalFlags
GetVersion
lstrcpynA
lstrcpyA
IsBadCodePtr
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GlobalGetAtomNameA
LockResource
LoadResource
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
LoadLibraryA
WritePrivateProfileStringA
SetFilePointer
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetLocalTime
GetCurrentDirectoryA
GetDiskFreeSpaceExA
LCMapStringA
GetFileSize
ReadFile
Sleep
GlobalAddAtomA
WriteFile
GetModuleFileNameA
GetTickCount
IsBadReadPtr
SetStdHandle
lstrcatA
MulDiv
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
RtlFillMemory
RtlMoveMemory
CreateFileA
VirtualQueryEx
OpenProcess
GetEnvironmentVariableA
Process32Next
user32
GetDlgItem
IsWindowVisible
FindWindowExA
IsWindow
GetWindowThreadProcessId
GetWindowTextA
GetClassNameA
SetWindowPos
IsIconic
OpenIcon
GetForegroundWindow
FindWindowA
MessageBoxTimeoutA
EnumWindows
GetParent
GetAncestor
RegisterWindowMessageA
TrackMouseEvent
CallWindowProcA
SetMenuInfo
GetMenuInfo
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
DestroyMenu
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetWindowPlacement
SetFocus
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
SetForegroundWindow
GetActiveWindow
IsWindowEnabled
EnableWindow
GetWindow
PtInRect
GetWindowLongA
GetCursorPos
SetWindowLongA
UnregisterClassA
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
SendMessageA
GetWindowRect
GetSystemMetrics
UnregisterClassA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
TabbedTextOutA
DrawTextA
GrayStringA
SendDlgItemMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
UnhookWindowsHookEx
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
EndDialog
SetWindowLongA
PeekMessageA
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
GetDC
SetCursorPos
EnumWindows
GetAncestor
RegisterWindowMessageA
FindWindowA
SetWindowsHookExA
GetDlgItem
GetForegroundWindow
ReleaseDC
GetParent
DispatchMessageA
GetMessageA
IsWindowEnabled
TranslateMessage
GetLastActivePopup
wsprintfA
MessageBoxA
GetClassInfoA
gdi32
PtVisible
RectVisible
TextOutA
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
GetObjectA
GetStockObject
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
ExtTextOutA
Escape
SelectObject
DeleteDC
ScaleViewportExtEx
DeleteObject
OffsetViewportOrgEx
SetViewportExtEx
DeleteDC
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
Rectangle
CreateFontIndirectA
SelectObject
SetMapMode
Escape
GetDeviceCaps
SetTextColor
TextOutA
DeleteObject
ExtTextOutA
PtVisible
RectVisible
CreateBitmap
SetBkMode
SetBkColor
SetViewportOrgEx
GetStockObject
RestoreDC
SaveDC
GetObjectA
advapi32
RegOpenKeyExA
RegCloseKey
DeleteService
ControlService
StartServiceA
CloseServiceHandle
OpenServiceA
CreateServiceA
OpenSCManagerA
CryptDestroyKey
CryptDecrypt
CryptDeriveKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
RegOpenKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
DragAcceptFiles
Shell_NotifyIconA
DragFinish
DragQueryFileA
SHUpdateRecycleBinIcon
SHEmptyRecycleBinA
SHGetSpecialFolderPathA
SHQueryRecycleBinA
atl
ord42
ord42
psapi
GetModuleBaseNameA
GetProcessMemoryInfo
GetProcessImageFileNameA
dbghelp
MakeSureDirectoryPathExists
iphlpapi
GetAdaptersInfo
ws2_32
inet_addr
ntohs
send
setsockopt
recv
select
shutdown
getpeername
send
recv
getservbyname
htons
WSACleanup
WSAStartup
gethostbyname
inet_addr
inet_ntoa
closesocket
connect
setsockopt
ntohs
WSAGetLastError
socket
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
oleaut32
VariantInit
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantChangeType
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
ord17
oledlg
ord8
Sections
.text Size: 876KB - Virtual size: 875KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE