Behavioral task
behavioral1
Sample
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe
Resource
win7-20240903-en
General
-
Target
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144
-
Size
1.7MB
-
MD5
2af63a995177fae320cc58227e6350be
-
SHA1
41438e5f51d8fd1f40c48dad31c721f3b4bd1b12
-
SHA256
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144
-
SHA512
9aa3de8f54224203a8dd740319feed006d05eb18c51ac5b80a9aeafef20131699806f3a1d3307370acc79b194f5a9bdc31dc50ead63a16bd828bb69cb9e4dead
-
SSDEEP
49152:SFlg29tTVgm/I07S1NaPN5p0sUPYu7Udj:4R8WI07oaXpMAV
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144
Files
-
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe windows:5 windows x86 arch:x86
d9b4143f8f0dce904d4630b6d7f36d07
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
LCMapStringA
FreeLibrary
GetCommandLineA
GetFileSize
GetTickCount
WritePrivateProfileStringA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
MulDiv
GetCurrentDirectoryA
GetVolumeInformationA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
HeapReAlloc
ExitProcess
CancelWaitableTimer
VirtualAlloc
VirtualFree
HeapDestroy
TryEnterCriticalSection
SetCriticalSectionSpinCount
DeleteCriticalSection
HeapFree
HeapAlloc
HeapCreate
CreateEventA
WaitForMultipleObjects
SetEvent
lstrcpyn
RtlMoveMemory
GlobalMemoryStatusEx
GetProcessId
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
MoveFileA
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
SetFilePointerEx
CreateFileA
CreateFileW
TlsSetValue
IsBadReadPtr
TlsGetValue
DeleteFileA
GetTempPathW
lstrlenW
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
HeapSize
TerminateProcess
SetThreadAffinityMask
InterlockedExchange
LeaveCriticalSection
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
SwitchToThread
InterlockedCompareExchange
EnterCriticalSection
CloseHandle
CreateThread
SetProcessDEPPolicy
GetProcessHeap
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
GetModuleHandleA
IsWow64Process
GetCurrentProcess
GetSystemInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetFilePointer
GetLastError
GetDriveTypeA
Sleep
lstrcpyA
lstrlenA
SetLastError
lstrcatA
QueryPerformanceCounter
GetVersion
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RtlUnwind
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualQuery
GetStringTypeW
LoadLibraryW
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalFree
lstrcpynA
LocalAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
LocalReAlloc
GlobalFlags
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
RtlMoveMemory
GetProcAddress
FreeLibrary
LoadLibraryA
VirtualProtectEx
LCMapStringA
IsBadReadPtr
GetEnvironmentVariableA
ExitProcess
user32
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
GetWindowPlacement
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
SetWindowsHookExA
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetActiveWindow
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetForegroundWindow
SetFocus
GetWindowThreadProcessId
ShowWindowAsync
PostMessageA
PostQuitMessage
MsgWaitForMultipleObjects
IsWindow
GetSystemMetrics
FindWindowExA
GetForegroundWindow
DestroyIcon
GetDC
FillRect
DrawIconEx
ReleaseDC
SendInput
MapVirtualKeyA
GetLastInputInfo
LoadImageA
EnumDisplaySettingsA
IsIconic
IsWindowVisible
GetWindowRect
GetClientRect
ClientToScreen
OpenClipboard
GetClipboardData
GetAncestor
CloseClipboard
EmptyClipboard
SetClipboardData
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetParent
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
SetWindowPos
AttachThreadInput
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetClassNameA
SendMessageA
GetCapture
BringWindowToTop
MessageBoxA
wsprintfA
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
SystemTimeToVariantTime
OleLoadPicture
VarR8FromCy
VarR8FromBool
VariantTimeToSystemTime
VariantTimeToSystemTime
shlwapi
PathFindExtensionA
PathFindFileNameA
gdi32
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
GetDeviceCaps
SetDIBitsToDevice
GetDIBits
SetPixelV
GetPixel
GdiFlush
BitBlt
GetObjectA
CreateDIBSection
SetTextColor
DeleteDC
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetBkColor
RestoreDC
SaveDC
CreateBitmap
DeleteObject
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegOpenKeyA
RegCloseKey
OpenProcessToken
GetTokenInformation
RegQueryValueExA
shell32
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
ShellExecuteA
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoUninitialize
CoCreateGuid
CoInitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
msvcrt
sprintf
atoi
_ftol
strchr
free
malloc
strstr
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 433KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ