Behavioral task
behavioral1
Sample
070b7df1545bdc401c5ed026a6117f06c39ac5618310b12816bbeaf6352dff72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
070b7df1545bdc401c5ed026a6117f06c39ac5618310b12816bbeaf6352dff72.exe
Resource
win10v2004-20240802-en
General
-
Target
070b7df1545bdc401c5ed026a6117f06c39ac5618310b12816bbeaf6352dff72
-
Size
4.9MB
-
MD5
b4824a5f69de72dc0336c87e6a5a349c
-
SHA1
7f5dc6048bef87800befe1c552068f5d7da39c7a
-
SHA256
070b7df1545bdc401c5ed026a6117f06c39ac5618310b12816bbeaf6352dff72
-
SHA512
5f3c92a46461b78c3402e0ecd5d593c9b57b7467f65362d9979a631efda787c28b4bd3143c7523521c62a1404dc8586f5a54e7b0247152ee8d48edd3f86dfc77
-
SSDEEP
98304:m/4qnhD6HBnpg5negdwSfeP6cBMGZ7lo+H3FtoqFZojp:4tmpg9ASfeP6ceYH3FtoqFOl
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 070b7df1545bdc401c5ed026a6117f06c39ac5618310b12816bbeaf6352dff72
Files
-
070b7df1545bdc401c5ed026a6117f06c39ac5618310b12816bbeaf6352dff72.exe windows:4 windows x86 arch:x86
baf4f789674c5616a9a69a0d702e4b7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CopyFileA
SetFileAttributesA
WriteFile
CreateDirectoryA
GetFileSize
CreateFileA
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
Sleep
GetExitCodeProcess
ReadFile
PeekNamedPipe
CreateProcessW
CreatePipe
FindClose
FindFirstFileW
Process32Next
Process32First
CreateToolhelp32Snapshot
GetProcAddress
GetModuleHandleA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
CloseHandle
GetTickCount
GetTimeZoneInformation
SetLastError
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
InterlockedIncrement
InterlockedDecrement
lstrlenA
GlobalUnlock
LocalFree
GetLastError
lstrcpynA
EnterCriticalSection
lstrcpyA
LocalAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
SetFilePointer
FlushFileBuffers
TlsAlloc
GlobalFree
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
lstrcatA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
GetSystemTime
GetLocalTime
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetWaitableTimer
CreateWaitableTimerA
RtlMoveMemory
lstrcpyn
CreateEventA
OpenEventA
user32
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuItemCount
UnhookWindowsHookEx
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
SendMessageA
PostMessageA
PostQuitMessage
SetWindowTextA
PtInRect
GetClassNameA
GetSystemMetrics
GetWindowTextA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallWindowProcA
WaitForInputIdle
MsgWaitForMultipleObjects
UnregisterClassA
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetViewportExtEx
PtVisible
GetDeviceCaps
GetObjectA
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
CreateBitmap
advapi32
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegFlushKey
RegQueryValueExA
RegOpenKeyExW
RegQueryInfoKeyA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyA
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
rasapi32
RasHangUpA
RasGetConnectStatusA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
wsock32
WSAStartup
WSACleanup
select
closesocket
recv
send
wininet
InternetCloseHandle
InternetSetOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetConnectA
InternetOpenA
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.7MB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmps0 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ