Behavioral task
behavioral1
Sample
29f490bb3bfb02806e60d1c73af60d75800f77a474c7ce8c1b476ed8a7e382d3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
29f490bb3bfb02806e60d1c73af60d75800f77a474c7ce8c1b476ed8a7e382d3.exe
Resource
win10v2004-20240802-en
General
-
Target
29f490bb3bfb02806e60d1c73af60d75800f77a474c7ce8c1b476ed8a7e382d3
-
Size
9.6MB
-
MD5
b297fe59b7897e3d1719b4124e8b1a78
-
SHA1
bf49dc20f14dab1e1de4a3d7d5fe6153dc82289e
-
SHA256
29f490bb3bfb02806e60d1c73af60d75800f77a474c7ce8c1b476ed8a7e382d3
-
SHA512
6e081f624d1cdf08088486dd144a019bb818fe198f34212080f6b343cdbd35616b19a4aca7ecee8f3d5cee04af1fa2832675a28b2599eeea86b43d34876b0993
-
SSDEEP
196608:iPams8foOIpBaE4z05akLguHdOUPwcpOGrDKyFsxXntYF2TZGAA:iPams8foOI+E4Y5aYgUd1pHDxSxSckh
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29f490bb3bfb02806e60d1c73af60d75800f77a474c7ce8c1b476ed8a7e382d3
Files
-
29f490bb3bfb02806e60d1c73af60d75800f77a474c7ce8c1b476ed8a7e382d3.exe windows:4 windows x86 arch:x86
a7787b7dcfff1c3a21a6cc3765227f0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
LocalFree
FlushFileBuffers
lstrlenW
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
SetLastError
GlobalAlloc
lstrlenA
OpenProcess
GetVersionExA
GetCurrentProcess
GetLastError
SetFilePointer
GlobalLock
VirtualProtect
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
Process32Next
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpyA
lstrcatA
MulDiv
WideCharToMultiByte
CreateThread
CloseHandle
GetModuleHandleA
GetProcAddress
CreateWaitableTimerA
SetWaitableTimer
HeapCreate
HeapAlloc
HeapDestroy
HeapFree
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetTickCount
GetModuleFileNameA
WriteFile
CreateFileA
ReadFile
GetFileSize
WritePrivateProfileStringA
FindNextFileA
RemoveDirectoryA
FindFirstFileA
GetLocalTime
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
TlsSetValue
SetFileAttributesA
TerminateProcess
GetTempPathA
MoveFileA
CreateDirectoryA
FindClose
FindFirstFileW
MultiByteToWideChar
GetCurrentThreadId
Sleep
DeleteFileA
user32
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetSubMenu
GetMenuItemID
GetClassLongA
SetPropA
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
IsIconic
TabbedTextOutA
ClientToScreen
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostQuitMessage
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetDlgItem
SystemParametersInfoA
ReleaseDC
GetClassNameA
GetWindowRect
UnregisterHotKey
SetWindowLongA
SetCapture
SendMessageA
ScreenToClient
ReleaseCapture
RegisterHotKey
LoadBitmapA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
GetWindowPlacement
SetFocus
DrawTextA
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MapVirtualKeyA
MsgWaitForMultipleObjects
GetWindowInfo
GetClientRect
IsWindow
GetWindowThreadProcessId
GetCursorPos
SetWindowPos
SetLayeredWindowAttributes
MoveWindow
ShowWindow
PostMessageA
FindWindowA
UnregisterClassA
gdi32
CreateFontA
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
SelectObject
CreateBitmap
SaveDC
RestoreDC
GetObjectA
GetStockObject
SetBkColor
Escape
ExtTextOutA
TextOutA
RectVisible
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
PtVisible
DeleteObject
shlwapi
PathFileExistsA
wininet
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
InternetOpenA
shell32
DragFinish
DragQueryFileA
DragAcceptFiles
ShellExecuteA
comctl32
ord17
ImageList_EndDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_BeginDrag
ImageList_Add
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.text Size: 340KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9.2MB - Virtual size: 9.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ