Behavioral task
behavioral1
Sample
dde5bc4b021035503f3686b1fb3b8c1a2a74a04b11419505a9630a348e7ab4e7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dde5bc4b021035503f3686b1fb3b8c1a2a74a04b11419505a9630a348e7ab4e7.exe
Resource
win10v2004-20240802-en
General
-
Target
dde5bc4b021035503f3686b1fb3b8c1a2a74a04b11419505a9630a348e7ab4e7
-
Size
948KB
-
MD5
3fcb2a945cbb08ac51017e545b5b3b73
-
SHA1
34270f015fe49219f74260d08adbe68a330e4477
-
SHA256
dde5bc4b021035503f3686b1fb3b8c1a2a74a04b11419505a9630a348e7ab4e7
-
SHA512
3469415b20cf24411e30081f605e747d9a221aef14318dd29b0d540ca946c8d54100fb527f75a089538f88b91d313b1e2a3332ac62a096cc312e5a404f7cf3d0
-
SSDEEP
24576:0rw9zcnQ+PFVpw5ToMyLe/Heyl/K9MqcOVXd:0SiQDR/+W/K65O5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dde5bc4b021035503f3686b1fb3b8c1a2a74a04b11419505a9630a348e7ab4e7
Files
-
dde5bc4b021035503f3686b1fb3b8c1a2a74a04b11419505a9630a348e7ab4e7.exe windows:4 windows x86 arch:x86
20163332505f5f4e999ee1513dac1dc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapAlloc
HeapFree
CreateThread
MultiByteToWideChar
GetCurrentProcessId
VirtualQueryEx
VirtualProtectEx
OpenProcess
ReadProcessMemory
WriteProcessMemory
LocalAlloc
LocalFree
lstrcpyn
GetModuleHandleA
ExitProcess
HeapReAlloc
IsBadReadPtr
GetModuleFileNameA
ReadFile
GetFileSize
CreateFileA
GetLocalTime
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
FlushFileBuffers
SetStdHandle
LCMapStringW
SetUnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
WideCharToMultiByte
lstrlenW
GetTickCount
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
IsBadCodePtr
CreateEventA
VirtualAlloc
VirtualFree
GetSystemInfo
SetLastError
VirtualProtect
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
GetStartupInfoA
GetVersion
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TlsSetValue
TlsAlloc
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
WriteFile
RaiseException
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
OpenEventA
user32
GetSystemMetrics
GetCursorPos
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
SetForegroundWindow
KillTimer
GetInputState
SetTimer
SetActiveWindow
AttachThreadInput
OpenIcon
IsIconic
SetWindowPos
GetWindowTextW
GetWindowTextLengthW
GetClassNameA
GetParent
GetWindowThreadProcessId
FindWindowExA
IsWindowVisible
advapi32
RegQueryValueA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptAcquireContextA
Sections
.text Size: 344KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 580KB - Virtual size: 636KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE