SetHook
Behavioral task
behavioral1
Sample
3377acc81209798e10f81ffeb33963a5ab2af6df1f9fe13d809c32b73326be51.dll
Resource
win7-20240903-en
General
-
Target
3377acc81209798e10f81ffeb33963a5ab2af6df1f9fe13d809c32b73326be51
-
Size
396KB
-
MD5
389ccdc593d532cb1f4461fae5db56aa
-
SHA1
76296a381f5a9564721c607bcd0575f971b08087
-
SHA256
3377acc81209798e10f81ffeb33963a5ab2af6df1f9fe13d809c32b73326be51
-
SHA512
98b04de61d260c714db7bedbdc398202727925a44583676cb5931c3781629712f51c4473e879b68fcc8fe3ed453ad220a516a51a920846d9bbc1a35d99d16680
-
SSDEEP
6144:CPotFYLJbFlhQuFlQmWEHwp7uuJr2D52/SH2gW14Z:TnyFFldFlxHHw7uu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3377acc81209798e10f81ffeb33963a5ab2af6df1f9fe13d809c32b73326be51
Files
-
3377acc81209798e10f81ffeb33963a5ab2af6df1f9fe13d809c32b73326be51.dll windows:4 windows x86 arch:x86
f87d7db7af40da24092eab8eefe8bc66
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LCMapStringA
GetProcAddress
FreeLibrary
GetModuleFileNameA
GetCommandLineA
CreateFileA
WriteFile
GetLocalTime
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
VirtualFree
SetWaitableTimer
CreateWaitableTimerA
OpenFileMappingA
WriteProcessMemory
WideCharToMultiByte
ReadProcessMemory
VirtualQueryEx
OpenProcess
GetCurrentProcess
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
UnmapViewOfFile
MapViewOfFile
VirtualAlloc
RtlMoveMemory
LoadLibraryA
InterlockedExchange
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetACP
RaiseException
HeapSize
RtlUnwind
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcpynA
FlushFileBuffers
LocalFree
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetVersion
lstrcatA
SetLastError
GlobalAlloc
Sleep
TerminateProcess
SetFilePointer
GetSystemDirectoryA
GetTempPathA
lstrlenA
GetWindowsDirectoryA
GetVersionExA
GetLastError
MultiByteToWideChar
lstrcpyA
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateThread
GlobalFree
GlobalUnlock
GlobalLock
GetVersion
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
RtlMoveMemory
RtlFillMemory
GetProcessHeap
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
lstrlenA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
CloseHandle
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetProcessVersion
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetCommandLineA
ResumeThread
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
GetModuleHandleA
GetTickCount
user32
PostThreadMessageA
MsgWaitForMultipleObjects
GetWindowThreadProcessId
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
SetWindowsHookExA
KillTimer
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
wvsprintfA
GetMessageTime
DestroyMenu
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessagePos
RegisterWindowMessageA
IsIconic
GetWindowPlacement
SetFocus
SetWindowPos
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
UnregisterClassA
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetForegroundWindow
ReleaseDC
GetDC
GetSystemMetrics
GetWindowRect
SendMessageA
GetClassNameA
SystemParametersInfoA
ShowWindow
GetDlgItem
SetWindowLongA
GetCursorPos
GetWindowTextA
EnumWindows
GetWindowLongA
IsWindowVisible
PtInRect
GetWindow
PostQuitMessage
PostMessageA
SetCursor
GetLastActivePopup
ValidateRect
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
LoadStringA
RegisterWindowMessageA
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetCursorPos
wsprintfA
MessageBoxA
SetMenuItemBitmaps
CheckMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SystemParametersInfoA
GetDlgItem
IsIconic
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
DestroyMenu
EnumWindows
GetAncestor
GetDC
EnableMenuItem
gdi32
SelectObject
DeleteDC
GetNearestPaletteIndex
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
CreatePalette
CreateDIBitmap
GetClipBox
GetObjectA
SetViewportOrgEx
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
SetTextColor
ScaleWindowExtEx
GetStockObject
SelectObject
RestoreDC
RectVisible
PtVisible
DeleteObject
DeleteDC
Rectangle
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetBkColor
CreateBitmap
SaveDC
SetMapMode
shlwapi
StrToIntExA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
comctl32
ord17
ord17
shell32
SHGetSpecialFolderPathA
Exports
Exports
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ