Behavioral task
behavioral1
Sample
d3cc4f5633ec257ed81a2819d0174acfd7b8cdd2c42d7b2fd58ecc3e4c107cf0.exe
Resource
win7-20240729-en
General
-
Target
d3cc4f5633ec257ed81a2819d0174acfd7b8cdd2c42d7b2fd58ecc3e4c107cf0
-
Size
7.8MB
-
MD5
79ec39108f6edd20635c136113dfbaef
-
SHA1
6444524c1bba5f7c8d123a2405da82f4e6b8e3bf
-
SHA256
d3cc4f5633ec257ed81a2819d0174acfd7b8cdd2c42d7b2fd58ecc3e4c107cf0
-
SHA512
24959ccba04533c1656e05b577dfdade93f705c71c90ccc0685024a74457e5c555325ede271d337cae5da96cb8604675993d640353c0e20f51633743dbdd143f
-
SSDEEP
98304:CWEwEK4Qt80/fmubP5HYS/2AA8lbpHhB8sr3xeRPFSEeX6v8k4kxnJn3SJBAUZLN:zDHYSjA8lV/meXJ9eJn3SJVb8+H
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3cc4f5633ec257ed81a2819d0174acfd7b8cdd2c42d7b2fd58ecc3e4c107cf0
Files
-
d3cc4f5633ec257ed81a2819d0174acfd7b8cdd2c42d7b2fd58ecc3e4c107cf0.exe windows:4 windows x86 arch:x86
896f8758fdf22e327f0a1eebff728787
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
GetProcessVersion
FindResourceA
LoadResource
GetExitCodeProcess
Sleep
LCMapStringW
LockResource
GetLocaleInfoA
SetLastError
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetLastError
GetStringTypeW
SetStdHandle
GetStringTypeA
SetEndOfFile
GetStringTypeExA
GetCPInfo
GetOEMCP
ReadFile
IsBadWritePtr
RtlUnwind
RaiseException
TerminateProcess
GetFileAttributesA
InterlockedIncrement
WritePrivateProfileStringA
CreateThread
GlobalFlags
CopyFileA
LocalFree
LocalAlloc
GlobalDeleteAtom
lstrcmpA
GetACP
CreateFileA
SetUnhandledExceptionFilter
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
LocalReAlloc
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetSystemDirectoryA
GetTempPathA
RtlMoveMemory
GetVersion
lstrcpyn
IsBadStringPtrA
GetProcAddress
HeapFree
LoadLibraryA
GetProcessHeap
SetHandleCount
IsBadCodePtr
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualFree
GetModuleFileNameA
VirtualProtect
WriteFile
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentProcessId
GetEnvironmentVariableA
SetEnvironmentVariableA
GlobalAlloc
FreeLibrary
WideCharToMultiByte
HeapCreate
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleA
lstrlenA
HeapAlloc
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapDestroy
GetWindowsDirectoryA
HeapSize
GetEnvironmentStringsW
MultiByteToWideChar
GetCurrentProcess
VirtualFreeEx
lstrlenW
CreatePipe
CreateProcessA
CloseHandle
PeekNamedPipe
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
GetCommandLineA
DeleteFileA
GetFileSize
GetVersionExA
FindClose
FindFirstFileA
FindNextFileA
GetTickCount
SetFilePointer
GlobalLock
GlobalUnlock
GetUserDefaultLCID
IsBadReadPtr
HeapReAlloc
ExitProcess
GlobalFree
MulDiv
CompareStringA
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
GetEnvironmentVariableA
GetFileType
GetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
GetSystemTime
GetTimeZoneInformation
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
InterlockedDecrement
InterlockedIncrement
CompareStringW
IsBadCodePtr
GetACP
SuspendThread
ReleaseMutex
CreateMutexA
UnmapViewOfFile
TerminateThread
GetTempPathW
CreateFileW
SetFilePointer
GetFileSize
DeleteFileW
GetVersionExW
LoadLibraryW
VirtualQuery
GetModuleHandleW
ResumeThread
GetProfileStringA
WriteFile
WaitForMultipleObjects
SetStdHandle
CreateFileA
SetEvent
FindResourceA
LoadResource
LockResource
ReadFile
GlobalSize
GlobalFree
lstrcatA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
GetUserDefaultLCID
GetFullPathNameA
FreeLibrary
GetLastError
GetVersionExA
WritePrivateProfileStringA
CreateEventA
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FindClose
SetCurrentDirectoryA
GetVolumeInformationA
MulDiv
GetCommandLineA
GetTickCount
lstrcpynA
ReleaseSemaphore
QueryPerformanceFrequency
QueryPerformanceCounter
WaitForSingleObject
CreateSemaphoreA
DeleteCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetProcessWorkingSetSize
HeapReAlloc
lstrcmpA
lstrcmpiW
HeapDestroy
HeapCreate
lstrcmpW
RtlZeroMemory
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
SetHandleCount
VirtualQueryEx
GetCurrentProcess
MultiByteToWideChar
TerminateProcess
GetCurrentProcessId
Sleep
CreateWaitableTimerA
SetWaitableTimer
CloseHandle
GetCurrentThreadId
RemoveDirectoryA
CreateThread
GetLocalTime
lstrlenW
WideCharToMultiByte
lstrcpyn
lstrlenA
GetProcessHeap
HeapFree
HeapAlloc
GetModuleHandleA
VirtualAlloc
LoadLibraryA
GetProcAddress
VirtualFree
GetModuleFileNameA
VirtualProtect
RtlMoveMemory
GetFileAttributesA
OpenProcess
ExitProcess
IsBadReadPtr
user32
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnhookWindowsHookEx
UnregisterClassA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
DestroyMenu
LoadIconA
SetWindowTextA
GetWindowTextA
GetMenuItemCount
PostQuitMessage
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetMessageA
CreateDialogIndirectParamA
LoadCursorA
GetSysColorBrush
LoadStringA
ClientToScreen
EndDialog
PostThreadMessageA
GetWindow
PeekMessageA
SystemParametersInfoA
RegisterClassA
GetMenuItemCount
GetMenuItemID
SetWindowsHookExA
CallNextHookEx
GetClassLongA
UnhookWindowsHookEx
GetMessageTime
GetLastActivePopup
GetForegroundWindow
RegisterWindowMessageA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
CharUpperA
GetWindowTextLengthA
GetWindowTextA
GetScrollPos
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
SetWindowTextA
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
MsgWaitForMultipleObjects
GetInputState
IsWindow
GetPropA
RemovePropA
DestroyWindow
SetWindowLongA
SetPropA
CreateWindowExA
IsWindowVisible
ShowWindow
IsZoomed
GetSysColorBrush
GetWindowRect
MoveWindow
GetDC
UpdateLayeredWindow
ReleaseDC
DefWindowProcA
CallWindowProcA
GetParent
GetAncestor
GetClassNameA
SendMessageA
SetWindowLongW
CallWindowProcW
wsprintfA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
DestroyCursor
SetParent
PostMessageA
GetTopWindow
GetFocus
GetClientRect
LockWindowUpdate
InvalidateRect
UnregisterClassA
UpdateWindow
EqualRect
SetForegroundWindow
DestroyMenu
IsChild
IsRectEmpty
FillRect
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
GetWindowLongA
RedrawWindow
EnableWindow
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
GetClassInfoA
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
TranslateAcceleratorA
IsWindowEnabled
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
TranslateMessage
LoadIconA
MessageBoxW
GetDesktopWindow
EmptyClipboard
AdjustWindowRectEx
IsIconic
ValidateRect
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Shell_NotifyIconA
ShellExecuteA
shlwapi
PathFindFileNameA
StrTrimA
PathFileExistsA
PathFindExtensionA
StrToIntW
PathIsDirectoryW
StrToIntExW
ole32
CLSIDFromProgID
CoFreeUnusedLibraries
CLSIDFromProgID
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleUninitialize
CLSIDFromString
OleInitialize
CoCreateInstance
OleRun
CoUninitialize
CoRegisterMessageFilter
CoInitialize
OleInitialize
OleUninitialize
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CoCreateGuid
dbghelp
MakeSureDirectoryPathExists
wininet
InternetTimeToSystemTime
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetSetOptionA
HttpOpenRequestA
InternetConnectA
InternetOpenA
HttpSendRequestA
crypt32
CertCloseStore
CryptDecodeObjectEx
CryptImportPublicKeyInfo
CertFreeCertificateContext
CryptStringToBinaryA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
CryptExportKey
CryptAcquireContextA
CryptDestroyHash
CryptDestroyKey
CryptReleaseContext
CryptImportKey
CryptSetKeyParam
CryptGetKeyParam
CryptEncrypt
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDecrypt
CryptDestroyHash
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
RegSetValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
RegCreateKeyExA
CryptReleaseContext
RegQueryValueA
winhttp
WinHttpSetTimeouts
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpOpen
WinHttpSetCredentials
WinHttpWriteData
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
gdi32
ScaleWindowExtEx
RectVisible
GetClipBox
GetDeviceCaps
TextOutA
SetWindowExtEx
PtVisible
ExtTextOutA
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
SetViewportOrgEx
OffsetViewportOrgEx
Escape
SetViewportExtEx
ScaleViewportExtEx
GetObjectA
GetStockObject
CreateBitmap
DeleteObject
StartDocA
StartPage
GetTextMetricsA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
ExtSelectClipRgn
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
BitBlt
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
EndDoc
EndPage
GetObjectA
GetStockObject
CreateFontIndirectA
CreateSolidBrush
FillRgn
CombineRgn
PatBlt
CreatePen
CreateBitmap
CreateDCA
DeleteObject
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
GetTextColor
CreateRoundRectRgn
CreateEllipticRgn
PathToRegion
EndPath
BeginPath
GetWindowOrgEx
GetViewportOrgEx
GetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
StretchBlt
CreatePalette
GetSystemPaletteEntries
CreateDIBitmap
SelectClipRgn
CreatePolygonRgn
GetClipRgn
SetStretchBltMode
CreateRectRgnIndirect
SetBkColor
GetNearestPaletteIndex
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
GetDeviceCaps
CreateRectRgn
DeleteDC
CreateCompatibleDC
CreateDIBSection
SelectObject
OffsetViewportOrgEx
CreateCompatibleBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
ImageList_Destroy
ord17
ImageList_Create
oledlg
ord8
oleaut32
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysFreeString
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
VariantTimeToSystemTime
UnRegisterTypeLi
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayPutElement
SafeArrayCreate
SafeArrayDestroy
SysAllocString
VariantInit
VariantCopyInd
SafeArrayGetElement
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantChangeType
VariantClear
VariantCopy
winmm
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamOpen
midiStreamRestart
waveOutUnprepareHeader
waveOutRestart
waveOutPrepareHeader
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
midiStreamClose
ws2_32
recv
ioctlsocket
recvfrom
WSAAsyncSelect
getpeername
accept
ntohl
inet_ntoa
WSACleanup
closesocket
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
GetFileTitleA
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 692KB - Virtual size: 905KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ