pengxx
Behavioral task
behavioral1
Sample
e5eb9c4aadd64e3cda89d9e7f28e856474af4652f7e59107a7fd2c8aa3bf70dc.dll
Resource
win7-20240903-en
General
-
Target
e5eb9c4aadd64e3cda89d9e7f28e856474af4652f7e59107a7fd2c8aa3bf70dc
-
Size
4.2MB
-
MD5
02948a5cfe1f41a8549d9e1d87bd9d1c
-
SHA1
a20f253e0c57e3264eb9619c151a050417c24c0b
-
SHA256
e5eb9c4aadd64e3cda89d9e7f28e856474af4652f7e59107a7fd2c8aa3bf70dc
-
SHA512
341fb1fcaef20962fb9ec26fd6b603409039f03b48274e9b0bfe1d3ee00647f6c5d90cf9127907219e311e0e5c7edc753f2edd07180b2547ff08be4715d08606
-
SSDEEP
49152:Cw9RXfzjfVx5suEkzypp4HhaIrVZs+y/fh8kMIfSN89eeCnAkZJSJd5dRlQ1Oew+:97XfzjtxWiDrVZs34bN8oD65pMS9uP
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5eb9c4aadd64e3cda89d9e7f28e856474af4652f7e59107a7fd2c8aa3bf70dc
Files
-
e5eb9c4aadd64e3cda89d9e7f28e856474af4652f7e59107a7fd2c8aa3bf70dc.dll windows:4 windows x86 arch:x86
b3ed6dcab13e6e68c6d8a17e797c769f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateProcess
Sleep
lstrcpyA
GlobalAlloc
SetLastError
lstrcatA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
CreateThread
DeleteCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
lstrcpynA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadCodePtr
InterlockedExchange
VirtualProtect
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
FreeLibrary
GetCommandLineA
SetFilePointer
LCMapStringA
GlobalLock
GlobalUnlock
GetTickCount
DeleteFileA
WriteFile
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
GetProcAddress
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
lstrlenW
SetWaitableTimer
CreateWaitableTimerA
Module32Next
Module32First
CreateToolhelp32Snapshot
LocalFree
LocalAlloc
lstrcpyn
GetSystemTimeAsFileTime
CloseHandle
VirtualProtectEx
VirtualQueryEx
VirtualQuery
OpenProcess
GetCurrentProcessId
ReadProcessMemory
RtlMoveMemory
IsBadReadPtr
lstrcmpiA
user32
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
UnregisterClassA
DestroyWindow
GetCursorPos
GetDlgItem
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetClassNameA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
CallNextHookEx
LoadBitmapA
ClientToScreen
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
MessageBoxA
SetWindowLongA
IsWindowVisible
MsgWaitForMultipleObjects
SendMessageA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoUninitialize
StringFromGUID2
CreateStreamOnHGlobal
GetHGlobalFromStream
CLSIDFromString
shlwapi
StrFromTimeIntervalA
PathFileExistsA
ws2_32
WSAStartup
gdi32
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
ExtTextOutA
GetObjectA
GetStockObject
TextOutA
RectVisible
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
ScaleViewportExtEx
gdiplus
GdipGetImageEncodersSize
GdipSetTextRenderingHint
GdipGetSmoothingMode
GdiplusStartup
GdipGetImageGraphicsContext
GdipGetImageEncoders
GdipSaveImageToStream
GdipSetSmoothingMode
GdipSetWorldTransform
GdipDrawRectangle
GdipDrawRectangleI
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipGetTextRenderingHint
oleaut32
VariantTimeToSystemTime
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
iphlpapi
GetAdaptersInfo
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
Exports
Exports
Sections
.text Size: 668KB - Virtual size: 666KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.8MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 668KB - Virtual size: 667KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ