Behavioral task
behavioral1
Sample
c1bf32dcc896f0b79d10893fea62460742682c745abfaacf14521bf21f76c850.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1bf32dcc896f0b79d10893fea62460742682c745abfaacf14521bf21f76c850.exe
Resource
win10v2004-20241007-en
General
-
Target
c1bf32dcc896f0b79d10893fea62460742682c745abfaacf14521bf21f76c850
-
Size
4.8MB
-
MD5
22630536641291cdaea0c63b6ddfffa0
-
SHA1
cf02de4e3dd610b09e647765cd36867d519b4fe7
-
SHA256
c1bf32dcc896f0b79d10893fea62460742682c745abfaacf14521bf21f76c850
-
SHA512
8e80de6d0357e0fd3452618f8e595054140f9746fea3cf3a43e92fad449fdc0a71bae71b0182e3b666a3577056f320274415bacecf7b509939b44f7ff6ffa017
-
SSDEEP
49152:zNCHUAwlenFzFiZwJQITZlqt2wrd5eQ35esIC+Fza7z22CuNV/V:BCHUHeFiZCQUvwppIba79CuNV9
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1bf32dcc896f0b79d10893fea62460742682c745abfaacf14521bf21f76c850
Files
-
c1bf32dcc896f0b79d10893fea62460742682c745abfaacf14521bf21f76c850.exe windows:4 windows x86 arch:x86
591097599573ad71955c82c98ffcd9ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FormatMessageA
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
VirtualFreeEx
GetCurrentProcess
IsWow64Process
SetWaitableTimer
CreateWaitableTimerA
RtlMoveMemory
VirtualAlloc
GetProcessId
GetFileAttributesA
CloseHandle
WaitForSingleObject
GetProcessHeap
GetProcAddress
TlsFree
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
SetErrorMode
GetProcessVersion
GetCurrentThreadId
InterlockedCompareExchange
GetSystemInfo
VirtualQuery
VirtualProtect
SetStdHandle
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
MultiByteToWideChar
Sleep
IsBadWritePtr
IsBadStringPtrA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
lstrlenW
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
MulDiv
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LockResource
LoadResource
FindResourceA
GetProcessVersion
FlushFileBuffers
ReadFile
RtlMoveMemory
SetEndOfFile
GetStringTypeExA
GetExitCodeProcess
HeapCreate
HeapDestroy
ExitProcess
HeapReAlloc
InterlockedExchange
SetFilePointer
WriteFile
GetTickCount
FindNextFileA
FindFirstFileA
FindClose
GetUserDefaultLCID
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileSize
GetVersionExA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
PeekNamedPipe
CloseHandle
CreateProcessA
CreatePipe
WideCharToMultiByte
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetProcessHeap
HeapFree
GetLocaleInfoA
LoadLibraryA
GetProcAddress
IsBadCodePtr
CopyFileA
GetFileAttributesA
CreateThread
lstrcpyn
GetModuleHandleA
lstrlenA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCPInfo
GetOEMCP
GetStdHandle
SetHandleCount
GetTempPathA
GetACP
RtlUnwind
RaiseException
TerminateProcess
HeapSize
IsBadReadPtr
HeapAlloc
CreateFileA
GetCurrentProcess
VirtualFreeEx
GlobalReAlloc
user32
CallWindowProcA
GetWindowInfo
SetWindowLongA
MessageBoxA
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDC
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetCursorPos
MsgWaitForMultipleObjects
RegisterWindowMessageA
PostMessageA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
GetMenuItemCount
UnhookWindowsHookEx
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
EnumWindows
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
PtInRect
EndDialog
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
CreateDialogIndirectParamA
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
EndDialog
PostQuitMessage
wsprintfA
GetMenuItemID
GetSubMenu
UnregisterClassA
GetClassNameA
PtInRect
GetDlgCtrlID
GetNextDlgTabItem
ClientToScreen
SetWindowTextA
LoadBitmapA
GetMenuCheckMarkDimensions
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
GetMenuState
ModifyMenuA
RegisterClipboardFormatA
SetMenuItemBitmaps
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
EnableMenuItem
CheckMenuItem
GetWindowTextA
UnhookWindowsHookEx
GetWindowRect
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
GetWindow
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GrayStringA
DrawTextA
GetFocus
shlwapi
PathFindFileNameA
PathFindExtensionA
StrTrimA
PathFindFileNameA
PathFileExistsA
PathFindExtensionA
ole32
CoFreeUnusedLibraries
CLSIDFromProgID
OleUninitialize
OleInitialize
OleIsCurrentClipboard
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
CoInitialize
CoRegisterMessageFilter
OleFlushClipboard
CoRevokeClassObject
CLSIDFromProgID
CLSIDFromString
OleRun
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
ShellExecuteExA
ord155
SHOpenFolderAndSelectItems
SHGetSpecialFolderPathA
ShellExecuteA
ord189
advapi32
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
RegOpenCurrentUser
RegCloseKey
RegCloseKey
CryptDestroyHash
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
CryptDestroyKey
CryptReleaseContext
CryptImportKey
CryptDecrypt
CryptAcquireContextA
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptEncrypt
CryptGetKeyParam
CryptSetKeyParam
CryptExportKey
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
RemoveFontResourceA
GetObjectA
GetStockObject
GetClipBox
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
ScaleViewportExtEx
PtVisible
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
CreateBitmap
GetStockObject
GetObjectA
SetWindowExtEx
oleaut32
GetActiveObject
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantTimeToSystemTime
VarR8FromCy
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantClear
SysAllocString
VariantCopy
SafeArrayDestroy
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SysFreeString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
gdiplus
GdiplusStartup
advpack
IsNTAdmin
ntdll
RtlGetCompressionWorkSpaceSize
NtReleaseSemaphore
NtClose
NtCreateSemaphore
RtlCompressBuffer
RtlComputeCrc32
RtlDecompressBuffer
NtWaitForSingleObject
dbghelp
MakeSureDirectoryPathExists
wininet
InternetTimeToSystemTime
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpSetTimeouts
crypt32
CryptDecodeObjectEx
CertCloseStore
CryptImportPublicKeyInfo
CertFreeCertificateContext
CryptStringToBinaryA
bcrypt
BCryptImportKeyPair
BCryptGetProperty
BCryptCreateHash
BCryptHashData
BCryptVerifySignature
BCryptDestroyKey
BCryptSignHash
BCryptFinishHash
BCryptCloseAlgorithmProvider
BCryptDestroyHash
BCryptOpenAlgorithmProvider
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
ord17
oledlg
ord8
ord8
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.4MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ