Behavioral task
behavioral1
Sample
2f83d8d2f98d54b5702dca4a8ada8d69708f4407ce1d9a88e1b09d3731cef745.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f83d8d2f98d54b5702dca4a8ada8d69708f4407ce1d9a88e1b09d3731cef745.exe
Resource
win10v2004-20241007-en
General
-
Target
2f83d8d2f98d54b5702dca4a8ada8d69708f4407ce1d9a88e1b09d3731cef745
-
Size
4.8MB
-
MD5
f7af91c038d14738dac2a9736cb44056
-
SHA1
82cdad56c1120110057cce6a40929230f9f4b013
-
SHA256
2f83d8d2f98d54b5702dca4a8ada8d69708f4407ce1d9a88e1b09d3731cef745
-
SHA512
e484026ec1aca33c8503cbcba6af1261e1247cc1146ce35f458d2158f6fad8f5e4b3e786faed8bdcf186e305a88d3690263ef14f09199709c03f6c39a0602d6f
-
SSDEEP
49152:WJt5LYi53K6/sazi/lQfDTtlft2wrd5eQ35esIC+Fza7z22ECNV/Y:At5LYgaWNi/WfdawppIba79ECNVw
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f83d8d2f98d54b5702dca4a8ada8d69708f4407ce1d9a88e1b09d3731cef745
Files
-
2f83d8d2f98d54b5702dca4a8ada8d69708f4407ce1d9a88e1b09d3731cef745.exe windows:4 windows x86 arch:x86
ed64ad54cea418a407c43ae0bce0edba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FormatMessageA
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
VirtualFreeEx
GetCurrentProcess
IsWow64Process
SetWaitableTimer
CreateWaitableTimerA
RtlMoveMemory
VirtualAlloc
GetProcessId
GetFileAttributesA
CloseHandle
WaitForSingleObject
GetProcessHeap
GetProcAddress
TlsFree
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
SetErrorMode
GetProcessVersion
GetCurrentThreadId
InterlockedCompareExchange
GetSystemInfo
VirtualQuery
VirtualProtect
lstrcpyn
SetStdHandle
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
Sleep
IsBadWritePtr
GetModuleHandleA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
lstrlenW
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
MulDiv
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LockResource
LoadResource
FindResourceA
GetProcessVersion
FlushFileBuffers
ReadFile
GetProcAddress
SetEndOfFile
GetStringTypeExA
GetExitCodeProcess
HeapCreate
HeapDestroy
ExitProcess
HeapReAlloc
InterlockedExchange
GetTickCount
FindNextFileA
FindFirstFileA
FindClose
SetFilePointer
WriteFile
GetUserDefaultLCID
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileSize
GetVersionExA
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
PeekNamedPipe
CloseHandle
CreateProcessA
CreatePipe
WideCharToMultiByte
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
CreateThread
IsBadStringPtrA
GetProcessHeap
HeapFree
RtlMoveMemory
GetLocaleInfoA
LoadLibraryA
IsBadCodePtr
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
CopyFileA
GetFileAttributesA
GetCPInfo
GetOEMCP
GetStdHandle
SetHandleCount
HeapAlloc
GetACP
RtlUnwind
RaiseException
TerminateProcess
HeapSize
IsBadReadPtr
MultiByteToWideChar
CreateFileA
GetCurrentProcess
VirtualFreeEx
GlobalReAlloc
user32
CallWindowProcA
GetWindowInfo
SetWindowLongA
MessageBoxA
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDC
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetCursorPos
MsgWaitForMultipleObjects
RegisterWindowMessageA
PostMessageA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
GetMenuItemCount
UnhookWindowsHookEx
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
EnumWindows
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
PtInRect
EndDialog
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
CreateDialogIndirectParamA
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
EndDialog
PostQuitMessage
wsprintfA
GetMenuItemID
GetSubMenu
UnregisterClassA
GetClassNameA
PtInRect
GetDlgCtrlID
GetNextDlgTabItem
ClientToScreen
SetWindowTextA
LoadBitmapA
GetMenuCheckMarkDimensions
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
GetMenuState
ModifyMenuA
RegisterClipboardFormatA
SetMenuItemBitmaps
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
MessageBoxA
PostThreadMessageA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
EnableMenuItem
CheckMenuItem
GetWindowTextA
UnhookWindowsHookEx
GetWindowRect
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
CreateDialogIndirectParamA
GetWindow
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GrayStringA
DrawTextA
GetFocus
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
PathFindExtensionA
StrTrimA
PathFindFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
OleRun
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
ShellExecuteExA
ord155
SHOpenFolderAndSelectItems
ShellExecuteA
SHGetSpecialFolderPathA
ord189
advapi32
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
RegOpenCurrentUser
RegCloseKey
RegCloseKey
CryptDestroyHash
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
RegSetValueExA
CryptReleaseContext
CryptImportKey
CryptDecrypt
CryptAcquireContextA
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptEncrypt
CryptGetKeyParam
CryptSetKeyParam
CryptExportKey
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
RemoveFontResourceA
GetObjectA
GetStockObject
GetClipBox
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
ScaleViewportExtEx
PtVisible
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportExtEx
CreateBitmap
GetStockObject
GetObjectA
SetWindowExtEx
oleaut32
GetActiveObject
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantTimeToSystemTime
VarR8FromCy
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantClear
SysAllocString
VariantCopy
SafeArrayDestroy
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SysFreeString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
gdiplus
GdiplusStartup
advpack
IsNTAdmin
ntdll
NtCreateSemaphore
NtClose
NtReleaseSemaphore
RtlDecompressBuffer
NtWaitForSingleObject
RtlComputeCrc32
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
dbghelp
MakeSureDirectoryPathExists
wininet
InternetTimeToSystemTime
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpSetTimeouts
crypt32
CryptDecodeObjectEx
CertCloseStore
CryptImportPublicKeyInfo
CertFreeCertificateContext
CryptStringToBinaryA
bcrypt
BCryptImportKeyPair
BCryptGetProperty
BCryptCreateHash
BCryptHashData
BCryptVerifySignature
BCryptDestroyKey
BCryptSignHash
BCryptFinishHash
BCryptCloseAlgorithmProvider
BCryptDestroyHash
BCryptOpenAlgorithmProvider
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
ord17
oledlg
ord8
ord8
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.4MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ