Behavioral task
behavioral1
Sample
d85bbafe76362edbc670747e59961698163148cb5e82480e8821677319635238.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d85bbafe76362edbc670747e59961698163148cb5e82480e8821677319635238.exe
Resource
win10v2004-20241007-en
General
-
Target
d85bbafe76362edbc670747e59961698163148cb5e82480e8821677319635238
-
Size
4.7MB
-
MD5
bde49986ea4b8a4700bd937e57b6ce8e
-
SHA1
bb73c178f20909a2f3f2ea127e859342f2756e3a
-
SHA256
d85bbafe76362edbc670747e59961698163148cb5e82480e8821677319635238
-
SHA512
6cb314c27aae7e85f8ff67880c5318c1c7c9d279253f3dc2276c1506c92c4f4ab70e3b37b1963b2be362d0667bdd437d7af37b0831b6b8760846ca4b27ea896a
-
SSDEEP
49152:8ehiphRH11k0yioiYjh2+TTCCEt2wrd5eQ35esIC+Fza7z22CRNV/Y:bipht3ry5iY12+iIwppIba79CRNVg
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d85bbafe76362edbc670747e59961698163148cb5e82480e8821677319635238
Files
-
d85bbafe76362edbc670747e59961698163148cb5e82480e8821677319635238.exe windows:4 windows x86 arch:x86
d1b1eadec49d753d41b3deb62553ec11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FormatMessageA
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
VirtualFreeEx
GetCurrentProcess
IsWow64Process
SetWaitableTimer
CreateWaitableTimerA
RtlMoveMemory
VirtualAlloc
GetProcessId
GetFileAttributesA
CloseHandle
WaitForSingleObject
GetProcessHeap
GetProcAddress
TlsFree
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
SetErrorMode
GetProcessVersion
GetCurrentThreadId
CloseHandle
WriteFile
SetFilePointer
FindNextFileA
FindFirstFileA
FindClose
ReadFile
GetFileSize
GetCommandLineA
GetModuleFileNameA
FreeLibrary
LCMapStringA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
MulDiv
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetTickCount
LoadResource
GlobalAlloc
GetProcessVersion
FlushFileBuffers
IsBadStringPtrA
RtlMoveMemory
GetLocaleInfoA
LoadLibraryA
GetProcAddress
GetProcessHeap
lstrlenA
IsBadCodePtr
HeapFree
CreateThread
GetModuleHandleA
GetFileAttributesA
CopyFileA
lstrcpyn
SetEndOfFile
GetStringTypeExA
GetTempPathA
HeapAlloc
MultiByteToWideChar
CreateFileA
lstrlenW
GetCurrentProcess
VirtualFreeEx
HeapCreate
HeapDestroy
WideCharToMultiByte
ExitProcess
HeapReAlloc
IsBadReadPtr
GetUserDefaultLCID
GlobalFree
GlobalUnlock
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
InterlockedExchange
InterlockedCompareExchange
GetSystemInfo
VirtualQuery
VirtualProtect
SetStdHandle
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
Sleep
IsBadWritePtr
VirtualAlloc
VirtualFree
GlobalLock
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetSystemDirectoryA
GetStdHandle
GetCPInfo
GetOEMCP
GetWindowsDirectoryA
SetHandleCount
RtlUnwind
RaiseException
TerminateProcess
HeapSize
GetACP
FindResourceA
LockResource
user32
CallWindowProcA
GetWindowInfo
SetWindowLongA
MessageBoxA
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DispatchMessageA
TranslateMessage
GetDC
PeekMessageA
GetTopWindow
WinHelpA
GetClassInfoA
GetCursorPos
PostMessageA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
GetMessageA
RegisterWindowMessageA
GetMenuItemCount
UnhookWindowsHookEx
SetWindowTextA
EnumWindows
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
ClientToScreen
IsDialogMessageA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
EndDialog
RegisterClassA
CreateDialogIndirectParamA
DestroyMenu
PostThreadMessageA
UnregisterClassA
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
GetClientRect
CopyRect
GetMenuItemID
GetSubMenu
GetMenu
GetCapture
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
CheckMenuItem
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
CreateDialogIndirectParamA
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
MessageBoxA
wsprintfA
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
GetDC
ReleaseDC
SetMenuItemBitmaps
TabbedTextOutA
DrawTextA
GrayStringA
RegisterClipboardFormatA
PtInRect
UnregisterClassA
UnhookWindowsHookEx
ModifyMenuA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
SetActiveWindow
CopyRect
GetDlgItem
GetMenuItemID
GetMenuCheckMarkDimensions
GetParent
LoadBitmapA
GetClientRect
AdjustWindowRectEx
IsWindow
EndDialog
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
GetClassNameA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetMenuState
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
ord155
ord189
SHOpenFolderAndSelectItems
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
StrTrimA
ole32
CLSIDFromProgID
CLSIDFromString
OleRun
CLSIDFromProgID
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
SetMapMode
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
RemoveFontResourceA
GetObjectA
GetStockObject
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetObjectA
CreateBitmap
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SetViewportExtEx
advapi32
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
RegOpenCurrentUser
RegCloseKey
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
oleaut32
GetActiveObject
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayAllocDescriptor
LHashValOfNameSys
VariantTimeToSystemTime
VarR8FromCy
RegisterTypeLi
VarR8FromBool
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantClear
SysAllocString
VariantCopy
SafeArrayDestroy
SafeArrayAllocData
SafeArrayCreate
VariantInit
VariantChangeType
SysFreeString
LoadTypeLi
gdiplus
GdiplusStartup
advpack
IsNTAdmin
ntdll
NtCreateSemaphore
NtReleaseSemaphore
NtWaitForSingleObject
RtlDecompressBuffer
RtlComputeCrc32
NtClose
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
wininet
InternetTimeToSystemTime
dbghelp
MakeSureDirectoryPathExists
winhttp
WinHttpOpenRequest
WinHttpSetCredentials
WinHttpSetTimeouts
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpCloseHandle
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpQueryHeaders
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ord17
ord17
oledlg
ord8
ord8
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.4MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ