Behavioral task
behavioral1
Sample
7a9109a224d42cfeda40d7cb5c1dc09cf5353beaf3d416f43d28e9a19f2faa06.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7a9109a224d42cfeda40d7cb5c1dc09cf5353beaf3d416f43d28e9a19f2faa06.exe
Resource
win10v2004-20241007-en
General
-
Target
7a9109a224d42cfeda40d7cb5c1dc09cf5353beaf3d416f43d28e9a19f2faa06
-
Size
4.8MB
-
MD5
55ad0ccd74842b529b5f51d4b53e9778
-
SHA1
0e84c79a8b0e13413d456c43717c3d3afcb52cad
-
SHA256
7a9109a224d42cfeda40d7cb5c1dc09cf5353beaf3d416f43d28e9a19f2faa06
-
SHA512
e2a4569594dbad8b3cddb06d1f4531dde67a95c51a65cf4864271025c3a36f96261d1eb9e5561a87b2f95bf543d470eee507964ab39c3fa54d390f977b1958ce
-
SSDEEP
49152:ptZKAbcseUY+T3riFdYVnJTOltt2wrd5eQ35esIC+Fza7z22CNNV/q:7ZKAoxeiFKVncswppIba79CNNVy
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a9109a224d42cfeda40d7cb5c1dc09cf5353beaf3d416f43d28e9a19f2faa06
Files
-
7a9109a224d42cfeda40d7cb5c1dc09cf5353beaf3d416f43d28e9a19f2faa06.exe windows:4 windows x86 arch:x86
a8b9b3ce8e4877cf83f133fc09865b80
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FormatMessageA
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
VirtualFreeEx
GetCurrentProcess
IsWow64Process
SetWaitableTimer
CreateWaitableTimerA
RtlMoveMemory
VirtualAlloc
GetProcessId
GetFileAttributesA
CloseHandle
WaitForSingleObject
GetProcessHeap
GetProcAddress
TlsFree
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
SetErrorMode
GetProcessVersion
GetCurrentThreadId
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
Sleep
GetSystemInfo
IsBadWritePtr
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
lstrcpyn
IsBadStringPtrA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
LoadLibraryA
GetProcAddress
HeapFree
CopyFileA
GetProcessHeap
GetCurrentThreadId
InterlockedCompareExchange
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
MulDiv
GlobalFlags
RtlMoveMemory
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
HeapCreate
HeapDestroy
CreatePipe
SetStdHandle
CloseHandle
PeekNamedPipe
ReadFile
GetExitCodeProcess
WideCharToMultiByte
ExitProcess
HeapReAlloc
IsBadReadPtr
GetUserDefaultLCID
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FindNextFileA
FindFirstFileA
FindClose
GetTickCount
SetFilePointer
GetFileSize
DeleteFileA
GetVersionExA
GetCommandLineA
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
WriteFile
VirtualProtect
GetModuleFileNameA
VirtualFree
VirtualAlloc
CreateFileA
lstrlenW
VirtualFreeEx
GetCurrentProcess
GetFileAttributesA
IsBadCodePtr
CreateThread
GetLocaleInfoA
GetModuleHandleA
LockResource
LoadResource
FindResourceA
GetProcessVersion
FlushFileBuffers
SetEndOfFile
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeExA
GetCPInfo
GetOEMCP
lstrlenA
RtlUnwind
RaiseException
TerminateProcess
HeapSize
GetACP
CreateProcessA
VirtualQuery
InterlockedExchange
HeapAlloc
MultiByteToWideChar
GetCurrentThread
user32
CallWindowProcA
GetWindowInfo
SetWindowLongA
MessageBoxA
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDC
GetDlgCtrlID
GetWindowRect
PtInRect
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetCursorPos
MsgWaitForMultipleObjects
GetWindow
RegisterWindowMessageA
PostMessageA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
EnumWindows
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamA
DestroyMenu
PostThreadMessageA
UnregisterClassA
LoadStringA
GetSysColorBrush
LoadCursorA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
LoadIconA
ClientToScreen
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
UnregisterClassA
wsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
IsWindowVisible
GetCursorPos
SetWindowsHookExA
ModifyMenuA
EndDialog
SetMenuItemBitmaps
CheckMenuItem
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
PostQuitMessage
GetMessageTime
GetClassNameA
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
PtInRect
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetLastActivePopup
WinHelpA
GetCapture
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MessageBoxA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowEnabled
UnhookWindowsHookEx
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GrayStringA
DrawTextA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
RegisterClipboardFormatA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetParent
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFindExtensionA
PathFileExistsA
StrTrimA
PathFindFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
OleRun
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleUninitialize
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
ShellExecuteExA
SHOpenFolderAndSelectItems
ShellExecuteA
ord189
ord155
SHGetSpecialFolderPathA
advapi32
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
RegOpenCurrentUser
RegCloseKey
CryptHashData
CryptCreateHash
CryptEncrypt
CryptGetKeyParam
CryptDecrypt
CryptImportKey
CryptReleaseContext
CryptSetKeyParam
CryptDestroyKey
CryptDestroyHash
CryptAcquireContextA
CryptExportKey
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
CryptGetHashParam
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
RemoveFontResourceA
GetObjectA
GetStockObject
GetClipBox
Escape
ExtTextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
GetObjectA
GetStockObject
CreateBitmap
DeleteObject
TextOutA
DeleteDC
oleaut32
GetActiveObject
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantCopy
SafeArrayDestroy
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SysFreeString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
VariantTimeToSystemTime
SafeArrayGetLBound
SafeArrayGetDim
VariantClear
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SafeArrayGetElemsize
gdiplus
GdiplusStartup
advpack
IsNTAdmin
ntdll
RtlDecompressBuffer
NtWaitForSingleObject
NtReleaseSemaphore
NtClose
NtCreateSemaphore
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
RtlAllocateHeap
RtlComputeCrc32
NtSetInformationFile
RtlReAllocateHeap
RtlLeaveCriticalSection
RtlFreeUnicodeString
LdrLoadDll
RtlCreateUnicodeStringFromAsciiz
RtlFreeHeap
RtlEnterCriticalSection
RtlInitializeCriticalSection
wininet
InternetTimeToSystemTime
dbghelp
MakeSureDirectoryPathExists
winhttp
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpen
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpWriteData
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetTimeouts
WinHttpSetCredentials
WinHttpQueryHeaders
crypt32
CertFreeCertificateContext
CryptImportPublicKeyInfo
CertCloseStore
CryptDecodeObjectEx
CryptStringToBinaryA
bcrypt
BCryptDestroyHash
BCryptOpenAlgorithmProvider
BCryptImportKeyPair
BCryptGetProperty
BCryptCreateHash
BCryptHashData
BCryptVerifySignature
BCryptDestroyKey
BCryptSignHash
BCryptFinishHash
BCryptCloseAlgorithmProvider
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
ord17
oledlg
ord8
ord8
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.4MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ