Behavioral task
behavioral1
Sample
96ff100ba39153a5b7dc9871be910db83d4aa107b19d7dae692f67d45c8e7de1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96ff100ba39153a5b7dc9871be910db83d4aa107b19d7dae692f67d45c8e7de1.exe
Resource
win10v2004-20241007-en
General
-
Target
96ff100ba39153a5b7dc9871be910db83d4aa107b19d7dae692f67d45c8e7de1
-
Size
4.8MB
-
MD5
9da2d322159cda4bc56251b85a3acc36
-
SHA1
ce0232fc45391da939b4d4b16963afbb1d8cd7e2
-
SHA256
96ff100ba39153a5b7dc9871be910db83d4aa107b19d7dae692f67d45c8e7de1
-
SHA512
d01c084addb399686121d61c0a9b518be698df1bb2f0b492973cad207f83747b1b6be1d692f5d2aacbc7969c2b5ea0805dcdcea39ca9be5dc1a66b217904062f
-
SSDEEP
49152:K4VgcN2updZi0WdPiafmspTAMlxt2wrd5eQ35esIC+Fza7z22CKNV/W:hVgc3i0Iia+sqMkwppIba79CKNVu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96ff100ba39153a5b7dc9871be910db83d4aa107b19d7dae692f67d45c8e7de1
Files
-
96ff100ba39153a5b7dc9871be910db83d4aa107b19d7dae692f67d45c8e7de1.exe windows:4 windows x86 arch:x86
bb2df45e0cc3ae7035b7600e5c4818a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
MulDiv
GlobalFlags
InterlockedDecrement
WritePrivateProfileStringA
lstrcatA
lstrcpyA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
LockResource
LoadResource
FindResourceA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrlenA
GetTickCount
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
LCMapStringA
LoadLibraryA
FreeLibrary
GetCommandLineA
FormatMessageA
GlobalFree
GetUserDefaultLCID
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
HeapAlloc
HeapFree
VirtualFreeEx
GetCurrentProcess
IsWow64Process
SetWaitableTimer
CreateWaitableTimerA
RtlMoveMemory
VirtualAlloc
GetProcessId
GetFileAttributesA
CloseHandle
WaitForSingleObject
GetProcessHeap
GetProcAddress
TlsFree
SetStdHandle
IsBadCodePtr
GetStringTypeW
GetStringTypeA
LCMapStringW
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetACP
HeapSize
RaiseException
TerminateProcess
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
WriteFile
SetErrorMode
GetProcessVersion
GetCurrentThreadId
CreateThread
InterlockedExchange
InterlockedCompareExchange
GetSystemInfo
VirtualQuery
VirtualProtect
SetStdHandle
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
Sleep
IsBadStringPtrA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalAlloc
LocalFree
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
GetTempPathA
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
GetVersion
MulDiv
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LockResource
LoadResource
FindResourceA
GetProcessVersion
HeapDestroy
GetProcAddress
FlushFileBuffers
SetEndOfFile
GetStringTypeExA
CreateProcessA
RtlMoveMemory
CloseHandle
PeekNamedPipe
ReadFile
GetExitCodeProcess
GetWindowsDirectoryA
HeapReAlloc
IsBadReadPtr
GetUserDefaultLCID
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FindNextFileA
FindFirstFileA
FindClose
SetFilePointer
WriteFile
GetTickCount
GetModuleFileNameA
GetFileSize
DeleteFileA
GetVersionExA
GetCommandLineA
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
HeapCreate
WideCharToMultiByte
FreeLibrary
IsBadWritePtr
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
GetModuleHandleA
CreatePipe
GetProcessHeap
CreateFileA
HeapAlloc
MultiByteToWideChar
GetLocaleInfoA
LoadLibraryA
HeapFree
CopyFileA
GetFileAttributesA
IsBadCodePtr
lstrcpyn
lstrlenA
RtlUnwind
RaiseException
TerminateProcess
HeapSize
GetACP
ExitProcess
GetSystemDirectoryA
lstrlenW
GetCurrentProcess
VirtualFreeEx
TlsSetValue
user32
CallWindowProcA
GetWindowInfo
SetWindowLongA
MessageBoxA
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDC
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetCursorPos
MsgWaitForMultipleObjects
RegisterWindowMessageA
PostMessageA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
GetMenuItemCount
UnhookWindowsHookEx
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
EnumWindows
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
IsDialogMessageA
PtInRect
EndDialog
CreateDialogIndirectParamA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
UnregisterClassA
PostThreadMessageA
RegisterClipboardFormatA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
EndDialog
PostMessageA
PostQuitMessage
wsprintfA
GetMenuItemID
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetMenuCheckMarkDimensions
ClientToScreen
GetNextDlgTabItem
SetWindowTextA
UnhookWindowsHookEx
GetMenuItemCount
GetDC
ReleaseDC
SetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
MessageBoxA
CopyRect
GetClientRect
AdjustWindowRectEx
IsWindow
GetSysColor
MapWindowPoints
UpdateWindow
LoadIconA
LoadCursorA
LoadBitmapA
GetMenuState
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
GetWindowTextA
UnregisterClassA
GetWindow
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
CreateDialogIndirectParamA
GetTopWindow
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
GetFocus
shlwapi
PathFindFileNameA
PathFindExtensionA
StrTrimA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
OleRun
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleRun
OleIsCurrentClipboard
OleUninitialize
OleInitialize
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
OleFlushClipboard
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoCreateInstance
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
ShellExecuteExA
SHGetSpecialFolderPathA
ord155
SHOpenFolderAndSelectItems
ShellExecuteA
ord189
advapi32
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
RegOpenCurrentUser
RegCloseKey
CryptExportKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptEncrypt
CryptGetKeyParam
CryptDestroyKey
CryptSetKeyParam
CryptDecrypt
CryptReleaseContext
CryptImportKey
CryptAcquireContextA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
SetTextColor
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
RemoveFontResourceA
GetObjectA
GetStockObject
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetStockObject
GetObjectA
GetClipBox
SetWindowExtEx
oleaut32
GetActiveObject
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
VariantChangeType
VariantInit
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayGetElemsize
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantClear
SysAllocString
VariantCopy
SafeArrayDestroy
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SysFreeString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
gdiplus
GdiplusStartup
advpack
IsNTAdmin
dbghelp
MakeSureDirectoryPathExists
ntdll
RtlCompressBuffer
NtWaitForSingleObject
NtReleaseSemaphore
NtClose
NtCreateSemaphore
RtlDecompressBuffer
RtlGetCompressionWorkSpaceSize
RtlComputeCrc32
wininet
InternetTimeToSystemTime
winhttp
WinHttpSetCredentials
WinHttpSetTimeouts
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpOpen
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
bcrypt
BCryptCloseAlgorithmProvider
BCryptCreateHash
BCryptHashData
BCryptDestroyKey
BCryptVerifySignature
BCryptImportKeyPair
BCryptDestroyHash
BCryptOpenAlgorithmProvider
BCryptSignHash
BCryptFinishHash
BCryptGetProperty
crypt32
CryptDecodeObjectEx
CryptImportPublicKeyInfo
CertFreeCertificateContext
CertCloseStore
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
ord17
oledlg
ord8
ord8
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE