Behavioral task
behavioral1
Sample
2024-11-22_722b5820f98f75c2360b814ec4c3e916_mafia.exe
Resource
win7-20240903-en
General
-
Target
2024-11-22_722b5820f98f75c2360b814ec4c3e916_mafia
-
Size
1.7MB
-
MD5
722b5820f98f75c2360b814ec4c3e916
-
SHA1
6473c9cd1eb5a2f5afaba5cb8acf1164d5cab8b6
-
SHA256
ebd8af92ff62b01bd96c587835de9e2d8863ef5e4d12b8e031ff8d6973754b7d
-
SHA512
9b4a6eba4a5c261739cd738c33b9edc77829b9822867f985037383aabef305a532d105a7452f4519ff92bfb44d04ddbd225ea5d2ab367246284b619cd0e2633f
-
SSDEEP
49152:6+lYMoRzGVMOiMeGP0NaPNcp0sUPYu7UGHMke:RllylGcaepMAOsk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-22_722b5820f98f75c2360b814ec4c3e916_mafia
Files
-
2024-11-22_722b5820f98f75c2360b814ec4c3e916_mafia.exe windows:5 windows x86 arch:x86
a8b97bb1fcce237e48665837abc454ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
InitializeCriticalSection
LCMapStringA
FreeLibrary
GetCommandLineA
SetFilePointer
GetFileSize
GetTickCount
WritePrivateProfileStringA
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
MulDiv
GetCurrentDirectoryA
GetVolumeInformationA
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
GetPrivateProfileStringA
HeapReAlloc
ExitProcess
CancelWaitableTimer
VirtualAlloc
VirtualFree
HeapDestroy
TryEnterCriticalSection
SetCriticalSectionSpinCount
DeleteCriticalSection
HeapFree
HeapAlloc
HeapCreate
CreateEventA
WaitForMultipleObjects
SetEvent
lstrcpyn
RtlMoveMemory
GlobalMemoryStatusEx
GetProcessId
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetComputerNameA
MoveFileA
ReadFile
GetFileSizeEx
WriteFile
SetEndOfFile
SetFilePointerEx
CreateFileA
CreateFileW
TlsSetValue
IsBadReadPtr
TlsGetValue
DeleteFileA
GetTempPathW
lstrlenW
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
HeapSize
TerminateProcess
SetThreadAffinityMask
InterlockedExchange
LeaveCriticalSection
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
SwitchToThread
InterlockedCompareExchange
EnterCriticalSection
CloseHandle
CreateThread
SetProcessDEPPolicy
GetProcessHeap
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
GetModuleHandleA
IsWow64Process
GetCurrentProcess
GetSystemInfo
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalFlags
LocalReAlloc
GlobalReAlloc
GlobalHandle
LocalAlloc
lstrcpynA
GetLastError
GetDriveTypeA
Sleep
lstrcpyA
lstrlenA
SetLastError
lstrcatA
QueryPerformanceCounter
GetVersion
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RtlUnwind
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsFree
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualQuery
GetStringTypeW
LoadLibraryW
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
LocalFree
GetEnvironmentVariableA
LCMapStringA
LoadLibraryA
FreeLibrary
GetProcAddress
IsBadReadPtr
HeapFree
HeapAlloc
ExitProcess
GetProcessHeap
VirtualProtectEx
GetModuleHandleA
RtlMoveMemory
user32
PostMessageA
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
GetWindowPlacement
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
PostQuitMessage
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetClassNameA
SendMessageA
ShowWindowAsync
GetSystemMetrics
FindWindowExA
IsWindowEnabled
GetWindowThreadProcessId
DestroyIcon
GetDC
FillRect
DrawIconEx
ReleaseDC
SendInput
MapVirtualKeyA
GetLastInputInfo
LoadImageA
EnumDisplaySettingsA
IsIconic
IsWindowVisible
GetWindowRect
SetFocus
SetForegroundWindow
EnableWindow
GetClientRect
ClientToScreen
OpenClipboard
GetClipboardData
GetParent
GetWindow
PtInRect
GetWindowLongA
SetActiveWindow
CloseClipboard
EmptyClipboard
SetClipboardData
CallWindowProcA
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
GetWindowTextA
SetWindowLongA
GetDlgItem
SystemParametersInfoA
GetCapture
BringWindowToTop
AttachThreadInput
SetWindowPos
GetAncestor
GetForegroundWindow
IsWindow
MsgWaitForMultipleObjects
RemovePropA
wsprintfA
MessageBoxA
oleaut32
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SystemTimeToVariantTime
SysFreeString
OleLoadPicture
VarR8FromCy
VarR8FromBool
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetElemsize
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
SafeArrayGetLBound
VariantTimeToSystemTime
shlwapi
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
gdi32
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetStockObject
GetDeviceCaps
SetDIBitsToDevice
GetDIBits
SetPixelV
GetPixel
GdiFlush
BitBlt
GetObjectA
CreateDIBSection
DeleteObject
DeleteDC
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetViewportOrgEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
RegQueryValueExA
GetTokenInformation
OpenProcessToken
RegCloseKey
RegOpenKeyA
CryptGetHashParam
CryptDestroyHash
CryptHashData
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHGetSpecialFolderPathA
SHGetFileInfoA
ShellExecuteExA
ole32
CreateStreamOnHGlobal
CLSIDFromProgID
CoInitializeEx
CLSIDFromString
CoCreateInstance
OleRun
CoInitialize
CoCreateGuid
CoUninitialize
wininet
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
msvcrt
strstr
malloc
free
strchr
_ftol
atoi
sprintf
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 483KB - Virtual size: 483KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 792KB - Virtual size: 943KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 423KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ