Behavioral task
behavioral1
Sample
3068c17ad51cf407433cc89e71b9190e7fcd8c82f914785c0e9487d24de61b20.exe
Resource
win7-20240708-en
General
-
Target
3068c17ad51cf407433cc89e71b9190e7fcd8c82f914785c0e9487d24de61b20
-
Size
2.6MB
-
MD5
ee93f85ebd4faadb04fc34a3d7321a4e
-
SHA1
0ef87a6904b5f0668a66a12521f1737971c6bcee
-
SHA256
3068c17ad51cf407433cc89e71b9190e7fcd8c82f914785c0e9487d24de61b20
-
SHA512
8479b6b67727e3fe76cb6b9dc99d9c8cfee57ec24a14e5fce5fb477bcdc60b51db72055843e1f6c7a7c717e04241b5fe257b85ca0dba681e60ea1a6f2216b5d1
-
SSDEEP
49152:Mp6qkpHtyyj+KmfFYEMGjHOcI0zVGrlHOFhVcpP4Ru040vSwK:YQt1Lmf/HlFVGrlH2s4Ru040a
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3068c17ad51cf407433cc89e71b9190e7fcd8c82f914785c0e9487d24de61b20
Files
-
3068c17ad51cf407433cc89e71b9190e7fcd8c82f914785c0e9487d24de61b20.exe windows:4 windows x86 arch:x86
6246a001c14e11297226fd1cbefb451b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
SetFileAttributesA
WriteFile
CopyFileA
SetCurrentDirectoryA
GetModuleFileNameA
FindFirstFileA
RemoveDirectoryA
DeleteFileA
FindNextFileA
FindClose
GetTickCount
GetStartupInfoA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
Sleep
GetEnvironmentVariableA
IsBadReadPtr
HeapReAlloc
ExitProcess
GetModuleHandleA
lstrcpyA
DeleteTimerQueueTimer
CreateTimerQueueTimer
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
GetCurrentThreadId
PostQueuedCompletionStatus
GetProcessHeap
InterlockedDecrement
InterlockedIncrement
CreateTimerQueue
CreateIoCompletionPort
lstrcpyn
Module32First
CreateToolhelp32Snapshot
CreateEventA
VirtualQueryEx
GetCurrentProcess
HeapValidate
GetQueuedCompletionStatus
CreateThread
GetSystemInfo
HeapDestroy
CloseHandle
HeapFree
HeapAlloc
HeapCreate
LocalSize
RtlMoveMemory
WaitForSingleObject
CreateProcessA
GetCurrentProcessId
InterlockedExchange
SetStdHandle
IsBadCodePtr
LoadResource
SizeofResource
FindResourceA
MoveFileA
CreateDirectoryA
DeleteCriticalSection
TerminateThread
lstrlenA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
Process32Next
Process32First
OpenProcess
SetLastError
lstrcatA
LockResource
GetVersion
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
MulDiv
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetLastError
user32
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
SetWindowTextA
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetWindowLongA
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
LoadBitmapA
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetWindowTextA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
GetWindowThreadProcessId
GetClassNameA
GetWindowRect
GetSystemMetrics
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
GetCursorPos
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetClientRect
GetPropA
SetPropA
CreateIconFromResource
SendMessageA
IsWindow
FindWindowExA
FindWindowA
RegisterWindowMessageA
TrackPopupMenu
SetForegroundWindow
PtInRect
IsWindowVisible
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
CallWindowProcA
AppendMenuA
AppendMenuW
SetWindowLongA
DrawMenuBar
SetMenu
CreatePopupMenu
GetSubMenu
advapi32
CreateProcessAsUserA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetFileInfoA
Shell_NotifyIconA
ShellExecuteEx
SHGetSpecialFolderPathA
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
OleUninitialize
OleInitialize
OleFlushClipboard
OleIsCurrentClipboard
CoUninitialize
CoInitialize
iphlpapi
GetExtendedTcpTable
shlwapi
PathFileExistsA
ws2_32
closesocket
setsockopt
WSARecv
inet_ntoa
WSASocketA
WSAGetLastError
WSAIoctl
WSAStartup
WSASocketW
ioctlsocket
shutdown
socket
htons
inet_addr
recvfrom
sendto
accept
htonl
__WSAFDIsSet
connect
gethostbyname
ntohs
getsockname
recv
bind
getpeername
WSACleanup
WSASetLastError
send
select
listen
WSAConnect
gdi32
SetWindowExtEx
SetViewportOrgEx
ScaleWindowExtEx
GetClipBox
GetStockObject
GetObjectA
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
ScaleViewportExtEx
SetViewportExtEx
Escape
ExtTextOutA
TextOutA
SetTextColor
SetMapMode
RectVisible
PtVisible
OffsetViewportOrgEx
oledlg
ord8
oleaut32
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
VariantCopy
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VariantChangeType
winmm
timeKillEvent
timeSetEvent
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
Sections
.text Size: 400KB - Virtual size: 398KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE