HookUnInstall
Behavioral task
behavioral1
Sample
ca19121738dc6f269e0382f2b3f391b9681bb7add8288d89f2a7ab293761fa6b.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca19121738dc6f269e0382f2b3f391b9681bb7add8288d89f2a7ab293761fa6b.dll
Resource
win10v2004-20241007-en
General
-
Target
ca19121738dc6f269e0382f2b3f391b9681bb7add8288d89f2a7ab293761fa6b
-
Size
368KB
-
MD5
58e2f9c6a4fc8f447a003177da9ad9fe
-
SHA1
23ea1c413699edae7dd04f38e08284fdca319600
-
SHA256
ca19121738dc6f269e0382f2b3f391b9681bb7add8288d89f2a7ab293761fa6b
-
SHA512
1f83318a3fb55146aa57bf11763953d8fad36a026f5140e4b383d8f0145ca50b9df50aa51d6ccae8f65d7be5f1138ddc9a35d9a183a9a5b2c04eb93e0439c3d7
-
SSDEEP
6144:fD1sGiGYxNpxKJOQziR76Xt+YPZNBcE6CHEkBU2EaY8HQsJKuq0hNTURX:LONGYnXKUaiR76Xt+YPZw2EaxH1JKunY
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca19121738dc6f269e0382f2b3f391b9681bb7add8288d89f2a7ab293761fa6b
Files
-
ca19121738dc6f269e0382f2b3f391b9681bb7add8288d89f2a7ab293761fa6b.dll windows:4 windows x86 arch:x86
8023a7e9b34368fc3286fe31360cf4ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcess
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
FreeLibrary
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
GetVersion
GlobalFlags
WritePrivateProfileStringA
GetCommandLineA
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CloseHandle
QueryDosDeviceA
GetLogicalDriveStringsA
VirtualFreeEx
GetSystemDirectoryA
WideCharToMultiByte
VirtualAllocEx
CopyFileA
IsWow64Process
GetVersionExA
GetPrivateProfileStringA
GetModuleFileNameA
WriteFile
Sleep
SetFilePointer
DeleteFileA
CreateFileA
GetFileSize
ReadFile
GetTempPathA
GetTickCount
MultiByteToWideChar
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
Module32Next
Module32First
CreateToolhelp32Snapshot
GetProcAddress
LoadLibraryA
GetModuleHandleA
OpenProcess
ReadProcessMemory
CreateThread
IsBadReadPtr
InterlockedIncrement
WriteProcessMemory
user32
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
GrayStringA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
SendMessageA
PostMessageA
RegisterClassExA
CreateWindowExA
MessageBoxA
TabbedTextOutA
DrawTextA
wsprintfA
DispatchMessageA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PeekMessageA
GetMessageA
TranslateMessage
PostQuitMessage
gdi32
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
GetDeviceCaps
oleaut32
SafeArrayGetElemsize
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
VariantClear
SysAllocString
VariantCopy
SafeArrayDestroy
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
VariantChangeType
SysFreeString
SafeArrayUnaccessData
shlwapi
PathFileExistsA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
ord17
Exports
Exports
Sections
.text Size: 304KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ