AddCashFILE
AddCashPR
AddCashWIN
FindIDC
Behavioral task
behavioral1
Sample
e463f9ee2e4719e18d616be225e2e86b42817a90198ae18991025b1e44a4a575.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e463f9ee2e4719e18d616be225e2e86b42817a90198ae18991025b1e44a4a575.dll
Resource
win10v2004-20220812-en
Target
e463f9ee2e4719e18d616be225e2e86b42817a90198ae18991025b1e44a4a575
Size
468KB
MD5
c82faa093d110e8cd5b5db5664b09f62
SHA1
6594b1f2ebf461165cea32d3bef9387a557596fc
SHA256
e463f9ee2e4719e18d616be225e2e86b42817a90198ae18991025b1e44a4a575
SHA512
4df5cd340287b8a91cfeb0bc59e4e77a30a3ecb65caa1b9a31c6ca00509269ca87ffbe421b9963035a5a5358834348fd1d6babafdaeba4a3067221884488dc6f
SSDEEP
6144:v0X6JyKWMlhNjr+cwK2XOJQNnfAaV0YVh1KuYJmtiweM5Zdf:cX6JyLkhNZwtXutA0Y71KlJWeM
resource | yara_rule |
---|---|
sample | family_blackmoon |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IsBadWritePtr
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
LCMapStringW
SetHandleCount
MultiByteToWideChar
HeapSize
RaiseException
TerminateProcess
RtlUnwind
Process32First
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
FreeLibrary
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
DeleteFileA
GetFileSize
GetStdHandle
WriteFile
GetTickCount
Sleep
CreateDirectoryA
SetFilePointer
GetLocalTime
GetPrivateProfileStringA
GetModuleFileNameA
IsBadReadPtr
HeapReAlloc
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
lstrcmpiW
lstrcmpW
lstrlenW
HeapCreate
HeapDestroy
RtlZeroMemory
InterlockedDecrement
InterlockedIncrement
GetLastError
TerminateThread
OpenThread
Thread32Next
Thread32First
UnmapViewOfFile
VirtualFreeEx
GetCurrentThreadId
GetCurrentProcessId
RtlFillMemory
lstrlenA
GetProcAddress
LoadLibraryA
GetModuleHandleA
VirtualProtect
VirtualAlloc
RtlMoveMemory
Process32Next
GetFileType
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
GetFileSizeEx
CreateFileA
CreateThread
GetComputerNameExA
WideCharToMultiByte
CloseHandle
lstrcpynA
OpenProcess
Module32First
GetACP
CreateToolhelp32Snapshot
GetOEMCP
GetCPInfo
FlushFileBuffers
GetCurrentProcess
GetProcessVersion
FindResourceA
LoadResource
LockResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
WritePrivateProfileStringA
GlobalFlags
MulDiv
GetVersion
lstrcpyA
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalFree
LocalAlloc
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
DestroyMenu
PostThreadMessageA
LoadStringA
GetSysColorBrush
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
EndDialog
LoadCursorA
IsDialogMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetWindowThreadProcessId
FindWindowExA
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
RegisterClipboardFormatA
UnhookWindowsHookEx
UnregisterClassA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
AdjustWindowRectEx
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SendDlgItemMessageA
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
PathFindFileNameA
PathRemoveBackslashA
PathFindExtensionA
StrToIntExW
StrToIntW
PathFileExistsA
PathRemoveFileSpecA
WSAGetLastError
WSACleanup
WSAStartup
gethostname
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoUninitialize
OleInitialize
OleUninitialize
CoInitialize
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoFreeUnusedLibraries
SHGetSpecialFolderPathA
SHGetFolderPathA
GetProcessMemoryInfo
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetObjectA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
ord17
ord8
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
AddCashFILE
AddCashPR
AddCashWIN
FindIDC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ