Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
b682ada63ea768b89b2ad82b870c8a527b5b62d0adf6322c79cb181e17d040e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b682ada63ea768b89b2ad82b870c8a527b5b62d0adf6322c79cb181e17d040e4.exe
Resource
win10v2004-20220812-en
Target
b682ada63ea768b89b2ad82b870c8a527b5b62d0adf6322c79cb181e17d040e4
Size
225KB
MD5
7ba3d3f7d6e6cfc1127400998b122633
SHA1
4919fbbf2020f6d7b82393778a72a9c83e7b7a9a
SHA256
b682ada63ea768b89b2ad82b870c8a527b5b62d0adf6322c79cb181e17d040e4
SHA512
0a3437de2f3ca2a1ebbdd274eea49bd6f317dcec10ec2f60f1bb2d2eb4d5e4d54079ba77ce131ab3e84f10b27310c1c8af8f42cd16103179e1c575463703ca85
SSDEEP
3072:vpifnaoKoJe+cU4kdOyeO1ZXtCl5c2b2J902dVzT1ujtSGUYo+:vofaoKKeJAzZaPlITeSOp
resource | yara_rule |
---|---|
sample | family_blackmoon |
ExtKeyUsageCodeSigning
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
RaiseException
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
ExitProcess
HeapReAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
GetVersion
GetStartupInfoA
GetCurrentProcess
GetLastError
GetVersionExA
HeapFree
LCMapStringA
GetModuleFileNameA
GetCommandLineA
WideCharToMultiByte
MultiByteToWideChar
WriteFile
CreateFileA
GetProcAddress
IsBadReadPtr
GetProcessHeap
LocalSize
LocalAlloc
LocalFree
RtlMoveMemory
CloseHandle
SetWaitableTimer
CreateWaitableTimerA
GetModuleHandleA
LoadLibraryA
VirtualAlloc
CheckMenuRadioItem
MsgWaitForMultipleObjects
FindWindowExA
SetForegroundWindow
GetSubMenu
TrackPopupMenu
GetMenuStringA
SetMenuInfo
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
LoadMenuA
GetSystemMenu
CreatePopupMenu
CreateMenu
KillTimer
SetTimer
RegisterClassExA
LoadIconA
SetActiveWindow
DispatchMessageA
GetMenuItemInfoA
GetMenuItemRect
GetMenuState
GetMenuInfo
GetMenuDefaultItem
MenuItemFromPoint
RemoveMenu
PeekMessageA
wsprintfA
SetMenuDefaultItem
SetMenuItemBitmaps
SetMenuItemInfoA
GetMenuItemID
TranslateMessage
IsDialogMessageA
TranslateAcceleratorA
GetMessageA
UnregisterHotKey
RegisterHotKey
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
GetSysColor
FillRect
SetClassLongA
GetClassLongA
SetRect
SetWindowRgn
CopyImage
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
SetParent
PostMessageA
SetWindowPos
MoveWindow
UpdateWindow
ValidateRect
InvalidateRect
ScreenToClient
GetParent
GetWindowRect
GetFocus
SetFocus
IsWindow
GetDlgItem
GetWindowLongA
CreateWindowExA
DestroyCursor
SetWindowLongA
DestroyIcon
TrackMouseEvent
SetCursor
LoadCursorA
DefMDIChildProcA
DefWindowProcA
DestroyWindow
GetClientRect
GetAsyncKeyState
CallWindowProcA
SendMessageA
EndPaint
BeginPaint
GetInputState
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
CheckMenuItem
RegEnumKeyA
RegOpenKeyA
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegFlushKey
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyA
SHGetSpecialFolderLocation
SHGetPathFromIDList
DragQueryFileA
DragFinish
Shell_NotifyIconA
DragAcceptFiles
ShellExecuteA
CoUninitialize
CoInitialize
ord42
ObjectFromLresult
DeleteObject
GetObjectA
CreateCompatibleDC
CreateDIBSection
DeleteDC
SelectObject
BitBlt
ExtCreateRegion
CombineRgn
CreateRoundRectRgn
StretchBlt
CreateSolidBrush
CreatePatternBrush
GetStockObject
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ