BlowAT
Check
MerCedes
Behavioral task
behavioral1
Sample
3B15486651F5E552FE3A354485AA2751DD730B8C3DD4E.dll
Resource
win7-20220812-en
Target
3B15486651F5E552FE3A354485AA2751DD730B8C3DD4E.dll
Size
172KB
MD5
f544eb1f87d84e22f36af9313c234342
SHA1
d23f3c66ae84b7f9cf951cb4cdf99e55e4d823e0
SHA256
3b15486651f5e552fe3a354485aa2751dd730b8c3dd4ec26c0d9a976b2d3b129
SHA512
768e3fa8c5d453c9e34161063fb82196306fa018f17a4ea2f09174b660109a1e5d178433604c703f694315df05d776dc13c4ccb3edac9016cd5f9d8ec87fac2f
SSDEEP
3072:9/gWEkncfFsQTvrhPkC7xZkuXaJhNeETNsAq6nUlk6/MPNm:9LPnc2qrJ51ZkMaJhQCNBU8
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
Process32First
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
OpenEventA
SetErrorMode
GetVersionExA
GetWindowsDirectoryA
CopyFileA
SetFileAttributesA
ExpandEnvironmentStringsA
CreateFileA
WriteFile
lstrcmpiA
GetTickCount
InterlockedExchange
TerminateThread
CreateThread
CreateProcessA
lstrcatA
MoveFileA
SetFilePointer
ReadFile
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
FreeLibrary
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
GetProcAddress
EnterCriticalSection
DeleteCriticalSection
Process32Next
CreateToolhelp32Snapshot
LoadLibraryA
PeekNamedPipe
SHGetSpecialFolderPathA
RegSaveKeyA
ClearEventLogA
RegRestoreKeyA
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
RegQueryValueExA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenEventLogA
CloseEventLog
AlphaBlend
CreateDCA
LoadMenuA
wsprintfA
GetWindowTextA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
ReleaseDC
GetCursorPos
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
FindWindowA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
LoadCursorA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
CharNextA
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
InternetReadFile
_adjust_fdiv
_initterm
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strncpy
puts
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
_strrev
putchar
_ftol
ceil
memmove
??3@YAXPAX@Z
rand
strstr
recv
ntohs
socket
getsockname
htons
connect
WSAIoctl
WSACleanup
WSAStartup
send
setsockopt
select
gethostbyname
closesocket
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
WTSQueryUserToken
CreateEnvironmentBlock
BlowAT
Check
MerCedes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ