BlowAT
VITAL
Behavioral task
behavioral1
Sample
8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73.dll
Resource
win7-20230220-en
Target
8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73.dll
Size
104KB
MD5
98eb4c681fcefe5e1e599f98cd2b394a
SHA1
4901fb4a07637bdb2007e573dd87a199a2d6ae7a
SHA256
8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73e2d2e08954f85ac72c4
SHA512
e84ba0ff05086ec8dbdcd58b2fcb3131fea429a486f69cb273950f3f88e5160b8de4807feaaae26e8b0e5ad59777a057871d5ecf6c0c662c3bf9f100561af761
SSDEEP
1536:dmMDIt+YLFNAbKUJxjo+IfeCSvQZdYcYuvfvoSCCsZMAHWy:d7uFNAbKUPEZdYfuXvoSpsZMA2y
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegQueryValueExA
CreateProcessAsUserA
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
RegSaveKeyA
RegRestoreKeyA
AlphaBlend
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
FreeLibrary
GetDriveTypeA
GetDiskFreeSpaceExA
EnterCriticalSection
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
CreateThread
TerminateThread
InterlockedExchange
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetTickCount
WriteFile
CreateFileA
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
PeekNamedPipe
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
OpenEventA
SetErrorMode
GetVersionExA
GetWindowsDirectoryA
CopyFileA
SetFileAttributesA
ExpandEnvironmentStringsA
GetModuleFileNameA
DeleteCriticalSection
LoadLibraryA
GetProcAddress
RaiseException
GetVolumeInformationA
CreateDCA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
LoadMenuA
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
ReleaseDC
GetCursorPos
SetRect
GetSystemMetrics
GetClipboardData
CallNextHookEx
UnhookWindowsHookEx
CloseDesktop
LoadCursorA
CharNextA
wsprintfA
GetActiveWindow
GetWindowTextA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
puts
_strrev
_adjust_fdiv
_initterm
calloc
srand
_access
rand
wcstombs
atoi
_beginthreadex
strncpy
_stricmp
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
??3@YAXPAX@Z
memmove
ceil
_ftol
putchar
getsockname
setsockopt
send
select
closesocket
recv
socket
gethostbyname
htons
WSAStartup
WSACleanup
connect
WSAIoctl
ntohs
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
WTSQueryUserToken
SHGetSpecialFolderPathA
BlowAT
VITAL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ