BlowAT
VITAL
Behavioral task
behavioral1
Sample
8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73e2d2e08954f85ac72c4.dll
Resource
win7-20230220-en
Target
98eb4c681fcefe5e1e599f98cd2b394a.bin
Size
45KB
MD5
ae5d8ae084b2f2bc795c35ff4b449b54
SHA1
ea77dce569b9223634ca57ff68a52911b6b0bab2
SHA256
e4b04ec574ccb6b01ba63d4ae6614e1bc29f0e292fad3191b2551cb6ae8fc5f3
SHA512
05da77d34ac8616de831a76a5ad13d1118019b21b9acdc0bf92db500542ba1cffddbdfecdfd5c8f9e1457d14efe2d0870242a55fe6805849bc36fe9d435b3711
SSDEEP
768:+HNBMf2sVt0+REdpTnEbY2Wp9g/wty1UIwuhqSIP6p6u2nC3bLFKxdr2LblvvZo/:Aj80+Rs+Mew0eIwumGL2nKFW2LpZOx
resource | yara_rule |
---|---|
static1/unpack001/8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73e2d2e08954f85ac72c4.dll | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
unpack001/8b4dd2d49bfe4f43deee9489d8ccd1cc4a7e199069c73e2d2e08954f85ac72c4.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegQueryValueExA
CreateProcessAsUserA
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
RegSaveKeyA
RegRestoreKeyA
AlphaBlend
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
FreeLibrary
GetDriveTypeA
GetDiskFreeSpaceExA
EnterCriticalSection
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
CreateThread
TerminateThread
InterlockedExchange
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetTickCount
WriteFile
CreateFileA
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
PeekNamedPipe
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
OpenEventA
SetErrorMode
GetVersionExA
GetWindowsDirectoryA
CopyFileA
SetFileAttributesA
ExpandEnvironmentStringsA
GetModuleFileNameA
DeleteCriticalSection
LoadLibraryA
GetProcAddress
RaiseException
GetVolumeInformationA
CreateDCA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
LoadMenuA
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
ReleaseDC
GetCursorPos
SetRect
GetSystemMetrics
GetClipboardData
CallNextHookEx
UnhookWindowsHookEx
CloseDesktop
LoadCursorA
CharNextA
wsprintfA
GetActiveWindow
GetWindowTextA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
puts
_strrev
_adjust_fdiv
_initterm
calloc
srand
_access
rand
wcstombs
atoi
_beginthreadex
strncpy
_stricmp
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
??3@YAXPAX@Z
memmove
ceil
_ftol
putchar
getsockname
setsockopt
send
select
closesocket
recv
socket
gethostbyname
htons
WSAStartup
WSACleanup
connect
WSAIoctl
ntohs
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
WTSQueryUserToken
SHGetSpecialFolderPathA
BlowAT
VITAL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ