ijlErrorStr
ijlFree
ijlGetLibVersion
ijlInit
ijlRead
ijlWrite
Behavioral task
behavioral1
Sample
f2fba351268331fecb70ee9b2f94d0e8ff633ec6cef8ed6c7531e0169ce0ea70.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f2fba351268331fecb70ee9b2f94d0e8ff633ec6cef8ed6c7531e0169ce0ea70.dll
Resource
win10v2004-20230703-en
Target
f2fba351268331fecb70ee9b2f94d0e8ff633ec6cef8ed6c7531e0169ce0ea70
Size
6.0MB
MD5
4794bc6b9d962cfa8d2594f831cbdf03
SHA1
988d6f480a3354de0fb92e6541c1591dd391b86e
SHA256
f2fba351268331fecb70ee9b2f94d0e8ff633ec6cef8ed6c7531e0169ce0ea70
SHA512
bfc2ed92a796903915fb1e6a3668f5b798e275ce99ed111c16ecaaf9a94b9aedf3af37304b08e67cb117a7fb90e7d82655c45ea176d92a48a128d80523c238b0
SSDEEP
196608:cR2RAtBpkRvmHt79+rrpw1PJWfUKZM7/bOCz:cFoNmHt79+rrpwNJWZZM7TOC
resource | yara_rule |
---|---|
sample | family_blackmoon |
Checks for missing Authenticode signature.
resource |
---|
f2fba351268331fecb70ee9b2f94d0e8ff633ec6cef8ed6c7531e0169ce0ea70 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
FlushFileBuffers
lstrcpynA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
GetCurrentThreadId
SetErrorMode
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetVersion
lstrcatA
SetLastError
lstrcpyA
Sleep
SetFilePointer
GlobalLock
GlobalUnlock
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
GetTempPathA
lstrlenA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
LCMapStringA
GetCommandLineA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
GetFileSize
ReadFile
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
ReadProcessMemory
VirtualProtectEx
VirtualQueryEx
FreeLibrary
SetWaitableTimer
CreateWaitableTimerA
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcpyn
LocalFree
CreateDirectoryW
LocalAlloc
MultiByteToWideChar
TerminateProcess
QueryDosDeviceW
CloseHandle
OpenProcess
GetCurrentProcess
WideCharToMultiByte
lstrlenW
GlobalFree
GlobalAlloc
GetCurrentProcessId
RtlMoveMemory
WriteProcessMemory
GetProcAddress
TlsGetValue
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
UnregisterClassA
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMenuCheckMarkDimensions
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMessagePos
RegisterWindowMessageA
IsIconic
GetWindowPlacement
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
GetWindowThreadProcessId
GetClassNameA
SendMessageA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
SetFocus
SetWindowPos
GetMenu
GetSubMenu
GetMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
GetWindowTextA
PathIsDirectoryW
Escape
TextOutA
RectVisible
PtVisible
GetObjectA
GetStockObject
ExtTextOutA
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetProcessImageFileNameW
GetModuleFileNameExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
SHGetSpecialFolderPathA
ShellExecuteA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
ord17
ijlErrorStr
ijlFree
ijlGetLibVersion
ijlInit
ijlRead
ijlWrite
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ