ijlErrorStr
ijlFree
ijlGetLibVersion
ijlInit
ijlRead
ijlWrite
Behavioral task
behavioral1
Sample
db483bf49c579bd1cecd7ed95aafa2ffd577e6dbdb6bf2b43b9b05706e45cddf.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
db483bf49c579bd1cecd7ed95aafa2ffd577e6dbdb6bf2b43b9b05706e45cddf.dll
Resource
win10v2004-20231023-en
Target
db483bf49c579bd1cecd7ed95aafa2ffd577e6dbdb6bf2b43b9b05706e45cddf
Size
444KB
MD5
6cb78f82e692a0bbc731d912309de3e9
SHA1
614ed9d23b72cb3535f7398b98ba20bc11c7e637
SHA256
db483bf49c579bd1cecd7ed95aafa2ffd577e6dbdb6bf2b43b9b05706e45cddf
SHA512
80e9456087817553dff3fab697305d8a146ba5bb7c8de4fc46470fdfb0b5945098a254f96a7ffd5d0e297c5100cc9b9008cca2b5145367f3f34e0ee5dc305a35
SSDEEP
6144:exmB4jOvBWVfNc8O+Sk7roBf2PhKmxGa1ruR+FcQl:exmB4jOvBWVVc8+uPhfxBL
resource | yara_rule |
---|---|
sample | family_blackmoon |
Checks for missing Authenticode signature.
resource |
---|
db483bf49c579bd1cecd7ed95aafa2ffd577e6dbdb6bf2b43b9b05706e45cddf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
VirtualAllocEx
GetCurrentProcessId
CreateFileMappingA
lstrcpyn
CreateWaitableTimerA
SetWaitableTimer
Sleep
GetTickCount
lstrlenW
WideCharToMultiByte
VirtualFreeEx
TerminateProcess
LoadLibraryA
WriteProcessMemory
RtlMoveMemory
FreeLibrary
VirtualQueryEx
HeapDestroy
HeapFree
HeapReAlloc
HeapAlloc
HeapSize
HeapCreate
HeapWalk
HeapLock
HeapUnlock
HeapCompact
HeapValidate
CreateRemoteThread
ResumeThread
WaitForSingleObject
VirtualProtectEx
ExitProcess
GetModuleFileNameA
GetPrivateProfileStringA
MultiByteToWideChar
GetUserDefaultLCID
FormatMessageA
SetFilePointer
WriteFile
ReadFile
GetFileSize
CreateFileA
CreateProcessA
GetStartupInfoA
GetCommandLineA
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
OpenProcess
GetCurrentProcess
GetProcAddress
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
TerminateThread
DeleteCriticalSection
GetModuleHandleA
OpenFileMappingA
IsBadReadPtr
CloseHandle
UnmapViewOfFile
MapViewOfFile
GetProcessHeap
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
CallWindowProcA
SetTimer
GetWindowTextW
GetWindowTextLengthW
GetClassNameA
GetParent
GetWindowThreadProcessId
IsWindowVisible
FindWindowExA
MsgWaitForMultipleObjects
KillTimer
SetWindowPos
RegCreateKeyExA
RegCloseKey
RegSetValueExA
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
GetModuleFileNameExA
__CxxFrameHandler
strncmp
memmove
realloc
modf
sprintf
atoi
_ftol
??3@YAXPAX@Z
strrchr
??2@YAPAXI@Z
strtod
_CIpow
free
malloc
floor
strchr
strncpy
_CIfmod
LoadTypeLi
VariantClear
VariantChangeType
VarR8FromBool
VarR8FromCy
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SysAllocString
SafeArrayCreate
SafeArrayDestroy
SHGetSpecialFolderPathA
ijlErrorStr
ijlFree
ijlGetLibVersion
ijlInit
ijlRead
ijlWrite
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ