Api��̬�����Ż�
_�����ӳ���
�ڴ����������Ż�
ȡ����Ŀ¼
Behavioral task
behavioral1
Sample
28abacbadd96c32ebe6941a934e9797a806206304b2fb2f47aabed3cb407d12d.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28abacbadd96c32ebe6941a934e9797a806206304b2fb2f47aabed3cb407d12d.dll
Resource
win10v2004-20240508-en
Target
28abacbadd96c32ebe6941a934e9797a806206304b2fb2f47aabed3cb407d12d.exe
Size
524KB
MD5
35884eb384cbc377dff9ec68c67f3850
SHA1
79e61bf3e894a1e6ed6f6508d1cecbe543dc48f6
SHA256
28abacbadd96c32ebe6941a934e9797a806206304b2fb2f47aabed3cb407d12d
SHA512
985b5b7efb3843d894edece4bf2fc929cab3176e331b477acf4d7090afcb7617bac0741e57975996a8b6c5ab72927e116a1c94b15aeb5dfa3e387570cbedc53d
SSDEEP
12288:6WtAoSlH43y69JizopO3IG/ewFZguOHlr5oSTHLP4uV:6DH43y69JiUeIG/eXrvrP3
resource | yara_rule |
---|---|
sample | family_blackmoon |
Checks for missing Authenticode signature.
resource |
---|
28abacbadd96c32ebe6941a934e9797a806206304b2fb2f47aabed3cb407d12d.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LCMapStringA
FreeLibrary
GetCommandLineA
GetFileSize
ReadFile
GetModuleFileNameA
WritePrivateProfileStringA
DeleteFileA
FindNextFileA
CreateFileA
WriteFile
SetFileAttributesA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetUserDefaultLCID
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
SetFilePointer
GetModuleHandleA
GetCurrentProcess
GetVersionExA
TerminateProcess
GetTempPathA
GetWindowsDirectoryA
Sleep
lstrcpyA
GetSystemDirectoryA
lstrlenA
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
GetTickCount
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
MulDiv
LocalFree
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
GetLocalTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
GetProcessHeap
QueryDosDeviceA
RtlMoveMemory
lstrcpyn
OpenProcess
Module32Next
Module32First
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
FindClose
FindFirstFileA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
GetLastError
MultiByteToWideChar
IsDialogMessageA
SetWindowPos
SetFocus
GetWindowPlacement
IsIconic
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
PostThreadMessageA
DestroyMenu
EnumChildWindows
EnumWindows
GetWindowThreadProcessId
SendDlgItemMessageA
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowTextA
GetClassNameA
GetAncestor
GetWindowTextLengthA
MessageBoxA
GetMenuItemCount
GetDlgCtrlID
UnregisterClassA
EndDialog
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CreateDialogIndirectParamA
DestroyWindow
GetSystemMetrics
GetWindowRect
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
SetForegroundWindow
SetActiveWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
SetWindowTextA
GetParent
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
IsWindow
SendMessageA
PathFileExistsA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
ScaleWindowExtEx
DeleteDC
SetTextColor
SetWindowExtEx
GetClipBox
GetObjectA
GetStockObject
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetPathFromIDListA
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
OleInitialize
WinHttpCheckPlatform
WinHttpOpen
WinHttpSetTimeouts
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpSetCredentials
WinHttpOpenRequest
WinHttpCrackUrl
GetProcessImageFileNameA
ord8
VariantTimeToSystemTime
VarR8FromCy
VarR8FromBool
LoadTypeLi
RegisterTypeLi
SafeArrayCreate
SysFreeString
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayDestroy
VariantCopy
SysAllocString
VariantClear
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
LHashValOfNameSys
recv
select
closesocket
WSAStartup
send
WSACleanup
ClosePrinter
OpenPrinterA
DocumentPropertiesA
ord17
InternetConnectA
InternetSetOptionA
InternetReadFile
InternetCloseHandle
InternetOpenA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
RasHangUpA
RasGetConnectStatusA
Api��̬�����Ż�
_�����ӳ���
�ڴ����������Ż�
ȡ����Ŀ¼
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ