A
B
Behavioral task
behavioral1
Sample
fec0d97d125027e70ca9de6c6be6eb50N.dll
Resource
win7-20240903-en
Target
fec0d97d125027e70ca9de6c6be6eb50N
Size
272KB
MD5
fec0d97d125027e70ca9de6c6be6eb50
SHA1
115124b9a0a27cb212757292d2eebb4076c17b64
SHA256
26a26b36258185a4befaa0f83cc4f062fb216b27454ac04a8439e7511f505486
SHA512
e6e4129b60c3cc92ad295c794c1ec719e4d385fd635e2155e58b5fc85a7c88c57dad109071f89961f39d21c386231f4160f624d7f1fd98e640e6f2f055ff5ff0
SSDEEP
3072:xbx7iCfazvktqncTS8VwXlXWo8mNBohu7HtMSchM/m4:xbxOONiXrPSMr
resource | yara_rule |
---|---|
sample | family_blackmoon |
Checks for missing Authenticode signature.
resource |
---|
fec0d97d125027e70ca9de6c6be6eb50N |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PlaySoundA
timeKillEvent
timeSetEvent
WriteProcessMemory
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
LCMapStringA
LoadLibraryA
FreeLibrary
GetModuleFileNameA
GetCommandLineA
GlobalAlloc
GlobalLock
GlobalUnlock
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
OpenProcess
IsBadWritePtr
VirtualAlloc
LCMapStringW
VirtualFree
HeapCreate
ReadProcessMemory
VirtualFreeEx
GetProcAddress
GetModuleHandleA
Sleep
VirtualProtect
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
VirtualAllocEx
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
CloseHandle
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalHandle
TlsFree
LeaveCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
SetErrorMode
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
GetVersion
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
wsprintfA
MessageBoxA
MessageBeep
GetSysColorBrush
LoadStringA
DestroyMenu
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
UnregisterClassA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
SetWindowTextA
GetWindowTextA
GetMenuItemCount
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
GetObjectA
GetStockObject
CreateBitmap
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
SetWindowExtEx
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
ord17
A
B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ