BlowAT
Check
MerCedes
Behavioral task
behavioral1
Sample
bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509.dll
Resource
win7-20241010-en
Target
bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509.dll
Size
172KB
MD5
5e557c646ae2e0fbd7aa05b4d4004670
SHA1
8e2e03baad6a099ee044a78cf0ee0cbe644581ad
SHA256
bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509
SHA512
90d5df37856cc948684fb82947391f9fb6b26cba1ece6ab620e264324debf20923e24a909ef46bec2a4923546721ce3a0c0d335d8172235242d5de7c9d6437ff
SSDEEP
3072:+/gWEkncfFsQTvrhPkC7xZkuXaJhNeETNsAq6nUlk6/MPNm:+LPnc2qrJ51ZkMaJhQCNBU8
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
Process32First
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
OpenEventA
SetErrorMode
GetVersionExA
GetWindowsDirectoryA
CopyFileA
SetFileAttributesA
ExpandEnvironmentStringsA
CreateFileA
WriteFile
lstrcmpiA
GetTickCount
InterlockedExchange
TerminateThread
CreateThread
CreateProcessA
lstrcatA
MoveFileA
SetFilePointer
ReadFile
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
FreeLibrary
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
GetProcAddress
EnterCriticalSection
DeleteCriticalSection
Process32Next
CreateToolhelp32Snapshot
LoadLibraryA
PeekNamedPipe
SHGetSpecialFolderPathA
RegSaveKeyA
ClearEventLogA
RegRestoreKeyA
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
RegQueryValueExA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenEventLogA
CloseEventLog
AlphaBlend
CreateDCA
LoadMenuA
wsprintfA
GetWindowTextA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
ReleaseDC
GetCursorPos
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
FindWindowA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
LoadCursorA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
CharNextA
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
InternetReadFile
_adjust_fdiv
_initterm
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strncpy
puts
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
_strrev
putchar
_ftol
ceil
memmove
??3@YAXPAX@Z
rand
strstr
recv
ntohs
socket
getsockname
htons
connect
WSAIoctl
WSACleanup
WSAStartup
send
setsockopt
select
gethostbyname
closesocket
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
WTSQueryUserToken
CreateEnvironmentBlock
BlowAT
Check
MerCedes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ