BlowAT
Check
MerCedes
Behavioral task
behavioral1
Sample
bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509.dll
Resource
win7-20241010-en
Target
5e557c646ae2e0fbd7aa05b4d4004670.bin
Size
79KB
MD5
233eac477db1c155df0f490a0e6deba7
SHA1
c73a52a540f575b278ab110cfc74d2b19f4ad2ba
SHA256
87a696a93a56d9f61066baaba9160eb05fa373d08d08f2acc72b316253a4d581
SHA512
ae4d7f3da15660a479854e56017ddfee6b2c14a345d3305c27d51d5fdef484fa1e960f7ddbc57ea277b1f42f5ba5f88f95d098bff188b4124c20e7960099bc57
SSDEEP
1536:kDGwhWDCfeyYti83gymLWITPPfE1hGVIVKgT8K3ZV1NFPTlozPfI+ZjBra:FoWGfeyYtj3dmLWoXfCTZNFrlMBjBu
resource | yara_rule |
---|---|
static1/unpack001/bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509.dll | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
unpack001/bb7f474008142e7f8a81dfd3bb121b99e23bc262c2ef34c83cd33cc3db5f5509.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
Process32First
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
OpenEventA
SetErrorMode
GetVersionExA
GetWindowsDirectoryA
CopyFileA
SetFileAttributesA
ExpandEnvironmentStringsA
CreateFileA
WriteFile
lstrcmpiA
GetTickCount
InterlockedExchange
TerminateThread
CreateThread
CreateProcessA
lstrcatA
MoveFileA
SetFilePointer
ReadFile
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
FreeLibrary
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
GetProcAddress
EnterCriticalSection
DeleteCriticalSection
Process32Next
CreateToolhelp32Snapshot
LoadLibraryA
PeekNamedPipe
SHGetSpecialFolderPathA
RegSaveKeyA
ClearEventLogA
RegRestoreKeyA
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
RegQueryValueExA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenEventLogA
CloseEventLog
AlphaBlend
CreateDCA
LoadMenuA
wsprintfA
GetWindowTextA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
ReleaseDC
GetCursorPos
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
FindWindowA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
LoadCursorA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
CharNextA
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
InternetReadFile
_adjust_fdiv
_initterm
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strncpy
puts
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
_strrev
putchar
_ftol
ceil
memmove
??3@YAXPAX@Z
rand
strstr
recv
ntohs
socket
getsockname
htons
connect
WSAIoctl
WSACleanup
WSAStartup
send
setsockopt
select
gethostbyname
closesocket
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
WTSQueryUserToken
CreateEnvironmentBlock
BlowAT
Check
MerCedes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ