CH
JustforFun1
JustforFun2
JustforFun3
ServiceMain
Behavioral task
behavioral1
Sample
a6d094f501eda0df98c5807e6b6c762c30fb169948d71fb12c99cf1e3726ccbb.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6d094f501eda0df98c5807e6b6c762c30fb169948d71fb12c99cf1e3726ccbb.dll
Resource
win10v2004-20220901-en
Target
a6d094f501eda0df98c5807e6b6c762c30fb169948d71fb12c99cf1e3726ccbb
Size
66KB
MD5
2f0c4a953f8ad0463a676ceb81e7be61
SHA1
894b40296ba87c6337ecfb5261a55ffbbc4abfd6
SHA256
a6d094f501eda0df98c5807e6b6c762c30fb169948d71fb12c99cf1e3726ccbb
SHA512
c03745b198d85f8c60cf6d00fa22ed1fb8fad1ae7d7323cf40fb2938ea86db5cbbff0f98c77d8f18a3680ec5ec6c3907ad780dfd1e655061bf87d0fb4dd67f32
SSDEEP
1536:CfwfzgbhazjbUz3bfKnlELeDCcQAXfcW8UX1uPF:+wfzgszjkKnaKDCrAPcW8kuP
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MoveFileA
GetTempPathA
GetModuleFileNameA
SetLastError
GetCurrentProcess
VirtualAllocEx
OpenProcess
TerminateThread
GetWindowsDirectoryA
GetLocalTime
WriteFile
GetTickCount
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
ReadFile
SetFilePointer
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
WaitForSingleObject
lstrcpyA
ResetEvent
FreeLibrary
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
GetVersionExA
wsprintfA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CharNextA
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strnset
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
free
malloc
_except_handler3
strrchr
strncpy
strtok
strncat
strchr
realloc
atoi
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_strcmpi
select
ntohs
closesocket
socket
gethostbyname
recv
send
gethostname
getsockname
htons
connect
WSAStartup
WSAIoctl
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
capGetDriverDescriptionA
CH
JustforFun1
JustforFun2
JustforFun3
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ