Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Behavioral task
behavioral1
Sample
a1046bbbfeeaca93ee7dcefc895651efd89f9a9cbc0c89b7d12765b22f9d1dc7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1046bbbfeeaca93ee7dcefc895651efd89f9a9cbc0c89b7d12765b22f9d1dc7.dll
Resource
win10v2004-20220812-en
Target
a1046bbbfeeaca93ee7dcefc895651efd89f9a9cbc0c89b7d12765b22f9d1dc7
Size
114KB
MD5
5a369e80698b7b527ef9dd9d16b2c760
SHA1
03aa4fe23227bc881525f869102fcb455fa51af2
SHA256
a1046bbbfeeaca93ee7dcefc895651efd89f9a9cbc0c89b7d12765b22f9d1dc7
SHA512
b0141590b9e2af1cbd8753478e98738250318fdbd281ac6bfa7e7b2f2c689421315c3aa5bedf039abd9380705b5adfd1c185c7d443e4931a0a50d88636e8f09d
SSDEEP
3072:U05V/POWc+URTX/rUrKAslVcdBWcuZlnjI/vT69:l/GWc+UV4rzmydBWcSlnjV
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTempPathA
MultiByteToWideChar
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
lstrcmpiA
GetCurrentThreadId
OpenMutexA
CreateMutexA
OutputDebugStringA
GetCurrentProcess
MoveFileA
RemoveDirectoryA
LocalReAlloc
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
GetLastError
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
lstrlenA
LocalAlloc
LocalFree
GetModuleHandleA
GetProcAddress
CreateProcessA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateDirectoryA
GetModuleFileNameA
CreateFileMappingA
MapViewOfFile
GetFileSize
UnmapViewOfFile
DeleteFileA
lstrcpyA
Sleep
CancelIo
InterlockedExchange
ResetEvent
CreateFileA
WriteFile
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
CreateEventA
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
GetDiskFreeSpaceA
GetSystemDirectoryA
HeapAlloc
GetProcessHeap
HeapFree
GetLocalTime
LoadLibraryA
FreeLibrary
GetFileAttributesA
CloseHandle
WaitForMultipleObjects
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
DestroyCursor
BlockInput
SystemParametersInfoA
CharNextA
keybd_event
GetForegroundWindow
GetAsyncKeyState
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetWindowTextA
MapVirtualKeyA
GetKeyboardState
DispatchMessageA
CloseWindow
IsWindow
SetCapture
TranslateMessage
GetMessageA
ExitWindowsEx
SendMessageA
wsprintfA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
DeleteDC
DeleteObject
CreateCompatibleDC
BitBlt
SelectObject
GetStockObject
TextOutA
CreateCompatibleBitmap
GetDIBits
CreateDIBSection
CryptAcquireContextA
CryptReleaseContext
CryptDestroyKey
CryptDecrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptVerifySignatureA
CryptImportKey
CryptGetHashParam
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
CryptDestroyHash
SHGetFileInfoA
CoCreateInstance
CoUninitialize
CoInitialize
PathFindExtensionA
_strnicmp
strncat
_strlwr
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
vsprintf
_beginthreadex
strncpy
wcstombs
strchr
fopen
fclose
fread
strrchr
malloc
free
atoi
srand
rand
_splitpath
_snprintf
time
gmtime
_local_unwind2
_except_handler3
sprintf
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveInUnprepareHeader
waveInReset
waveInStop
waveInClose
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveOutWrite
waveOutOpen
waveOutGetNumDevs
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
WSAStartup
WSACleanup
gethostname
getsockname
inet_ntoa
send
closesocket
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
recv
select
WSAGetLastError
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
capGetDriverDescriptionA
capCreateCaptureWindowA
ICCompressorFree
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICSeqCompressFrameEnd
ICOpen
ICClose
WTSQueryUserToken
CreateEnvironmentBlock
ServiceMain
Startup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ