LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
MyNewFun
ftsWordBreak
wintest
Behavioral task
behavioral1
Sample
6d18ee16bd96c0586b1eb3fe1ee33635cbb899db6779f79b88807e1bed382cc1.dll
Resource
win7-20220812-en
Target
6d18ee16bd96c0586b1eb3fe1ee33635cbb899db6779f79b88807e1bed382cc1
Size
891KB
MD5
92a0256b2adba2da1f673682593dc4ce
SHA1
9577b56094c1f2968aba929b787b8f665cb604ac
SHA256
6d18ee16bd96c0586b1eb3fe1ee33635cbb899db6779f79b88807e1bed382cc1
SHA512
dfbe37e2de7a191eaf79b39dab10ef7a1e5c0c4df150df687065e13fc1f228b0d7fdf3b6040496d3e655de2071f3450f9126eeb34fa8ab85c8b0378d23f2d869
SSDEEP
3072:8UEiA0vSdDv3/68hBaTSRx7HVUxMS/SM6s74:xEb0uvC8X+6HVUxMS/Go4
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
DuplicateHandle
OpenEventA
SetErrorMode
GetCurrentProcess
GlobalSize
CreateMutexA
ExpandEnvironmentStringsA
DisableThreadLibraryCalls
LocalSize
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GlobalFree
UnmapViewOfFile
HeapAlloc
GlobalAlloc
GlobalLock
GetLogicalDriveStringsA
GlobalUnlock
GetDriveTypeA
GetModuleFileNameA
CopyFileA
SetFileAttributesA
Process32First
Process32Next
GetSystemDirectoryA
CreateFileMappingA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetDiskFreeSpaceExA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
FreeLibrary
lstrcatA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
LoadLibraryA
GetProcAddress
VirtualAlloc
EnterCriticalSection
CreateEventA
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
GetTickCount
GetWindowsDirectoryA
OpenProcess
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
ExitProcess
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
BlockInput
GetSystemMetrics
SetRect
GetCursorInfo
GetCursorPos
ReleaseDC
GetDC
CreateWindowExA
LoadMenuA
RegisterClassA
LoadIconA
GetWindowThreadProcessId
IsWindow
CloseWindow
PostMessageA
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
DispatchMessageA
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
EnumWindows
GetWindowTextA
GetClipboardData
TranslateMessage
GetMessageA
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetUserObjectInformationA
OpenInputDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
IsWindowVisible
BitBlt
DeleteDC
DeleteObject
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
GetStockObject
CreateCompatibleBitmap
CreateDCA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
SetServiceStatus
RegSaveKeyA
RegRestoreKeyA
RegisterServiceCtrlHandlerA
StartServiceA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegQueryValueA
SHGetFileInfoA
_strnicmp
_strrev
_strlwr
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
srand
_mbschr
_stricmp
wcstombs
rand
sprintf
_access
realloc
strncat
_errno
strncmp
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
putchar
??2@YAPAXI@Z
??3@YAXPAX@Z
waveOutUnprepareHeader
waveOutClose
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutReset
recvfrom
sendto
WSAStartup
listen
accept
getpeername
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
closesocket
ntohs
recv
select
send
inet_ntoa
inet_addr
gethostname
getsockname
bind
__WSAFDIsSet
socket
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
GetModuleFileNameExA
WTSQueryUserToken
CreateEnvironmentBlock
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
MyNewFun
ftsWordBreak
wintest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ