LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Overview
overview
9Static
static
9Cache/gy.exe
windows7-x64
8Cache/gy.exe
windows10-2004-x64
8Plug/Infect.dll
windows7-x64
1Plug/Infect.dll
windows10-2004-x64
1Plug/PlusCtrl.dll
windows7-x64
1Plug/PlusCtrl.dll
windows10-2004-x64
3Plug/PlusSock.dll
windows7-x64
1Plug/PlusSock.dll
windows10-2004-x64
1SkinH.dll
windows7-x64
8SkinH.dll
windows10-2004-x64
8去脚本�...��.url
windows7-x64
1去脚本�...��.url
windows10-2004-x64
1客户端.exe
windows7-x64
8客户端.exe
windows10-2004-x64
7服务器软件.url
windows7-x64
1服务器软件.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Cache/gy.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Cache/gy.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Plug/Infect.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Plug/Infect.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Plug/PlusCtrl.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Plug/PlusCtrl.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
Plug/PlusSock.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Plug/PlusSock.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
SkinH.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
SkinH.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
去脚本之家看看.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
去脚本之家看看.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
客户端.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
客户端.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
服务器软件.url
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
服务器软件.url
Resource
win10v2004-20220812-en
Target
e5c61930a48d476928e01fd0ffd933f48d943effa1cef38724bce8014e708aba
Size
1.5MB
MD5
4c1704997594ecc6a39c23a984d393c2
SHA1
0dd440dd02393d9cac67440d5c3e15b8b4ab5713
SHA256
e5c61930a48d476928e01fd0ffd933f48d943effa1cef38724bce8014e708aba
SHA512
8da57afc942477a84bbc6e51fc5266fcdada5d365959abd677ad3689d838ee2ac598f6a792c1ea37cef28782cb1623eeb643475f949b8dde0cfa231806e5537c
SSDEEP
24576:fRdZwAS3qQdmVq5ZVA2neTWWxLSha5WIgxha1zkct2irJM68nTxELYUm/ujK7a+W:5EAWqGnjNnWxeGgPauctVJMdTSYvu6VW
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/SkinH.dll | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/SkinH.dll | upx |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord1146
ord3749
ord324
ord4234
ord6197
ord4710
ord2379
ord755
ord470
ord823
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord4998
ord4853
ord4376
ord5265
ord1134
ord2514
ord641
ord815
ord825
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord4673
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord1168
ord1576
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
free
strcmp
time
localtime
exit
strcpy
__CxxFrameHandler
realloc
malloc
strlen
_setmbcp
strchr
rand
_controlfp
_except_handler3
sprintf
memset
memcpy
strstr
atoi
strcspn
strncpy
LoadResource
LockResource
WriteFile
SetFilePointer
lstrcpynA
CloseHandle
lstrlenA
lstrcatA
CreateFileA
OpenMutexA
GetLastError
ReleaseMutex
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
lstrcmpA
Sleep
GetLocalTime
WinExec
FindResourceA
GetProcAddress
GetFileSize
GetFileAttributesA
lstrcpyA
WaitForSingleObject
GetShortPathNameA
SetLastError
CopyFileA
SetFileAttributesA
CreateDirectoryA
GetModuleFileNameA
GetCurrentThreadId
GetTickCount
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
GetComputerNameA
GetSystemDefaultUILanguage
GetModuleHandleA
GetStartupInfoA
EnumResourceNamesA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GlobalFree
ReadFile
LoadLibraryA
CreateThread
GetSystemDirectoryA
ExitThread
TerminateProcess
CreateProcessA
GlobalAlloc
SendMessageA
GetSystemMetrics
IsIconic
EnableWindow
DrawIcon
GetClientRect
LoadIconA
wsprintfA
GetDesktopWindow
GetMessageA
PostThreadMessageA
GetInputState
SetWindowLongA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteA
ShellExecuteExA
getpeername
recv
select
htons
ntohs
setsockopt
send
WSAIoctl
__WSAFDIsSet
htonl
WSASocketA
socket
connect
closesocket
gethostname
gethostbyname
WSACleanup
WSAStartup
inet_addr
sendto
timeGetTime
GetAdaptersInfo
GetIfTable
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
ord64
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetSetOptionA
InternetCloseHandle
HttpSendRequestA
InternetReadFile
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord6375
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord4274
ord3790
ord356
ord2770
ord1980
ord2781
ord4058
ord3181
ord800
ord3319
ord269
ord826
ord600
ord1578
ord6467
ord1255
ord3310
ord2820
ord6385
ord668
ord354
ord5186
ord1979
ord665
ord825
ord823
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord4465
ord1116
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
calloc
memcmp
fwrite
fread
fopen
fseek
fclose
_beginthread
memset
sprintf
_strupr
strcat
strchr
strcpy
memcpy
strlen
__CxxFrameHandler
TerminateThread
WaitForSingleObject
CreateThread
Sleep
GetCurrentThreadId
LocalFree
LocalAlloc
CreateDirectoryA
MoveFileA
GetTempPathA
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
GetVolumeInformationA
SetCurrentDirectoryA
lstrlenA
lstrcpyA
CreateEventA
SetEvent
CloseHandle
CreateDesktopA
CreateWindowStationA
CloseDesktop
CloseWindowStation
GetThreadDesktop
GetProcessWindowStation
SetThreadDesktop
SetProcessWindowStation
keybd_event
mouse_event
SetCursorPos
GetDC
ReleaseDC
BitBlt
GetDeviceCaps
DeleteDC
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
GetDIBits
RealizePalette
SelectPalette
GetStockObject
CreateDCA
ShellExecuteA
SHEmptyRecycleBinA
SHFileOperationA
ProcessTrans
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcpyA
GetModuleFileNameA
lstrlenA
GetSystemTime
lstrcatA
Sleep
CreateProcessA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
CloseHandle
FlushFileBuffers
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetStdHandle
SetFilePointer
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetOEMCP
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
SetConsoleCtrlHandler
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
SetEnvironmentVariableA
SendMessageA
wsprintfA
FindWindowA
BringWindowToTop
GetWindowThreadProcessId
StrToIntA
StrChrA
PathFindFileNameA
WSAStartup
ioctlsocket
send
recv
htonl
WSACleanup
WSADuplicateSocketA
closesocket
PlusSockClient
PlusSockCommand
PlusSockStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SkinH_AdjustAero
SkinH_AdjustHSV
SkinH_Attach
SkinH_AttachEx
SkinH_AttachExt
SkinH_AttachRes
SkinH_AttachResEx
SkinH_Detach
SkinH_DetachEx
SkinH_GetColor
SkinH_LockUpdate
SkinH_Map
SkinH_NineBlt
SkinH_SetAero
SkinH_SetBackColor
SkinH_SetFont
SkinH_SetFontEx
SkinH_SetForeColor
SkinH_SetMenuAlpha
SkinH_SetTitleMenuBar
SkinH_SetWindowAlpha
SkinH_SetWindowMovable
SkinH_VerifySign
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE