a
aaaaaaaaaaa
qqqqq
xiaobei
Behavioral task
behavioral1
Sample
6431a028095b445ef44d9bca28ec8aa23a89fb7eb93823e7e513177039c905be.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6431a028095b445ef44d9bca28ec8aa23a89fb7eb93823e7e513177039c905be.dll
Resource
win10v2004-20221111-en
Target
6431a028095b445ef44d9bca28ec8aa23a89fb7eb93823e7e513177039c905be
Size
83KB
MD5
d7fe0903273a2111862d4ac6eeb02c60
SHA1
3aef87ffec57f46dbd1b46e42637758cf0388e9b
SHA256
6431a028095b445ef44d9bca28ec8aa23a89fb7eb93823e7e513177039c905be
SHA512
4959d8450db622422ffc6229dd301e16690e3e96edc1f4d2f7b87edc4cb395ddcb4301697863cc1180a566d28fb39399bb65138d8c4df5b443c293321488c94d
SSDEEP
1536:YNqxYD98u/b/TQMqN9Rt+4LqazE+5Xcv+Cfr0wV3mwAa2:Yqxdu/b/EMQ9+SNw+5XQ+Ur0wZmwAa2
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
DeleteCriticalSection
VirtualFree
GetProcessHeap
HeapFree
GetLocalTime
GetTickCount
MoveFileExA
TerminateThread
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetProcAddress
LoadLibraryA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
DeleteFileA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
InitializeCriticalSection
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
OpenProcess
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
DeviceIoControl
GetSystemDirectoryA
SetLastError
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetThreadDesktop
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
CharNextA
wsprintfA
GetCursorInfo
OpenDesktopA
GetCursorPos
MessageBoxA
GetWindowTextA
GetActiveWindow
PostMessageA
GetKeyNameTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BitBlt
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
SelectObject
DeleteObject
GetDIBits
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
SHGetFileInfoA
SHDeleteKeyA
_except_handler3
strrchr
strncpy
strncat
strchr
realloc
atoi
malloc
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
free
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
_strcmpi
wcstombs
??3@YAXPAX@Z
_strrev
_strnicmp
sprintf
closesocket
socket
send
gethostname
getsockname
recv
ntohs
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSAStartup
WSACleanup
select
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
capGetDriverDescriptionA
EnumProcessModules
GetModuleFileNameExA
a
aaaaaaaaaaa
qqqqq
xiaobei
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ