aabbccdd
daxuewuli
eeffgghh
gaoshu
gongchengshuxue
iijjkkmm
Behavioral task
behavioral1
Sample
9ae4e1eb1223f0a7ea68afeb32a610155b842d3931fa16f993e8980722707c2e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ae4e1eb1223f0a7ea68afeb32a610155b842d3931fa16f993e8980722707c2e.exe
Resource
win10v2004-20220812-en
Target
9ae4e1eb1223f0a7ea68afeb32a610155b842d3931fa16f993e8980722707c2e
Size
160KB
MD5
6d99e75651ae2cd1aafc4f3a2b39df01
SHA1
c5e54320e386251b7c240c6b91badeddad7fe350
SHA256
9ae4e1eb1223f0a7ea68afeb32a610155b842d3931fa16f993e8980722707c2e
SHA512
d1561ad463ccb0a0a9f6ed8a634be44689d689d57688850ae56a36b34d8946481166b94f7397bb485a01bbdbadad511f7818c903668cc28ca36d15e7cfea5737
SSDEEP
3072:Hej2lPIYAzdVmpy4Lfy9Wkdla/e2Qy/hbZd:H25Yy4L36aW1y/hbZ
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
GetTickCount
GetLocalTime
Sleep
CreateThread
FreeLibrary
GetCurrentProcessId
HeapAlloc
GetProcessHeap
MoveFileA
lstrcatA
MultiByteToWideChar
lstrlenA
GlobalUnlock
OpenProcess
GetCurrentProcess
CloseHandle
GetStartupInfoA
LocalAlloc
InterlockedExchange
RaiseException
GetLastError
GetModuleHandleA
strstr
rand
sprintf
strncpy
strchr
malloc
free
_except_handler3
strrchr
atoi
_ftol
strncmp
_errno
exit
strncat
atol
_beginthreadex
calloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
_iob
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strupr
_strnicmp
ceil
memmove
_CxxThrowException
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
wcscpy
memcpy
URLDownloadToFileA
NetLocalGroupAddMembers
NetUserAdd
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
aabbccdd
daxuewuli
eeffgghh
gaoshu
gongchengshuxue
iijjkkmm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ