EndWork
Runing
ServiceMain
Working
Behavioral task
behavioral1
Sample
cd3a0862178a7aa32a2162b830bf49244e81c26ee6e589028f504408d69f9e26.dll
Resource
win7-20220901-en
Target
cd3a0862178a7aa32a2162b830bf49244e81c26ee6e589028f504408d69f9e26
Size
69KB
MD5
e1f56eea1515e58f6050899fb15fa947
SHA1
ddf15c107ca111c5e84534bb5587aae1a512cd7e
SHA256
cd3a0862178a7aa32a2162b830bf49244e81c26ee6e589028f504408d69f9e26
SHA512
a77a119f31102b4c87a2020a12aa38c31d02b1f9b07a5489d4c85d4cb97b00fc2ced215109320221c8420290d36d70f7bef1e078db41e11742fa08d89cd14a3f
SSDEEP
1536:/9GyrJcd/yfc9SmOtFqxj7/0Ms03U8jByf/179b:/IyrJi/Ec9SrF2f0103U8jByn179
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
Sleep
VirtualAlloc
CloseHandle
WaitForSingleObject
GetLastError
ResetEvent
SetEvent
InterlockedExchange
CancelIo
GetTickCount
GetLocalTime
CreateThread
GetCurrentProcessId
HeapAlloc
GetProcessHeap
CreateProcessA
WinExec
lstrcpyA
TerminateThread
DeleteFileA
lstrcatA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetVersionExA
OpenEventA
SetErrorMode
CreateDirectoryA
GetCurrentProcess
lstrlenA
GetWindowsDirectoryA
SetFileAttributesA
SetFilePointer
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
ReadFile
CreateFileA
RaiseException
LocalAlloc
ceil
_ftol
puts
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
rand
sprintf
strncpy
strrchr
malloc
_beginthreadex
atoi
wcstombs
_access
srand
calloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
putchar
memmove
??3@YAXPAX@Z
_strrev
_stricmp
EndWork
Runing
ServiceMain
Working
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ