ResetSSDT
ServiceMain
Behavioral task
behavioral1
Sample
ad1e19159e8e80bce489eb156a46eeb961d3e9f888367a978d0830ce196ffee1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad1e19159e8e80bce489eb156a46eeb961d3e9f888367a978d0830ce196ffee1.exe
Resource
win10v2004-20221111-en
Target
ad1e19159e8e80bce489eb156a46eeb961d3e9f888367a978d0830ce196ffee1
Size
132KB
MD5
bae9437be9002af873a88b68c8b2f563
SHA1
2b58d7bf3fe8475ef62bd9e3735c10bb5e138b0e
SHA256
ad1e19159e8e80bce489eb156a46eeb961d3e9f888367a978d0830ce196ffee1
SHA512
faeae1733f09efbdc9634d2a8b553f934943d64442d38ebeb2dfd6794c2b94434ae28616e9336860d2d1da4aba740e7b6a6a038d19b6c73c1b2fa25175be1285
SSDEEP
3072:KdJRQRbnLIVPIFwhYMuanhL884FfcsUBesb/z4c:IJibSgwSDanhYFmDBZz4
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
LoadLibraryExA
GetModuleHandleA
SetFileAttributesA
ReleaseMutex
OpenEventA
SetErrorMode
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
SetStdHandle
FlushFileBuffers
LCMapStringW
HeapFree
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
IsBadWritePtr
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
ExitProcess
GetVersion
GetCommandLineA
ExitThread
TlsSetValue
InterlockedIncrement
InterlockedDecrement
HeapReAlloc
RaiseException
RtlUnwind
GetLocalTime
GetTickCount
MoveFileExA
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
CreateEventA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
LCMapStringA
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
TranslateMessage
UnhookWindowsHookEx
LoadCursorA
mouse_event
BlockInput
SystemParametersInfoA
SendMessageA
CloseClipboard
SetClipboardData
SetWindowsHookExA
DispatchMessageA
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
SetCursorPos
DestroyCursor
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
ExitWindowsEx
GetWindowThreadProcessId
CloseWindow
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
keybd_event
MapVirtualKeyA
SetCapture
IsWindow
OpenInputDesktop
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
WindowFromPoint
CreateDIBSection
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
SelectObject
LsaRetrievePrivateData
IsValidSid
LookupAccountNameA
LsaClose
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
waveInStart
waveInAddBuffer
waveOutWrite
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveInStop
waveInReset
waveInUnprepareHeader
waveInClose
waveInPrepareHeader
waveOutClose
waveOutUnprepareHeader
waveOutGetNumDevs
waveOutOpen
waveOutReset
WSAStartup
WSACleanup
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capCreateCaptureWindowA
capGetDriverDescriptionA
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICSeqCompressFrame
EnumProcessModules
GetModuleFileNameExA
WTSQuerySessionInformationA
WTSFreeMemory
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ