BEBBTBTGTUleBTad_GIBTF_AniBTBTmator
BEBGTUlead_GIF_Animator
ServiceMain
UTTBTlead_GIF_AnimatBTBTor
Ulead_GIF_Animator
Behavioral task
behavioral1
Sample
d600da64b2c07254341afb377495de614ee67589d25396f488e69361af1eca53.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d600da64b2c07254341afb377495de614ee67589d25396f488e69361af1eca53.dll
Resource
win10v2004-20220812-en
Target
d600da64b2c07254341afb377495de614ee67589d25396f488e69361af1eca53
Size
111KB
MD5
6cc1f56b9f296304a2c9f5c3391ede5f
SHA1
4074487c438d23f0bba514733c5091af608f850d
SHA256
d600da64b2c07254341afb377495de614ee67589d25396f488e69361af1eca53
SHA512
0b7ad2010964e01289e5241bcb2896c41dbd69e47e48df61ed54cc85e9ace90113a837ca35380ee76f5abe07fe981de3b938cc03a8d656608b82a18dbab8c047
SSDEEP
1536:MVorihv9bRkdnzEaJOqAdcJkgfuzsCt4JbRH6gzfB/8vlTNw:MCr2RQjOqAdqk6uzs84JbRH6gzfB/86
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
OutputDebugStringA
CreateFileA
GlobalMemoryStatus
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
CreateRemoteThread
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
DeviceIoControl
CreateEventA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
GetActiveWindow
OpenClipboard
GetClipboardData
DestroyCursor
SystemParametersInfoA
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
IsWindow
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
EnumWindows
DispatchMessageA
SetRect
BlockInput
CallNextHookEx
GetSystemMetrics
GetKeyNameTextA
EmptyClipboard
GetWindowTextA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
DeleteDC
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
DeleteObject
BitBlt
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
IsValidSid
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strupr
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
time
srand
rand
_errno
strncmp
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInReset
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveInUnprepareHeader
waveInClose
waveOutReset
waveInPrepareHeader
waveOutClose
waveOutGetNumDevs
waveOutUnprepareHeader
htons
setsockopt
gethostbyname
WSACleanup
WSAStartup
socket
ntohs
recv
closesocket
select
send
inet_ntoa
WSAGetLastError
htonl
gethostname
WSASocketA
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
WSAIoctl
inet_addr
connect
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
capCreateCaptureWindowA
capGetDriverDescriptionA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
EnumProcessModules
GetModuleFileNameExA
BEBBTBTGTUleBTad_GIBTF_AniBTBTmator
BEBGTUlead_GIF_Animator
ServiceMain
UTTBTlead_GIF_AnimatBTBTor
Ulead_GIF_Animator
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ