Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Behavioral task
behavioral1
Sample
e28f1c6bb4ae973f2629381b6b628a4cf58518a2be9066eec3f4bcf917ea5c1b.dll
Resource
win7-20220812-en
Target
e28f1c6bb4ae973f2629381b6b628a4cf58518a2be9066eec3f4bcf917ea5c1b
Size
153KB
MD5
1bb821e248b4e9e55ddc7e23bbe1b640
SHA1
8027f20ec62f2e4c067f09be61bae54cf957932a
SHA256
e28f1c6bb4ae973f2629381b6b628a4cf58518a2be9066eec3f4bcf917ea5c1b
SHA512
026781f8a6c94957741acae0697fd61f835cfc5733e6d769a18722d8e9c36584bab034b714583a5951d4852a4e803ab775d16a08b8cdeee4f3cd26d793be8ca9
SSDEEP
3072:CvYAuBmaZQvO5dl47oyDS0jt26x8cf1TTt2baxLo1o4+nBk:5FZUUdl+T9w6CIZt2G61fgk
resource | yara_rule |
---|---|
sample | family_gh0strat |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindFirstFileA
LocalAlloc
GetFileSize
SetFilePointer
MoveFileA
InitializeCriticalSection
WinExec
lstrcmpiA
Process32First
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
FindClose
GlobalSize
WaitForMultipleObjects
TerminateProcess
OpenProcess
GetCurrentProcess
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetModuleFileNameA
OpenEventA
SetErrorMode
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
CreateFileA
FindNextFileA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CreateThread
ResumeThread
GetProcAddress
SetEvent
WaitForSingleObject
CloseHandle
LoadLibraryA
GetLogicalDriveStringsA
LocalFree
GlobalAlloc
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
LoadCursorA
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
RegisterClassA
LoadMenuA
CreateWindowExA
MessageBoxA
wsprintfA
GetMessageA
TranslateMessage
DispatchMessageA
EmptyClipboard
IsWindow
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
EnumWindows
IsWindowVisible
ExitWindowsEx
GetCursorPos
DestroyCursor
GetStockObject
LsaRetrievePrivateData
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaOpenPolicy
LsaFreeMemory
RegSetValueExA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
CloseServiceHandle
DeleteService
OpenServiceA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
GetLengthSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegRestoreKeyA
RegSaveKeyA
AdjustTokenPrivileges
OpenProcessToken
LookupAccountSidA
GetTokenInformation
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
RegCloseKey
SHGetSpecialFolderPathA
_strrev
_stricmp
strncat
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
_beginthreadex
_strcmpi
wcscpy
_errno
strncmp
strrchr
atoi
_except_handler3
free
malloc
strchr
strncpy
sprintf
rand
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
puts
memmove
putchar
ceil
_ftol
strstr
accept
listen
recvfrom
__WSAFDIsSet
getpeername
bind
getsockname
ntohs
inet_ntoa
htonl
WSASocketA
connect
inet_addr
send
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
WSAIoctl
sendto
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
NetUserAdd
NetLocalGroupAddMembers
GetModuleFileNameExA
EnumProcessModules
WTSFreeMemory
WTSQuerySessionInformationA
EndWork
Runing
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ