CH
JustforFun1
JustforFun2
JustforFun3
ServiceMain
Behavioral task
behavioral1
Sample
c39bdc8d1f300ebc56bea1974d7b58f6009d88b9092f3ce9a9ad00355ea803f9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c39bdc8d1f300ebc56bea1974d7b58f6009d88b9092f3ce9a9ad00355ea803f9.dll
Resource
win10v2004-20220812-en
Target
c39bdc8d1f300ebc56bea1974d7b58f6009d88b9092f3ce9a9ad00355ea803f9
Size
66KB
MD5
365584f90c53859d78b6ec64ccadd8c0
SHA1
740b2a7dfb9315e93b57beb493bbd8d59a3412d3
SHA256
c39bdc8d1f300ebc56bea1974d7b58f6009d88b9092f3ce9a9ad00355ea803f9
SHA512
4f810c8f94b897542d0d67d1c5e02dca18d4c157e76a674e1da8304f0d70414225a74b8e3072eda8a0fe7509a0b7e9c16fd28a14910145754d26db1ac5448b40
SSDEEP
1536:CfwMegbhazjbUz3bfKnVEzeDCcQAXfcW8UX1ujF:KwMegszjkKnqCDCrAPcW8kuj
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MoveFileA
GetTempPathA
GetModuleFileNameA
SetLastError
GetCurrentProcess
VirtualAllocEx
OpenProcess
TerminateThread
GetWindowsDirectoryA
GetLocalTime
WriteFile
GetTickCount
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
ReadFile
SetFilePointer
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
WaitForSingleObject
lstrcpyA
ResetEvent
FreeLibrary
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
GetVersionExA
wsprintfA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CharNextA
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strnset
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
free
malloc
_except_handler3
strrchr
strncpy
strtok
strncat
strchr
realloc
atoi
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_strcmpi
select
ntohs
closesocket
socket
gethostbyname
recv
send
gethostname
getsockname
htons
connect
WSAStartup
WSAIoctl
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
capGetDriverDescriptionA
CH
JustforFun1
JustforFun2
JustforFun3
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ