ServiceMain
backspace
homeland
Behavioral task
behavioral1
Sample
c3d3eb91dea559381520f09ab78389bebabb8d2891003cc5d3556b7cb6fe1cf6.dll
Resource
win7-20220901-en
Target
c3d3eb91dea559381520f09ab78389bebabb8d2891003cc5d3556b7cb6fe1cf6
Size
80KB
MD5
30a2054987a3cc601d716321deca78f7
SHA1
3d11b10bf292c543c33f605cccda73c020036f27
SHA256
c3d3eb91dea559381520f09ab78389bebabb8d2891003cc5d3556b7cb6fe1cf6
SHA512
0bbc595077d05346540df5fb7eb0a5f186dc0ebb9a27274d09390db2bb0f1206e80778c03742f56dfb9435075955b5822cc13ad8b497959907200b636abc13da
SSDEEP
1536:zwmNjOMGmjTJCe5CMq3qsKrz94/Labck86fzsKLI12paw1KC:zwmNjDGmZzIasKrzAab788zsKHpa4h
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
WriteProcessMemory
GetTickCount
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
CreateRemoteThread
GetCurrentProcess
CreateProcessA
GetLocalTime
OpenProcess
WaitForMultipleObjects
VirtualAllocEx
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
GetTempPathA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetWindowsDirectoryA
lstrcatA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
CreateEventA
PeekNamedPipe
SetCapture
WindowFromPoint
SetCursorPos
MapVirtualKeyA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
mouse_event
GetSystemMetrics
SendMessageA
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetCursorPos
GetCursorInfo
SystemParametersInfoA
BlockInput
DestroyCursor
keybd_event
LoadCursorA
SetProcessWindowStation
GetClipboardData
wsprintfA
CharNextA
ReleaseDC
GetDesktopWindow
GetDC
SetRect
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SelectObject
RegSetValueExA
RegDeleteKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegCreateKeyExA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strnset
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strncat
strtok
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
WSAStartup
connect
htons
gethostbyname
socket
closesocket
ntohs
select
recv
send
gethostname
getsockname
WSAIoctl
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
capGetDriverDescriptionA
EnumProcessModules
GetModuleFileNameExA
ServiceMain
backspace
homeland
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ