InstallService
ServiceMain
VistaServiceMain
main
setup
Behavioral task
behavioral1
Sample
9a8b7aa4b3cf99672bf2074e5be5a6bd261a98dbf091d7e4754fc356ddbcfa88.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a8b7aa4b3cf99672bf2074e5be5a6bd261a98dbf091d7e4754fc356ddbcfa88.dll
Resource
win10v2004-20221111-en
Target
9a8b7aa4b3cf99672bf2074e5be5a6bd261a98dbf091d7e4754fc356ddbcfa88
Size
108KB
MD5
54894e9bba277a6a90142a1e0911dfaf
SHA1
cfb5d6d13aa7709d9c03aeca0e9bb7c154d11075
SHA256
9a8b7aa4b3cf99672bf2074e5be5a6bd261a98dbf091d7e4754fc356ddbcfa88
SHA512
4d32037411944414d59ec4d584ccf43806ba4cedb7fe7a8be0e8526a18939477aa996568ae136ab4778765106dcc7cc348fa70a075392c6390c86b5f704a209e
SSDEEP
3072:CRDCgYxype4qD+eK+c14FGhQx6eEhDoxn0BLhAxE3Xl:8iAg/QxaG+0DA0BLymXl
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
connect
setsockopt
WSAIoctl
send
htons
gethostname
getsockname
inet_ntoa
gethostbyname
WSACleanup
socket
ntohs
closesocket
recv
inet_addr
select
WSAStartup
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
ord825
ord823
ord1105
ord801
ord800
ord858
ord5710
ord6883
ord4129
ord2764
ord6143
ord541
ord535
ord860
ord540
ord939
ord5683
ord1140
ord5645
ord2915
ord941
ord2818
ord3337
ord547
ord665
ord603
ord1979
ord924
ord5461
ord273
ord353
ord537
ord6930
ord2864
ord1168
ord4278
ord6662
strchr
wcstombs
_iob
fprintf
_strdate
strncpy
fopen
_vsnprintf
_splitpath
_beginthreadex
_except_handler3
calloc
free
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
strncat
exit
malloc
strrchr
strncmp
_mbscmp
fclose
atol
_mbsnbcpy
atoi
printf
_CxxThrowException
__CxxFrameHandler
strstr
_ftol
ceil
_strtime
memmove
GetCurrentThreadId
WaitForMultipleObjects
PeekNamedPipe
DisconnectNamedPipe
SetErrorMode
OpenEventA
ReleaseMutex
LoadLibraryA
FindResourceA
LoadResource
LockResource
SizeofResource
FreeLibrary
GetStdHandle
OutputDebugStringA
FreeConsole
lstrcmpiA
SetLastError
GetSystemDirectoryA
GetModuleFileNameA
GetVersionExA
GlobalMemoryStatus
GetPrivateProfileStringA
GetTickCount
TerminateThread
WritePrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalSize
GlobalUnlock
CreateFileMappingA
MapViewOfFile
GetFileSize
UnmapViewOfFile
CreateFileA
WriteFile
GetTempPathA
lstrcmpA
lstrcatA
CreatePipe
GetStartupInfoA
CreateProcessA
ReadFile
GetFileAttributesA
SetFileAttributesA
GetDiskFreeSpaceExA
MoveFileA
GetLogicalDriveStringsA
GetVolumeInformationA
GetDriveTypeA
CopyFileA
TerminateProcess
CreateDirectoryA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
FindClose
LocalFree
FindNextFileA
lstrlenA
LocalReAlloc
FindFirstFileA
LocalAlloc
LocalSize
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetLastError
GetCurrentProcess
DeleteFileA
RemoveDirectoryA
GlobalFree
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
ReleaseDC
BlockInput
DestroyCursor
ExitWindowsEx
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
FindWindowA
SendMessageA
GetCursorInfo
SystemParametersInfoA
GetCursorPos
EnumWindows
IsWindowVisible
GetClassNameA
GetWindowTextA
FindWindowExA
PostMessageA
wsprintfA
CloseDesktop
OpenInputDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
CreateWindowExA
CloseWindow
IsWindow
LoadCursorA
CreateCompatibleDC
SelectObject
DeleteDC
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateDIBSection
GetDIBits
ControlService
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
SetServiceStatus
RegisterServiceCtrlHandlerA
CreateServiceA
ChangeServiceConfig2A
RegCreateKeyA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
QueryServiceConfigA
OpenServiceA
EnumServicesStatusA
CloseServiceHandle
OpenSCManagerA
QueryServiceConfig2A
StartServiceA
ChangeServiceConfigA
DeleteService
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegQueryValueExA
RegOpenKeyA
ShellExecuteA
SHFileOperationA
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??_8?$basic_ofstream@DU?$char_traits@D@std@@@std@@7B@
??0ios_base@std@@IAE@XZ
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N1@Z
??0?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAE@PAU_iobuf@@@Z
??_7?$basic_ofstream@DU?$char_traits@D@std@@@std@@6B@
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
??_7?$basic_filebuf@DU?$char_traits@D@std@@@std@@6B@
?close@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@XZ
??1locale@std@@QAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??1ios_base@std@@UAE@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@12@@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1_Winit@std@@QAE@XZ
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
GetModuleFileNameExA
EnumProcessModules
WTSEnumerateSessionsA
CreateEnvironmentBlock
InstallService
ServiceMain
VistaServiceMain
main
setup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ