caonimama
xiaobing
xiaohua
xiaowen
xiaoxiao
Behavioral task
behavioral1
Sample
667990f99d1b4442f2ac903d79488a9428f47dfccae621b3a821d7e14209b5e0.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
667990f99d1b4442f2ac903d79488a9428f47dfccae621b3a821d7e14209b5e0.dll
Resource
win10v2004-20220812-en
Target
667990f99d1b4442f2ac903d79488a9428f47dfccae621b3a821d7e14209b5e0
Size
108KB
MD5
1bba954931efeccd35d777bb1d1bd670
SHA1
d6c6fb90a8e50b5b8e116675aefbf23ee4dd8b57
SHA256
667990f99d1b4442f2ac903d79488a9428f47dfccae621b3a821d7e14209b5e0
SHA512
a6c4443663e60ac18485c52b3169bdb058e28149ec93264c07c7163ca7a9c326a85f431a73b6bb15d477f7e6d9c0307a7cb032babf139150aeef3ae1e86245d6
SSDEEP
1536:rDcZP1TmIOyyABesbhUuActTiWfRM8dRqYwuBrWNa:ncZJmIemes9UuA2TiARM8d4YwuBrWNa
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
FreeConsole
LocalSize
lstrcmpiA
GetCurrentThreadId
DeleteCriticalSection
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
InitializeCriticalSection
GetLogicalDriveStringsA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
RemoveDirectoryA
GetFileSize
GetLocalTime
GetTickCount
MoveFileExA
TerminateThread
OpenProcess
FreeLibrary
CreateFileA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetSystemDirectoryA
SetLastError
MoveFileA
WriteFile
SetFilePointer
ReadFile
CloseDesktop
SetThreadDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
OpenInputDesktop
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
CharNextA
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
CreateWindowExA
PostMessageA
CloseWindow
IsWindow
GetCursorInfo
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
SetWindowsHookExA
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SelectObject
RegEnumValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
SHGetFileInfoA
SHDeleteKeyA
strrchr
strncpy
strncat
strchr
realloc
_except_handler3
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
atoi
_strcmpi
_strnicmp
_CxxThrowException
send
gethostname
getsockname
closesocket
select
recv
ntohs
socket
gethostbyname
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
htons
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
caonimama
xiaobing
xiaohua
xiaowen
xiaoxiao
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ