BlowAT
FineView
GhRecord
PIPELINCE
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.Generic-5ee083459b744bf505e.dll
Resource
win7-20230712-en
Target
HEUR-Trojan.Win32.Generic-5ee083459b744bf505e.dll
Size
224KB
MD5
55a8c5f7fa47ca1c2444c26f3678c249
SHA1
b976411ef482e6258a863733ec0f27a8ad1f3e82
SHA256
5ee083459b744bf505e15205878babdacbf5fb3bd281766a9958c33eed2bf2b6
SHA512
f934b8f3b9fd4e9d86895ddd9c436f81e38c40016062b171f6d958cb3bc5628c8bab816c5fd3c00b49413c93356469f7fedbe9c946a55585f7bd8e50924bfbcc
SSDEEP
3072:KdQo6wtIptugitFof9zCPc4MS77IxZa39TtsAneb/eZJ73tt4TSOB3c7TLby:sQoPIHi0zYOS77aZQ10/6J7zWSOBay
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
HEUR-Trojan.Win32.Generic-5ee083459b744bf505e.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_DLL
_onexit
__dllonexit
_adjust_fdiv
_initterm
calloc
srand
_access
rand
wcstombs
atoi
_beginthreadex
strncpy
puts
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
putchar
_ftol
ceil
memmove
??3@YAXPAX@Z
_strrev
WSACleanup
WSAIoctl
connect
htons
gethostbyname
socket
ntohs
WSAStartup
closesocket
select
send
setsockopt
getsockname
recv
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
WTSQueryUserToken
CreateEnvironmentBlock
GetCurrentProcess
GetComputerNameA
GetCurrentThreadId
OpenEventA
TerminateProcess
LocalSize
WaitForMultipleObjects
PeekNamedPipe
GetStartupInfoA
SetErrorMode
CopyFileA
OpenProcess
GetWindowsDirectoryA
SetFileAttributesA
ExpandEnvironmentStringsA
GetVersionExA
GetProcAddress
LoadLibraryA
DeleteCriticalSection
EnterCriticalSection
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
FreeLibrary
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
CreateThread
TerminateThread
InterlockedExchange
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetTickCount
WriteFile
CreateFileA
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GlobalSize
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
SHGetSpecialFolderPathA
AdjustTokenPrivileges
CreateProcessAsUserA
RegOpenKeyA
RegQueryValueExA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenEventLogA
ClearEventLogA
CloseEventLog
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
LookupPrivilegeValueA
RegRestoreKeyA
RegSaveKeyA
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
AlphaBlend
CreateDCA
WindowFromPoint
LoadMenuA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
CharNextA
wsprintfA
GetWindowTextA
FindWindowA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
LoadCursorA
SendMessageA
keybd_event
ReleaseDC
SetCapture
MapVirtualKeyA
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetCursorPos
BlowAT
FineView
GhRecord
PIPELINCE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ