DllUpdate
Install
MainThread
ServiceMain
Uninstall
Behavioral task
behavioral1
Sample
03c858c4c2b5446c8e0d1f9e9c7f12ec813c79c9b3bf0a788bb77d46137fdba7.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
03c858c4c2b5446c8e0d1f9e9c7f12ec813c79c9b3bf0a788bb77d46137fdba7.dll
Resource
win10v2004-20231023-en
Target
03c858c4c2b5446c8e0d1f9e9c7f12ec813c79c9b3bf0a788bb77d46137fdba7
Size
899KB
MD5
e1194f570242ca095abd1c465bf7d798
SHA1
5f10b1ee513cbba8594b5b57e1d8ad5ca65c9d89
SHA256
03c858c4c2b5446c8e0d1f9e9c7f12ec813c79c9b3bf0a788bb77d46137fdba7
SHA512
54da250c7c55acd397fc5222ace718b2c6e72ad4f0a8891e344a5f1938ec1761d2c8e236aba9babf3a7f65df261c46d5eb272823f6baa270b2128361beda71c1
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXB:7wqd87VB
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
03c858c4c2b5446c8e0d1f9e9c7f12ec813c79c9b3bf0a788bb77d46137fdba7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindClose
LocalFree
FindNextFileA
LocalReAlloc
LocalAlloc
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
ReadFile
MoveFileA
WaitForSingleObject
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
WinExec
LocalSize
GetCurrentProcessId
Process32Next
TerminateProcess
OpenProcess
Process32First
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
GetCurrentDirectoryA
FreeConsole
GetModuleHandleA
SetEvent
GetLogicalDriveStringsA
GetProcessHeap
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
CreateThread
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
CreateEventA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
GetCurrentThreadId
GetSystemInfo
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
ExpandEnvironmentStringsA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
GetFileSize
CreateFileA
SetFilePointer
WriteFile
VirtualFree
CloseHandle
Sleep
InterlockedExchange
VirtualAlloc
HeapAlloc
GetUserObjectInformationA
GetThreadDesktop
wsprintfA
SetThreadDesktop
CloseDesktop
GetCursorPos
GetCursorInfo
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
MapVirtualKeyA
keybd_event
CharNextA
SystemParametersInfoA
SendMessageA
ReleaseDC
BlockInput
DestroyCursor
LoadCursorA
GetDC
GetLastInputInfo
OpenInputDesktop
GetSystemMetrics
ChangeDisplaySettingsA
GetWindowThreadProcessId
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
CombineRgn
GetRegionData
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
DeleteDC
GetDeviceCaps
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
OpenSCManagerA
SHGetFolderPathA
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitialize
VariantClear
VariantInit
ord823
ord825
_strupr
_stricmp
_strcmpi
_strnicmp
exit
fprintf
sscanf
getenv
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
_iob
_errno
realloc
strchr
wcstombs
vsprintf
sprintf
ceil
_ftol
__CxxFrameHandler
_CxxThrowException
free
malloc
_except_handler3
strstr
strncpy
strrchr
memmove
_local_unwind2
rand
printf
atoi
strcspn
URLDownloadToFileA
inet_ntoa
recv
send
select
__WSAFDIsSet
recvfrom
sendto
gethostbyname
connect
inet_addr
WSAStartup
WSACleanup
accept
socket
htons
bind
listen
getsockname
ntohs
closesocket
getpeername
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
GetAdaptersInfo
GetIfTable
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ