DllUpdate
Install
MainThread
ServiceMain
Uninstall
Behavioral task
behavioral1
Sample
9dafd0c584b6a6dc9f1e78461f3ff448bb01ba498e0ebd42fa48c0d4c87274a8.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9dafd0c584b6a6dc9f1e78461f3ff448bb01ba498e0ebd42fa48c0d4c87274a8.dll
Resource
win10v2004-20231023-en
Target
9dafd0c584b6a6dc9f1e78461f3ff448bb01ba498e0ebd42fa48c0d4c87274a8
Size
1013KB
MD5
2902d1ef174410fa277695744f8783aa
SHA1
2b21f67856d5ba21b2b4e3f8e5d57178f10e43f7
SHA256
9dafd0c584b6a6dc9f1e78461f3ff448bb01ba498e0ebd42fa48c0d4c87274a8
SHA512
3cf654558b9b305c90bc62358ae10b0c1ca5f9cfe5f24122cf9a0b6825126a8be03542a92ebb5ca91a3c9c1f2447c85813b8d87a1e3d6dca859533c210215871
SSDEEP
24576:CknUuCsCsiA9eAxweFAAM5wBq+Bl9MtRnnVvfeH8h/:NUVJSm
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
9dafd0c584b6a6dc9f1e78461f3ff448bb01ba498e0ebd42fa48c0d4c87274a8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatA
ExpandEnvironmentStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
ReadFile
MoveFileA
WaitForSingleObject
FreeLibrary
GetTickCount
GetSystemDirectoryA
GetLocalTime
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
WinExec
GetCurrentProcessId
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
CreateThread
GetModuleHandleA
GetCurrentDirectoryA
CreateProcessA
SetEvent
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
CreateEventA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
GetCurrentThreadId
GetSystemInfo
OutputDebugStringA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
VirtualFree
Sleep
InterlockedExchange
LocalAlloc
LoadLibraryA
GetProcAddress
LocalReAlloc
LocalSize
LocalFree
VirtualAlloc
FreeConsole
OpenInputDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
GetCursorInfo
GetClipboardData
OpenClipboard
EmptyClipboard
CloseDesktop
CloseClipboard
mouse_event
MapVirtualKeyA
keybd_event
SystemParametersInfoA
SendMessageA
CharLowerBuffA
CharNextA
wsprintfA
ReleaseDC
BlockInput
DestroyCursor
LoadCursorA
GetDC
GetLastInputInfo
GetSystemMetrics
SetClipboardData
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
GetWindowThreadProcessId
ChangeDisplaySettingsA
GetCursorPos
CreateCompatibleBitmap
CreateRectRgnIndirect
CombineRgn
GetRegionData
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
GetDIBits
GetDeviceCaps
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
OpenSCManagerA
SHGetFileInfoA
SHGetFolderPathA
ShellExecuteExA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitialize
VariantClear
VariantInit
ord540
ord1140
ord926
ord924
ord4202
ord537
ord5572
ord800
ord823
ord825
strcmp
strcpy
_stricmp
_strupr
_strcmpi
_strnicmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
sprintf
_errno
realloc
exit
fprintf
sscanf
getenv
vsprintf
wcstombs
ceil
_ftol
__CxxFrameHandler
_CxxThrowException
free
malloc
_except_handler3
strstr
strncpy
strrchr
memmove
_local_unwind2
_mbscmp
printf
rand
system
strchr
atoi
strcspn
_iob
URLDownloadToFileA
inet_ntoa
getpeername
recv
send
select
__WSAFDIsSet
inet_addr
getsockname
WSAStartup
recvfrom
sendto
gethostbyname
connect
accept
socket
htons
bind
listen
ntohs
closesocket
WSACleanup
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
GetAdaptersInfo
GetIfTable
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ