DllUpdate
Install
MainThread
ServiceMain
Uninstall
Behavioral task
behavioral1
Sample
b1eaff4345e56af3c5d8bbdbade5962e4683e13532576ee4660739f89056010d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b1eaff4345e56af3c5d8bbdbade5962e4683e13532576ee4660739f89056010d.dll
Resource
win10v2004-20231215-en
Target
b1eaff4345e56af3c5d8bbdbade5962e4683e13532576ee4660739f89056010d
Size
911KB
MD5
f9360623f060affb0f4e31dc81e670fc
SHA1
49b7efe686a39c73c2fffd88f2463ae3d7cd13c0
SHA256
b1eaff4345e56af3c5d8bbdbade5962e4683e13532576ee4660739f89056010d
SHA512
bd2b2f5d885d0a436a8d9a4bea2bc66a5c58b1ce5b4d7bda95b506623184bdf36763c99a8cf9fa89a7ba9edadea44eebd66185d621c80b0abbb71867e395cda7
SSDEEP
24576:YdyxTmpOZiC0igLTKBnbM5gx6uxVNMtRX3lfn8mY:7dWf8mY
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
b1eaff4345e56af3c5d8bbdbade5962e4683e13532576ee4660739f89056010d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatA
ExpandEnvironmentStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
ReadFile
MoveFileA
WaitForSingleObject
FreeLibrary
GetTickCount
GetSystemDirectoryA
GetLocalTime
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
WinExec
GetCurrentProcessId
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
CreateThread
GetModuleHandleA
CreateProcessA
FreeConsole
SetEvent
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
CreateEventA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
GetCurrentThreadId
GetSystemInfo
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
InterlockedExchange
VirtualFree
LocalAlloc
LoadLibraryA
GetProcAddress
LocalReAlloc
LocalSize
LocalFree
VirtualAlloc
GetCurrentDirectoryA
GetCursorPos
SetThreadDesktop
CloseDesktop
wsprintfA
GetWindowTextA
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
MapVirtualKeyA
keybd_event
CharNextA
SystemParametersInfoA
SendMessageA
ReleaseDC
BlockInput
DestroyCursor
LoadCursorA
GetDC
GetLastInputInfo
GetSystemMetrics
GetCursorInfo
ChangeDisplaySettingsA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
GetWindowThreadProcessId
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
GetRegionData
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CombineRgn
GetDeviceCaps
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
OpenSCManagerA
SHGetFolderPathA
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitialize
VariantClear
VariantInit
ord540
ord1140
ord926
ord924
ord4202
ord537
ord5572
ord800
ord823
ord825
_stricmp
_strupr
_strcmpi
_strnicmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
sprintf
_errno
realloc
wcstombs
strcspn
_iob
exit
fprintf
sscanf
getenv
vsprintf
atoi
ceil
_ftol
__CxxFrameHandler
_CxxThrowException
free
malloc
_except_handler3
strstr
strncpy
strrchr
memmove
_local_unwind2
_mbscmp
printf
rand
system
strchr
URLDownloadToFileA
getpeername
recv
send
select
__WSAFDIsSet
recvfrom
sendto
gethostbyname
connect
inet_addr
getsockname
WSAStartup
accept
socket
htons
bind
listen
ntohs
closesocket
WSACleanup
inet_ntoa
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
GetAdaptersInfo
GetIfTable
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ