DeleteInstallFile
FirstRun
ServiceMain
UninstallServer
Behavioral task
behavioral1
Sample
acd33c7aaca074b61d883539a220d82d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acd33c7aaca074b61d883539a220d82d.dll
Resource
win10v2004-20240226-en
Target
acd33c7aaca074b61d883539a220d82d
Size
135KB
MD5
acd33c7aaca074b61d883539a220d82d
SHA1
6a1a2f5554c1b440ab93ab1088f11fc2f0b82edf
SHA256
d79a5936dad75bd6505bf204b8274480f9dcb5356feaad393de1994f915fdb5b
SHA512
90ad9c0164696d10425ffb4d040adc86933600958b4b3219d13501ae92a3c2a38796284b5a30d0bcd24799bf60fbf57473e7c911e5502125a634d989f91bf03a
SSDEEP
3072:DnRLqZnAJLLT08TeuNju9y1sOrdMv2mADC7nCpqu:1e1Al08ioyyaCdMv2mAu7nCp/
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
acd33c7aaca074b61d883539a220d82d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
GetLocalTime
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
WritePrivateProfileStringA
OpenProcess
PeekNamedPipe
WaitForMultipleObjects
GetPrivateProfileStringA
GetSystemInfo
ReleaseMutex
CreateMutexA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
FreeConsole
FreeLibrary
MoveFileExA
CopyFileA
lstrcmpiA
GetCurrentThreadId
GetTempPathA
DeviceIoControl
GetStartupInfoA
GetVersion
Process32Next
GlobalMemoryStatus
GetCurrentProcess
MoveFileA
RemoveDirectoryA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
DeleteFileA
LoadLibraryA
GetProcAddress
WriteFile
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
FindFirstFileA
SetFilePointer
ReadFile
LocalFree
CreateFileA
GetFileSize
Sleep
CancelIo
InterlockedExchange
ResetEvent
LocalAlloc
LocalSize
LocalReAlloc
InterlockedDecrement
WideCharToMultiByte
InterlockedIncrement
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
CreateEventA
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
ExitProcess
GetTickCount
GetSystemDirectoryA
SetLastError
OutputDebugStringA
GetModuleFileNameA
CreateToolhelp32Snapshot
GetVersionExA
Process32First
CloseHandle
CreatePipe
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
GetKeyNameTextA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
UnhookWindowsHookEx
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetActiveWindow
GetWindowTextA
MessageBoxA
ExitWindowsEx
wsprintfA
CharNextA
GetThreadDesktop
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
OpenDesktopA
SetWindowsHookExA
GetDC
CallNextHookEx
mouse_event
GetClientRect
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ShowWindow
PostMessageA
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
FindWindowA
GetProcessWindowStation
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
RegCloseKey
RegQueryValueA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
QueryServiceStatus
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
SHGetFileInfoA
ShellExecuteA
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
SysFreeString
_strnicmp
_onexit
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_strlwr
__dllonexit
calloc
_beginthreadex
rename
isdigit
strtoul
sprintf
realloc
strncat
_errno
strncmp
_snprintf
strchr
wcscpy
atoi
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
wcstombs
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
waveInStop
waveInReset
waveOutPrepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutOpen
waveOutGetNumDevs
waveInUnprepareHeader
connect
setsockopt
htons
WSAStartup
gethostbyname
socket
select
ioctlsocket
recv
closesocket
send
gethostname
recvfrom
sendto
accept
inet_ntoa
getpeername
getsockname
ntohs
bind
listen
inet_addr
__WSAFDIsSet
WSACleanup
WSAIoctl
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
GetModuleFileNameExA
EnumProcessModules
NetUserAdd
NetLocalGroupAddMembers
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
WTSQueryUserToken
CreateEnvironmentBlock
InternetReadFile
ICSeqCompressFrame
ICOpen
ICGetInfo
ICClose
ICSendMessage
ICCompressorFree
ICSeqCompressFrameStart
ICInfo
ICSeqCompressFrameEnd
DeleteInstallFile
FirstRun
ServiceMain
UninstallServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ