DllUpdate
Install
MainThread
ServiceMain
Uninstall
Behavioral task
behavioral1
Sample
fa09f16928af92a934e63e49b00c8920cf93aeca553875d8617b8d6e662ad884.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa09f16928af92a934e63e49b00c8920cf93aeca553875d8617b8d6e662ad884.dll
Resource
win10v2004-20240226-en
Target
fa09f16928af92a934e63e49b00c8920cf93aeca553875d8617b8d6e662ad884
Size
899KB
MD5
d9d6dee6adcefa2b3913212146890461
SHA1
536d3c53a097c8dd98bc4529412542e25a9a16a4
SHA256
fa09f16928af92a934e63e49b00c8920cf93aeca553875d8617b8d6e662ad884
SHA512
097b01449d59606edee5e2dcddf68824ccad7be245bd76c3d99352ef8fa69e83a81dd42346b14f85d0ab15c62a7b253ad2af3f3e760564b85fb88e5877bcd1e3
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
fa09f16928af92a934e63e49b00c8920cf93aeca553875d8617b8d6e662ad884 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindClose
LocalFree
FindNextFileA
LocalReAlloc
LocalAlloc
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
ReadFile
MoveFileA
WaitForSingleObject
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
WinExec
LocalSize
GetCurrentProcessId
Process32Next
TerminateProcess
OpenProcess
Process32First
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
GetCurrentDirectoryA
FreeConsole
GetModuleHandleA
SetEvent
GetLogicalDriveStringsA
GetProcessHeap
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
CreateThread
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
CreateEventA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
GetCurrentThreadId
GetSystemInfo
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
ExpandEnvironmentStringsA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
GetFileSize
CreateFileA
SetFilePointer
WriteFile
VirtualFree
CloseHandle
Sleep
InterlockedExchange
VirtualAlloc
HeapAlloc
GetUserObjectInformationA
GetThreadDesktop
wsprintfA
SetThreadDesktop
CloseDesktop
GetCursorPos
GetCursorInfo
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
MapVirtualKeyA
keybd_event
CharNextA
SystemParametersInfoA
SendMessageA
ReleaseDC
BlockInput
DestroyCursor
LoadCursorA
GetDC
GetLastInputInfo
OpenInputDesktop
GetSystemMetrics
ChangeDisplaySettingsA
GetWindowThreadProcessId
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
CombineRgn
GetRegionData
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
DeleteDC
GetDeviceCaps
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
OpenSCManagerA
SHGetFolderPathA
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitialize
VariantClear
VariantInit
ord823
ord825
_strupr
_stricmp
_strcmpi
_strnicmp
exit
fprintf
sscanf
getenv
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
_iob
_errno
realloc
strchr
wcstombs
vsprintf
sprintf
ceil
_ftol
__CxxFrameHandler
_CxxThrowException
free
malloc
_except_handler3
strstr
strncpy
strrchr
memmove
_local_unwind2
rand
printf
atoi
strcspn
URLDownloadToFileA
inet_ntoa
recv
send
select
__WSAFDIsSet
recvfrom
sendto
gethostbyname
connect
inet_addr
WSAStartup
WSACleanup
accept
socket
htons
bind
listen
getsockname
ntohs
closesocket
getpeername
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
GetAdaptersInfo
GetIfTable
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ