DllUpdate
Install
MainThread
ServiceMain
Uninstall
Behavioral task
behavioral1
Sample
93e50c3db0ab87f9ad12b82ea0fa46b202c7fecdb4ac425536affabbb915b8c3.dll
Resource
win7-20240508-en
Target
93e50c3db0ab87f9ad12b82ea0fa46b202c7fecdb4ac425536affabbb915b8c3
Size
911KB
MD5
005b4ab70d61eee75a13332d0006b16e
SHA1
0727b8b5a478bc7dcec71fc77059c499d821572d
SHA256
93e50c3db0ab87f9ad12b82ea0fa46b202c7fecdb4ac425536affabbb915b8c3
SHA512
de02693dbc6a19ce622fd8fb091547b8c21eff962c65d6f1d4f8a45ad8d6dfa70fc7361a35fd0985563e2f76c42f8aac8ac7974df5defecb4f9eb0f6f972329d
SSDEEP
24576:AZGPmpC2iymNpaYYztyyM5gx6uxVNMtRX3lfHW:60WIW
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
93e50c3db0ab87f9ad12b82ea0fa46b202c7fecdb4ac425536affabbb915b8c3 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatA
ExpandEnvironmentStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryA
SetFileAttributesA
ReadFile
MoveFileA
WaitForSingleObject
FreeLibrary
GetTickCount
GetSystemDirectoryA
GetLocalTime
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
WinExec
GetCurrentProcessId
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
CreateThread
GetModuleHandleA
CreateProcessA
FreeConsole
SetEvent
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
CreateEventA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
GetCurrentThreadId
GetSystemInfo
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
InterlockedExchange
VirtualFree
LocalAlloc
LoadLibraryA
GetProcAddress
LocalReAlloc
LocalSize
LocalFree
VirtualAlloc
GetCurrentDirectoryA
GetCursorPos
SetThreadDesktop
CloseDesktop
wsprintfA
GetWindowTextA
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
MapVirtualKeyA
keybd_event
CharNextA
SystemParametersInfoA
SendMessageA
ReleaseDC
BlockInput
DestroyCursor
LoadCursorA
GetDC
GetLastInputInfo
GetSystemMetrics
GetCursorInfo
ChangeDisplaySettingsA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
GetWindowThreadProcessId
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
GetRegionData
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CombineRgn
GetDeviceCaps
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetUserNameA
OpenSCManagerA
SHGetFolderPathA
ShellExecuteExA
SHGetFileInfoA
SHGetSpecialFolderPathA
CoCreateInstance
CoInitialize
VariantClear
VariantInit
ord540
ord1140
ord926
ord924
ord4202
ord537
ord5572
ord800
ord823
ord825
_stricmp
_strupr
_strcmpi
_strnicmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
sprintf
_errno
realloc
wcstombs
strcspn
_iob
exit
fprintf
sscanf
getenv
vsprintf
atoi
ceil
_ftol
__CxxFrameHandler
_CxxThrowException
free
malloc
_except_handler3
strstr
strncpy
strrchr
memmove
_local_unwind2
_mbscmp
printf
rand
system
strchr
URLDownloadToFileA
getpeername
recv
send
select
__WSAFDIsSet
recvfrom
sendto
gethostbyname
connect
inet_addr
getsockname
WSAStartup
accept
socket
htons
bind
listen
ntohs
closesocket
WSACleanup
inet_ntoa
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
GetAdaptersInfo
GetIfTable
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ