tashanao
wangluo
woshibaba
zheshi
Behavioral task
behavioral1
Sample
789d161b8b1018061a29bcb61d8e20a8c86417e62aaefab4fc818adb98deec9a.dll
Resource
win7-20240903-en
Target
789d161b8b1018061a29bcb61d8e20a8c86417e62aaefab4fc818adb98deec9a
Size
10.0MB
MD5
2d4917e38640c3edce8abc2eed666556
SHA1
8839af77fcf612375d063e97e57ffbd2c12d468a
SHA256
789d161b8b1018061a29bcb61d8e20a8c86417e62aaefab4fc818adb98deec9a
SHA512
0405c00c5cc8aeae6b77a23ca461f35474850c9251ad5bb5a2f104f8d408b53e76fa8aa30660573a717c3799f27ca0cb2a6d7d6a9fbfd71e1249ed0695575cea
SSDEEP
3072:iJO8w5IR5QgyTYOiFTZCqKDWQimUXTK5Vjz/GQcWRMIP0M:oO8og8YOuCj6QwDcja0RL
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
789d161b8b1018061a29bcb61d8e20a8c86417e62aaefab4fc818adb98deec9a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
FreeLibrary
CloseHandle
TerminateThread
Sleep
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetLastError
ResetEvent
InterlockedExchange
CancelIo
GetTickCount
GetLocalTime
GetCurrentProcessId
HeapAlloc
GetProcessHeap
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
InitializeCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetModuleHandleA
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetCurrentProcess
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
OpenProcess
QueryDosDeviceA
GetCurrentThreadId
GlobalMemoryStatusEx
GetSystemInfo
GetComputerNameA
GetModuleFileNameA
OpenEventA
SetErrorMode
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
RaiseException
strncpy
strchr
malloc
free
_except_handler3
strrchr
atoi
strncmp
_errno
wcscpy
strncat
sprintf
_beginthreadex
wcstombs
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
puts
_mbsnbicmp
??3@YAXPAX@Z
_stricmp
_strrev
_strupr
_strnicmp
??2@YAPAXI@Z
_strcmpi
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
GetProcessImageFileNameA
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
tashanao
wangluo
woshibaba
zheshi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ