BlowAT
FineView
GhRecord
PIPELINCE
Behavioral task
behavioral1
Sample
7f431f72b95114125ba0ef9c59906ff5288178dafa667.dll
Resource
win7-20240903-en
Target
7f431f72b95114125ba0ef9c59906ff5288178dafa667.dll
Size
224KB
MD5
9485b8cb4d81dd009864b1b9787ef7d8
SHA1
50f7ad7a4fef7b43eb189575a9b5b089bc83118b
SHA256
7f431f72b95114125ba0ef9c59906ff5288178dafa6673af0ae868c1fcc0faca
SHA512
dcc7bd8bb9bc47f16b2348f6e149f41f87543c5fcabab3b56304e2e8992b0da7ccde65de8661d305304dc478cf84682c18b871c7f6ea31606b020aa4cdef68f6
SSDEEP
3072:MdQo6wtIptugitFof9zCPc4Mj77IxZa39TtsAneb/eZJH3tt4TSOB3c7TLby:iQoPIHi0zYOj77aZQ10/6JHzWSOBay
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
7f431f72b95114125ba0ef9c59906ff5288178dafa667.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
_onexit
__dllonexit
_adjust_fdiv
_initterm
calloc
srand
_access
rand
wcstombs
atoi
_beginthreadex
strncpy
puts
strrchr
sprintf
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
putchar
_ftol
ceil
memmove
??3@YAXPAX@Z
_strrev
WSACleanup
WSAIoctl
connect
htons
gethostbyname
socket
ntohs
WSAStartup
closesocket
select
send
setsockopt
getsockname
recv
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
WTSQueryUserToken
CreateEnvironmentBlock
GetCurrentProcess
GetComputerNameA
GetCurrentThreadId
OpenEventA
TerminateProcess
LocalSize
WaitForMultipleObjects
PeekNamedPipe
GetStartupInfoA
SetErrorMode
CopyFileA
OpenProcess
GetWindowsDirectoryA
SetFileAttributesA
ExpandEnvironmentStringsA
GetVersionExA
GetProcAddress
LoadLibraryA
DeleteCriticalSection
EnterCriticalSection
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
FreeLibrary
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
CreateThread
TerminateThread
InterlockedExchange
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetTickCount
WriteFile
CreateFileA
GetLocalTime
HeapFree
GetProcessHeap
HeapAlloc
OutputDebugStringA
UnmapViewOfFile
GlobalSize
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
SHGetSpecialFolderPathA
AdjustTokenPrivileges
CreateProcessAsUserA
RegOpenKeyA
RegQueryValueExA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenEventLogA
ClearEventLogA
CloseEventLog
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
LookupPrivilegeValueA
RegRestoreKeyA
RegSaveKeyA
StartServiceA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
AlphaBlend
CreateDCA
WindowFromPoint
LoadMenuA
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetDC
CharNextA
wsprintfA
GetWindowTextA
FindWindowA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
LoadCursorA
SendMessageA
keybd_event
ReleaseDC
SetCapture
MapVirtualKeyA
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetCursorPos
BlowAT
FineView
GhRecord
PIPELINCE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ