DksPpBKuq
DllRegisterServer
IwSTv
LQyhsCdjl
NtEBMYyy
SQccDmJlhE
SRnbBm
UWVFLgF
VNwkYC
VosQlBrX
ZBCIRCy
hcecvo
hiNTcQnt
pSYvbyN
sJgsrZak
vVZzXAxKy
vYIhgy
Static task
static1
Behavioral task
behavioral1
Sample
dar.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
dar.dll
Resource
win10v2004-20220414-en
Target
7585926158.zip
Size
84KB
MD5
5d6567fc6453af9f8c50bbee40e50c95
SHA1
bc7a4b50c5e3921276fd9f6329eb25b1a1e352b6
SHA256
2b6c0c8fb1ce4458ec97642650f1dc2ef3449ef2bc41ade5466ad15013608d42
SHA512
7bc399a8a96c78b072cf799789ce09ac0f05be8d022ef31a6dc518b538ff0ebe0766f54850815a5249078bca0880ec782d796779ef4af7ce8e894c1a832d5b08
SSDEEP
1536:ZTNBfMFIQGXGvZbHLXe7di44fMok7WE+targ+1//MIhzn8cYjD:prMFsXGvBDei44fLBzI2EznxCD
Identifies executable artefacts in shortcut (LNK) files.
Processes:
resource | yara_rule |
---|---|
static1/unpack002/document.lnk | EXE_in_LNK |
Identifies execution artefacts in shortcut (LNK) files.
Processes:
resource | yara_rule |
---|---|
static1/unpack002/document.lnk | Execution_in_LNK |
Identifies shortcut (LNK) file with a long relative path. Might be used in an attempt to hide the path.
Processes:
resource | yara_rule |
---|---|
static1/unpack002/document.lnk | Long_RelativePath_LNK |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ChangeWindowMessageFilter
CharLowerA
IsWindow
SendMessageA
DdeCmpStringHandles
GetOpenFileNamePreviewW
DrawDibTime
DrawDibRealize
DrawDibChangePalette
ICCompressorFree
ICLocate
ICInfo
ord2
TerminateProcess
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
InterlockedFlushSList
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetCurrentProcess
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
DksPpBKuq
DllRegisterServer
IwSTv
LQyhsCdjl
NtEBMYyy
SQccDmJlhE
SRnbBm
UWVFLgF
VNwkYC
VosQlBrX
ZBCIRCy
hcecvo
hiNTcQnt
pSYvbyN
sJgsrZak
vVZzXAxKy
vYIhgy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ