ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
Overview
overview
10Static
static
Claim_Lett...09.iso
windows7-x64
3Claim_Lett...09.iso
windows10-2004-x64
3Claim_Letter.lnk
windows7-x64
3Claim_Letter.lnk
windows10-2004-x64
3about/outMany.dll
windows7-x64
10about/outMany.dll
windows10-2004-x64
10about/thereOf.js
windows7-x64
3about/thereOf.js
windows10-2004-x64
1about/thisTo.bat
windows7-x64
1about/thisTo.bat
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Claim_Letter#718209.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Claim_Letter#718209.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Claim_Letter.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Claim_Letter.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
about/outMany.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
about/outMany.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
about/thereOf.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
about/thereOf.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
about/thisTo.bat
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
about/thisTo.bat
Resource
win10v2004-20220812-en
Target
file.7z (1).zip
Size
208KB
MD5
849f69b2c1b979223c121c17c961f5b0
SHA1
786682b047cf4ea89239b65d700d06354fce8829
SHA256
759f1eb9ffadf766b0fdb944edb862215e2cf207de296c89d62da3e9b34b9fbf
SHA512
1a14cbcceffae6c503314a621ee7cbb6fb1e0891431ca38aa676ae0d91b47e333a37a63217c3c97a9e336660d1ff8dae2ab37a3b156546040aeb605bbd749fe9
SSDEEP
6144:UC3E38NFrHBU6WOUQL6kemQITfSfli7uHLGBe+53hFAlj:UC3ES5BU6W1kMmSw4G4C8l
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
GetFileSize
WriteFile
CloseHandle
GetLastError
HeapCreate
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
ExitProcess
GetCurrentThread
GetCurrentThreadId
GetSystemDirectoryA
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
CreateFileMappingA
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetFileAttributesExW
CompareStringW
LCMapStringW
GetStdHandle
GetFileType
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
DecodePointer
CreateFileW
SetFilePointerEx
WriteConsoleW
ReadFile
ReadConsoleW
RaiseException
ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ