ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
Overview
overview
10Static
static
Claim_Letter.lnk
windows7-x64
3Claim_Letter.lnk
windows10-2004-x64
3about/becauseTo.bat
windows7-x64
1about/becauseTo.bat
windows10-2004-x64
1about/itThis.dll
windows7-x64
10about/itThis.dll
windows10-2004-x64
10about/youBe.js
windows7-x64
3about/youBe.js
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Claim_Letter.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Claim_Letter.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
about/becauseTo.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
about/becauseTo.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
about/itThis.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
about/itThis.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
about/youBe.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
about/youBe.js
Resource
win10v2004-20220812-en
Target
Claim_Letter#541804.zip
Size
237KB
MD5
4324bf871f2946f77eea9ca9a1c6d3c1
SHA1
c78421e611d3b0f3137ac7dada12fe95cf3f3ec8
SHA256
76e2469c7a3140a0766ea651b88495c5ae4cfbdedcc0ec908f24471d0e36584f
SHA512
de31c69d02e48785c2966e2838b54f0f5cae8d0c5b904aa6c0f9eb203265e5032774efebe59131452db92ad7b56c26533aafeb5c296b6c7082988e252fd7a568
SSDEEP
6144:FMV6VZFv0Xzn1DDEXMSW/W8WSUV5qpKS4zK/gG3xAtLVk:FMYf0Xzn+Ydiu5CZ+
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
GetFileSize
WriteFile
CloseHandle
GetLastError
HeapCreate
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
ExitProcess
GetCurrentThread
GetCurrentThreadId
GetSystemDirectoryA
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
CreateFileMappingA
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetFileAttributesExW
CompareStringW
LCMapStringW
GetStdHandle
GetFileType
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
DecodePointer
CreateFileW
SetFilePointerEx
WriteConsoleW
ReadFile
ReadConsoleW
RaiseException
ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ