ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
Overview
overview
10Static
static
Claim_Letter.lnk
windows7-x64
3Claim_Letter.lnk
windows10-2004-x64
3about/becauseTo.bat
windows7-x64
1about/becauseTo.bat
windows10-2004-x64
1about/itThis.dll
windows7-x64
10about/itThis.dll
windows10-2004-x64
10about/youBe.js
windows7-x64
3about/youBe.js
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Claim_Letter.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Claim_Letter.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
about/becauseTo.bat
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
about/becauseTo.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
about/itThis.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
about/itThis.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
about/youBe.js
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
about/youBe.js
Resource
win10v2004-20220812-en
Target
Claim_Letter#541804.iso
Size
430KB
MD5
9190784329feb77dd4a649d9c2ed7e48
SHA1
a1113c6cdbad02c3d97948d1f14dc0bda8ec4fe0
SHA256
b3afaa981da43254dc248692705853735b3e45444f39e776aeff47aafdb902b2
SHA512
70d8c3385c122ff4d7365d8c5550a785f407dc7bad4767ace462e06f1f352509bcbc085c4d0c3bd99d83307dbadb53e99c4febf983e928dce5dd75cd9d37829a
SSDEEP
6144:du8T9zrStWm3C3klS1gqbe5L05kVxVFInAPexY5ixyizO8wj+A:U8ZSg24Vbe5LFVxVFIAPWelSZm
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
GetFileSize
WriteFile
CloseHandle
GetLastError
HeapCreate
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
ExitProcess
GetCurrentThread
GetCurrentThreadId
GetSystemDirectoryA
VirtualAlloc
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
CreateFileMappingA
LoadLibraryA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetFileAttributesExW
CompareStringW
LCMapStringW
GetStdHandle
GetFileType
GetACP
GetStringTypeW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
DecodePointer
CreateFileW
SetFilePointerEx
WriteConsoleW
ReadFile
ReadConsoleW
RaiseException
ANdF226J4q
DllRegisterServer
IPa579
OYRCC43y7
PqxLTivB
QEY0Wo7
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ