IternalJob
SetPath
Static task
static1
Behavioral task
behavioral1
Sample
4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
document.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
document.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
tar.dll
Resource
win7-20220812-en
Target
7997306132.zip
Size
1.7MB
MD5
91b49d8be4f7df8de7fc70a089d2b60a
SHA1
9dee96e688453fa619eb59100ca6be45f716add5
SHA256
f1717d697da8cab2e5bd34462f692158728f7102734efe53381d0b0715977545
SHA512
05c262b7bdd81c638f4abc2f39b5c302ea02775996e8095af0da1cee6f0c8b3c83cbe049ad5771e211fb7e04eb77111b8304d7b81a022c74fb174db7531a389a
SSDEEP
49152:YQl9JYKpOmN7ucGwTz2APLZqSpu1GdMnlAjdTMR:Pl9JYKkJqPPLkSpucdMlA9MR
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetVolumePathNameW
WriteFileEx
HeapAlloc
HeapFree
GetProcessHeap
CancelWaitableTimer
Sleep
ExitProcess
GetCurrentThreadId
OpenThread
ExitThread
ProcessIdToSessionId
VirtualProtect
VirtualAllocEx
GetModuleFileNameA
GetModuleHandleExA
GetProcAddress
SetupComm
SetCommState
TransmitCommChar
LoadLibraryA
LoadLibraryW
GetVolumeInformationA
SetDefaultCommConfigA
GetVolumePathNamesForVolumeNameA
GetCurrencyFormatW
SetUserObjectSecurity
SendMessageW
SetWindowPos
GetClipboardSequenceNumber
CharToOemBuffA
GetKeyNameTextW
MsgWaitForMultipleObjectsEx
GetMenuStringA
DrawStateA
SetForegroundWindow
SetWindowTextA
AdjustWindowRect
MapWindowPoints
LoadCursorFromFileW
CascadeWindows
SystemParametersInfoW
GetCursorInfo
DdeCmpStringHandles
IternalJob
SetPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ