IternalJob
SetPath
Static task
static1
Behavioral task
behavioral1
Sample
ad1a90f2f253a9adf45be85682d7b44994ab4e8ceafc1a5805316c39c803ccc8.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad1a90f2f253a9adf45be85682d7b44994ab4e8ceafc1a5805316c39c803ccc8.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
9n3.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
9n3.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
document.lnk
Resource
win7-20220812-en
Target
7991976155.zip
Size
1.7MB
MD5
6513227c631b99ff7954611dae63aec0
SHA1
7abe610537a832ed506713d4d76904c3b1761af1
SHA256
fb4d8eab720bfa491d4cd6dc732bb6d2f74c77a37c8056d7eafdb7a01bcba3bd
SHA512
d1d745e45ce29a1c889331307229af85ce0dd37522fe4da7b408ca29bf6b448952cab09ad6d6dfad87d9c01567e3823fa726d1504934e5ee118a549a94063850
SSDEEP
49152:2jvkPJP3kYN+nnb3ikBoD6BGcbDrNEKcKXVG2Y:2jvwN3kRnb3ikBTxbVLm
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetVolumeNameForVolumeMountPointW
HeapAlloc
HeapFree
GetProcessHeap
Sleep
ExitProcess
GetCurrentThreadId
SetProcessShutdownParameters
GetProcessHandleCount
GetThreadIOPendingFlag
VirtualProtect
VirtualAllocEx
GetModuleFileNameA
GetModuleHandleExA
GetProcAddress
FatalExit
FormatMessageA
_llseek
LoadLibraryA
LoadLibraryW
EnumResourceNamesW
GetProfileStringA
WriteProfileSectionW
ReadConsoleInputA
AddConsoleAliasW
ToUnicodeEx
DrawAnimatedRects
PostMessageA
GetClassInfoA
PrintWindow
GetWindowPlacement
AnyPopup
GetDlgItem
CharUpperBuffA
OemKeyScan
ShowScrollBar
RegisterShellHookWindow
LoadBitmapW
CreateIconIndirect
IsDialogMessageA
GetWindowModuleFileNameA
GetAltTabInfoW
IternalJob
SetPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ