ArHpfEem
FBEy6
TlvRun
XguWW58u
YYsH065hVU
Static task
static1
Behavioral task
behavioral1
Sample
PnrirLoslBOSWR.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PnrirLoslBOSWR.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
lqDwAhoXOlNwLd.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
lqDwAhoXOlNwLd.dll
Resource
win10v2004-20220812-en
Target
files.zip
Size
1.6MB
MD5
8fba3c243b5dd9da15ec8ce3dd28c86d
SHA1
8b73e1098d37259e208f091963c64344c09932f0
SHA256
8c3089133607bfd2a73d5f06ea60b7aca0989bedfd7a503e0beda16249a9e83d
SHA512
3fa776f26347b99f3c856558f5afac56e2a51b9ac524fabb3e90867457d081b6f3256babd26d3fd8b0cb006d762ce731046abc6631a4f637c68e0fd34c1317ad
SSDEEP
49152:KLYW9C7Rz3Pii7+NgrRhB4d4zEb3FoFaddFQmjE17E6:OYRTqioM4d4QrWFaJjY7E6
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetStdHandle
CreateFileA
SetFilePointer
CloseHandle
GetLastError
PeekNamedPipe
HeapAlloc
HeapFree
GetProcessHeap
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleA
SwitchToFiber
CreateFiber
ConvertThreadToFiber
CreateFileMappingA
CreateNamedPipeA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetProcAddress
WideCharToMultiByte
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
EncodePointer
GetCurrentProcess
TerminateProcess
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
GetCurrentThread
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WaitForSingleObjectEx
CreateThread
WriteConsoleW
CreateFileW
SetEvent
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
LoadLibraryW
DecodePointer
ArHpfEem
FBEy6
TlvRun
XguWW58u
YYsH065hVU
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ