_Run@4
__injectEntryForThreadEntry@4
Static task
static1
Behavioral task
behavioral1
Sample
7aa5318a4cf3534ee34f0c542620c03608a95040e8a44ac71150c8e48e6e7ddc_unpacked.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7aa5318a4cf3534ee34f0c542620c03608a95040e8a44ac71150c8e48e6e7ddc_unpacked.dll
Resource
win10v2004-20220812-en
Target
7aa5318a4cf3534ee34f0c542620c03608a95040e8a44ac71150c8e48e6e7ddc_unpacked
Size
2.1MB
MD5
bea0168685e05268cfea4f63a298f16b
SHA1
ff82700ee26bbaf5a3357c5f5070fda9f80f9993
SHA256
47b26e0172dff4ae1905455029926314ac685e0ce854c4230fc35a7cdf0fe259
SHA512
789c2d061a0b72162d3b1cd444b10ff89ad6d889efa452c349adbaea2345192df36d62609d0959e76893899b3e55b2a0e25ad86484f8770a21d20c647c143e60
SSDEEP
49152:YZ54VVdEe/9fSvwNMVEy2rElG6CaP3TYeLiuOAGm5d:YjCdENvzVB2glGnKLiu
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DnsQuery_A
DnsFree
GetSystemDefaultLCID
GetCurrentProcessId
AddVectoredExceptionHandler
GetModuleFileNameW
ExitProcess
ExitThread
CreateEventW
GetComputerNameW
GetLastError
CreateEventA
ResetEvent
SetEndOfFile
ReadFile
FlushFileBuffers
GetStdHandle
GetFileType
GetConsoleMode
WriteConsoleW
GetTickCount
SetFileAttributesW
VirtualFree
GetFileSizeEx
VirtualAlloc
SetFilePointerEx
RemoveDirectoryW
GetVolumeNameForVolumeMountPointW
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
LoadLibraryA
Thread32Next
Thread32First
GetCurrentThread
CreateProcessW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
FormatMessageW
CreateMutexW
ReleaseMutex
WaitForMultipleObjects
GetTimeZoneInformation
LocalAlloc
DeleteFileA
AreFileApisANSI
GetTempPathA
GetVersionExA
OutputDebugStringA
GetFileAttributesExW
GetSystemInfo
GetDiskFreeSpaceA
CreateFileMappingW
CreateFileMappingA
GetDiskFreeSpaceW
LockFileEx
HeapSize
HeapValidate
HeapCreate
GetFileAttributesA
HeapDestroy
FormatMessageA
GetSystemTimeAsFileTime
UnlockFileEx
OutputDebugStringW
WaitForSingleObjectEx
LockFile
FlushViewOfFile
GetProcAddress
InterlockedCompareExchange
QueryPerformanceCounter
SystemTimeToFileTime
UnmapViewOfFile
MapViewOfFile
SetFilePointer
HeapCompact
GetFileSize
CreateFileA
GetFullPathNameA
GetFullPathNameW
TryEnterCriticalSection
GetVersion
GetModuleHandleA
GlobalMemoryStatus
FlushConsoleInputBuffer
SetLastError
GetThreadContext
SetThreadContext
GetCurrentProcess
FlushInstructionCache
InterlockedExchange
OpenThread
SuspendThread
ResumeThread
VirtualQuery
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
LoadLibraryExW
GetModuleHandleExW
SetConsoleCtrlHandler
ReadConsoleInputA
SetConsoleMode
RaiseException
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetStartupInfoW
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
TlsGetValue
TlsSetValue
TlsFree
GetConsoleCP
ReadConsoleW
SetStdHandle
GetStringTypeW
CompareStringW
LCMapStringW
SetEnvironmentVariableA
LoadLibraryW
VirtualProtect
VirtualAllocEx
CreateRemoteThread
VirtualFreeEx
DuplicateHandle
WriteProcessMemory
OpenProcess
Process32NextW
CreateToolhelp32Snapshot
Process32FirstW
TerminateProcess
CreateDirectoryW
lstrcmpiA
FindNextFileW
FindClose
FindFirstFileW
SetEvent
GetCurrentThreadId
GetSystemTime
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
InterlockedDecrement
LocalFree
GetNativeSystemInfo
GetVersionExW
CreateFileW
CloseHandle
WriteFile
DeleteFileW
ExpandEnvironmentStringsW
MoveFileExW
lstrcmpiW
GetFileAttributesW
WaitForSingleObject
Sleep
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToSystemTime
GetDriveTypeW
FindFirstFileExW
FileTimeToLocalFileTime
lstrlenA
GetTempPathW
UnlockFile
TlsAlloc
GetSidSubAuthority
RegDeleteKeyW
RegDeleteKeyA
GetLengthSid
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
InitializeSecurityDescriptor
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
InitiateSystemShutdownExW
GetSidSubAuthorityCount
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenThreadToken
GetTokenInformation
OpenProcessToken
RegCreateKeyExW
CryptCreateHash
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptAcquireContextW
RegQueryValueExA
wvnsprintfA
wvnsprintfW
SHDeleteValueW
PathAddExtensionW
PathRenameExtensionW
PathRemoveFileSpecW
PathIsURLW
PathRemoveBackslashW
PathAddBackslashW
StrCmpNIA
PathCombineW
PathSkipRootW
PathMatchSpecW
UrlUnescapeA
SHGetFolderPathA
SHGetFolderPathW
ShellExecuteW
GetUserObjectInformationW
GetProcessWindowStation
DispatchMessageW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
CharLowerA
ExitWindowsEx
MessageBoxA
CharUpperW
CoInitialize
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoInitializeEx
StringFromGUID2
CLSIDFromString
send
socket
WSAAddressToStringW
shutdown
WSASetLastError
bind
listen
recv
select
WSAStartup
inet_ntoa
WSAGetLastError
ntohs
closesocket
accept
getpeername
getsockname
freeaddrinfo
getaddrinfo
htons
inet_addr
WSAIoctl
setsockopt
connect
CryptUnprotectData
DeleteUrlCacheEntryA
InternetReadFile
InternetSetOptionW
InternetQueryOptionW
InternetQueryOptionA
InternetSetOptionA
DeleteUrlCacheEntryW
FindCloseUrlCache
FindNextUrlCacheEntryW
InternetCloseHandle
InternetCrackUrlA
HttpQueryInfoA
InternetConnectA
HttpAddRequestHeadersA
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
FindFirstUrlCacheEntryW
SysAllocString
SysFreeString
VariantClear
_Run@4
__injectEntryForThreadEntry@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ