AlphaBlend
GradientFill
TransparentBlt
Static task
static1
Behavioral task
behavioral1
Sample
d4f797ef1b937f6aad9ccd320581dbd350711fb94c49b402eac05c5bb95b00a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4f797ef1b937f6aad9ccd320581dbd350711fb94c49b402eac05c5bb95b00a8.exe
Resource
win10v2004-20220812-en
Target
d4f797ef1b937f6aad9ccd320581dbd350711fb94c49b402eac05c5bb95b00a8
Size
164KB
MD5
09c55341200ec27c784a0d2fc30f1e72
SHA1
104f5a88ed197c5cd32560361d3d688c3a983164
SHA256
d4f797ef1b937f6aad9ccd320581dbd350711fb94c49b402eac05c5bb95b00a8
SHA512
d6f5eb4969ca1ce6e718e00ee4364ce552f5c80b9aa53662688cf87236e12e16d8ad8ea47695f3123326d84aa3fe77f03329d3b7aa7952ad867851e60c97084b
SSDEEP
3072:aEtTJxgagDog0mh5hmNVg5EsGqZ14hiPkuXgEqQV42kR7JKA0qKx25uZJk:nLKaaogJhm37zqZm082V1kRdb3KAkJk
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ZwSetSecurityObject
ZwQueryDirectoryFile
ZwSetInformationFile
wcslen
ZwAllocateVirtualMemory
wcscpy
ZwFreeVirtualMemory
sprintf
RtlComputeCrc32
ZwDuplicateObject
ZwDeleteKey
ZwDeleteValueKey
ZwOpenProcess
ZwQueryValueKey
RtlGetCurrentPeb
RtlPrefixUnicodeString
wcscat
strcmp
RtlIpv4StringToAddressA
ZwGetContextThread
RtlExitUserThread
ZwWriteVirtualMemory
ZwSetContextThread
ZwTerminateThread
RtlInterlockedPushEntrySList
RtlInterlockedPopEntrySList
RtlNtStatusToDosError
ZwOpenKey
_wcsicmp
ZwWriteFile
strlen
RtlDestroyQueryDebugBuffer
RtlQueryProcessDebugInformation
RtlCreateQueryDebugBuffer
RtlEqualUnicodeString
ZwSuspendThread
ZwQueryInformationThread
_stricmp
RtlFreeUnicodeString
ZwQueryEaFile
RtlDosPathNameToNtPathName_U
LdrFindEntryForAddress
ZwAlertThread
memset
RtlTimeToSecondsSince1980
ZwWaitForSingleObject
ZwQuerySystemInformation
ZwAdjustPrivilegesToken
ZwOpenThreadTokenEx
ZwImpersonateThread
ZwOpenThread
ZwDelayExecution
ZwCreateEvent
RtlRandomEx
ZwQueryInformationProcess
ZwQueryInformationToken
ZwOpenProcessToken
RtlAdjustPrivilege
RtlInitUnicodeString
swprintf
ZwOpenEvent
ZwCreateFile
strrchr
ZwQueryInformationFile
ZwReadFile
ZwQueryKey
ZwResumeThread
ZwLoadDriver
ZwCreateSymbolicLinkObject
ZwUnmapViewOfSection
ZwFlushVirtualMemory
RtlImageNtHeader
ZwMapViewOfSection
ZwCreateSection
ZwFsControlFile
ZwSetValueKey
wcsrchr
ZwCreateKey
ZwClose
ZwQueryVolumeInformationFile
ZwOpenFile
ZwTerminateProcess
memcpy
FreeLibrary
InterlockedExchange
RaiseException
GetProcAddress
CreateTimerQueueTimer
DeleteTimerQueueTimer
BindIoCompletionCallback
CreateProcessW
GetLastError
CreateThread
DisableThreadLibraryCalls
ExitThread
Sleep
GetSystemTimeAsFileTime
VirtualProtect
LocalFree
LocalAlloc
ExitProcess
GetTickCount
GetVersion
LoadLibraryA
CloseServiceHandle
MD5Update
MD5Final
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
OpenServiceW
ControlService
OpenSCManagerW
MD5Init
DeleteService
ChangeServiceConfigW
ord22
ord23
ord20
setsockopt
WSASend
WSARecv
WSAIoctl
WSASendTo
closesocket
WSAGetLastError
WSASocketW
WSACleanup
WSAStartup
bind
WSARecvFrom
AlphaBlend
GradientFill
TransparentBlt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ