IsSandboxedProcess
base_cs_cmd
Static task
static1
Behavioral task
behavioral1
Sample
cc09835794ee0c47e513ffa1da7b9307980b68a41b5ac4e79260835a4066266b.exe
Resource
win7-20221111-en
Target
cc09835794ee0c47e513ffa1da7b9307980b68a41b5ac4e79260835a4066266b
Size
1.3MB
MD5
09f5ce243d42d3e86d9cdee50076f850
SHA1
5cfa8952ebe86a8e2e2033b25dbd2219d274c4ed
SHA256
cc09835794ee0c47e513ffa1da7b9307980b68a41b5ac4e79260835a4066266b
SHA512
d22933b33a85be934ee73dae23ab87650e18a6197337bf5433daeb4a3005d6c4daf806c8db3717d04529ec777ba6c780460936b80d02c996ebb8ddbe00d89643
SSDEEP
12288:ZxZmd/Fo0m8dX1wG9zFL1n4kfVUTGeuzop9z/S9sHgtQgRJq2xHg3eYEKsbn2b3C:ZPmXCGOp9z/6bRJq2x9YEKsbZifXwSI
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
SetEntriesInAclW
LookupPrivilegeValueW
EqualSid
CreateRestrictedToken
CreateWellKnownSid
CopySid
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
RegOpenKeyExW
OpenProcessToken
GetTokenInformation
DuplicateToken
DuplicateTokenEx
ConvertStringSidToSidW
CreateProcessAsUserW
SetThreadToken
RevertToSelf
RegDisablePredefinedCache
GetLengthSid
GetSecurityDescriptorSacl
SetTokenInformation
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityInfo
WriteConsoleW
OutputDebugStringW
SetEndOfFile
ReadConsoleW
SetEnvironmentVariableA
SetFilePointerEx
FreeLibrary
GetProcAddress
lstrlenW
LoadLibraryW
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
ReadFile
RemoveDirectoryW
SetFilePointer
OutputDebugStringA
DecodePointer
CloseHandle
DuplicateHandle
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GetStartupInfoW
GetLocalTime
GetSystemInfo
GetTickCount
VirtualAlloc
VirtualFree
WriteProcessMemory
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
CopyFileW
MoveFileExW
LocalFree
WideCharToMultiByte
MultiByteToWideChar
IsDebuggerPresent
CreateMutexW
WaitForSingleObject
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
GetCurrentThreadId
FindFirstFileExW
GetNativeSystemInfo
InterlockedCompareExchange
GetVersionExW
Sleep
CreateThread
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
InterlockedExchange
QueryPerformanceFrequency
GetUserDefaultLangID
CreateEventW
GetModuleHandleA
GetModuleHandleExW
OpenProcess
GetProcessId
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
InitializeCriticalSection
SetEvent
ResetEvent
UnregisterWaitEx
RegisterWaitForSingleObject
TerminateJobObject
SetInformationJobObject
HeapSetInformation
VirtualAllocEx
VirtualQueryEx
TerminateProcess
GetExitCodeProcess
GetThreadContext
CreateFileMappingW
MapViewOfFile
AssignProcessToJobObject
GetFileType
InterlockedIncrement
InterlockedDecrement
GetLongPathNameW
QueryDosDeviceW
VirtualProtectEx
UnmapViewOfFile
VirtualFreeEx
ResumeThread
CreateJobObjectW
CreateNamedPipeW
SearchPathW
ProcessIdToSessionId
SetHandleInformation
GetProcessHandleCount
SignalObjectAndWait
ReadProcessMemory
SuspendThread
DebugBreak
EncodePointer
SetUnhandledExceptionFilter
FlushInstructionCache
VirtualQuery
LoadLibraryExA
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetConsoleCP
GetConsoleMode
GetCPInfo
UnhandledExceptionFilter
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
SetStdHandle
IsSandboxedProcess
base_cs_cmd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE