IsSandboxedProcess
base_cs_cmd
Static task
static1
Behavioral task
behavioral1
Sample
50543b3a6cd1fbb3dbbf888761ad8540b5811d89a586e1a6bb140aa7d6685804.exe
Resource
win7-20221111-en
Target
50543b3a6cd1fbb3dbbf888761ad8540b5811d89a586e1a6bb140aa7d6685804
Size
1.3MB
MD5
21945c46bc4d1d8fe8c31228104b89c0
SHA1
72a03c33029990c4bd093099c26160c6144198cb
SHA256
50543b3a6cd1fbb3dbbf888761ad8540b5811d89a586e1a6bb140aa7d6685804
SHA512
7e9ad7259aca583cb15df13a41feed079eb0ae9975c8144a30ae5fa162d09f46e78184eb9478309eb73053a6a764c92fc303e1618f2ee71e5f72e75a622ff828
SSDEEP
12288:gBpmtYlIEW8dXVwG9zFL1n4EP1UkCBjCoS9iziDfHg6M2uX2xHg3eYEKsbn2b3PK:gPmIFC1S9izjkuX2x9YEKsblqUoG3
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
SetEntriesInAclW
LookupPrivilegeValueW
EqualSid
CreateRestrictedToken
CreateWellKnownSid
CopySid
RegCloseKey
RegCreateKeyExW
RegOpenKeyW
RegOpenKeyExW
OpenProcessToken
GetTokenInformation
DuplicateToken
DuplicateTokenEx
ConvertStringSidToSidW
CreateProcessAsUserW
SetThreadToken
RevertToSelf
RegDisablePredefinedCache
GetLengthSid
GetSecurityDescriptorSacl
SetTokenInformation
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityInfo
WriteConsoleW
OutputDebugStringW
SetEndOfFile
ReadConsoleW
SetEnvironmentVariableA
SetFilePointerEx
FreeLibrary
GetProcAddress
lstrlenW
LoadLibraryW
GetCommandLineW
GetEnvironmentVariableW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
ReadFile
RemoveDirectoryW
SetFilePointer
OutputDebugStringA
DecodePointer
CloseHandle
DuplicateHandle
RaiseException
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GetStartupInfoW
GetLocalTime
GetSystemInfo
GetTickCount
VirtualAlloc
VirtualFree
WriteProcessMemory
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
CopyFileW
MoveFileExW
LocalFree
WideCharToMultiByte
MultiByteToWideChar
IsDebuggerPresent
CreateMutexW
WaitForSingleObject
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
GetCurrentThreadId
FindFirstFileExW
GetNativeSystemInfo
InterlockedCompareExchange
GetVersionExW
Sleep
CreateThread
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetSystemTimeAsFileTime
InterlockedExchange
QueryPerformanceFrequency
GetUserDefaultLangID
CreateEventW
GetModuleHandleA
GetModuleHandleExW
OpenProcess
GetProcessId
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
InitializeCriticalSection
SetEvent
ResetEvent
UnregisterWaitEx
RegisterWaitForSingleObject
TerminateJobObject
SetInformationJobObject
HeapSetInformation
VirtualAllocEx
VirtualQueryEx
TerminateProcess
GetExitCodeProcess
GetThreadContext
CreateFileMappingW
MapViewOfFile
AssignProcessToJobObject
GetFileType
InterlockedIncrement
InterlockedDecrement
GetLongPathNameW
QueryDosDeviceW
VirtualProtectEx
UnmapViewOfFile
VirtualFreeEx
ResumeThread
CreateJobObjectW
CreateNamedPipeW
SearchPathW
ProcessIdToSessionId
SetHandleInformation
GetProcessHandleCount
SignalObjectAndWait
ReadProcessMemory
SuspendThread
DebugBreak
EncodePointer
SetUnhandledExceptionFilter
FlushInstructionCache
VirtualQuery
LoadLibraryExA
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
ExitProcess
GetConsoleCP
GetConsoleMode
GetCPInfo
UnhandledExceptionFilter
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
SetStdHandle
IsSandboxedProcess
base_cs_cmd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE