Woycd
Wspkughcocw
Static task
static1
Behavioral task
behavioral1
Sample
bd069f768ad3192274ce2496c5144cc0b4fbc82037d811c4bd5cb721c151752b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bd069f768ad3192274ce2496c5144cc0b4fbc82037d811c4bd5cb721c151752b.exe
Resource
win10v2004-20221111-en
Target
bd069f768ad3192274ce2496c5144cc0b4fbc82037d811c4bd5cb721c151752b
Size
34KB
MD5
44d31f4a8d4652558cab8627c8f5626e
SHA1
d721f91c0903f71a07c4ff457f640b4463e4e867
SHA256
bd069f768ad3192274ce2496c5144cc0b4fbc82037d811c4bd5cb721c151752b
SHA512
6b7367073b3296bd7687598910a40ee4a17c051080c8fb2ed304e7a9a6a7876f3b81efc1a3eb97cd34a0b8bd9232841ada2657a9d2f6018b79955b433186a9c8
SSDEEP
768:JwGayxUjJ+oo1pVNJR9S8aAYu40iNMzpu+4+zEui:OGayUjoooBPS8apb+Vz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
EnterCriticalSection
ExitProcess
ExitThread
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
OpenFileMappingA
RtlUnwind
SetLastError
SetUnhandledExceptionFilter
TlsGetValue
VirtualAlloc
lstrcatA
lstrcmpA
EndPaint
CloseWindow
CharUpperBuffA
EqualRect
LsaGetRemoteUserName
LsaICLookupSids
LsaLookupNames
RegEnumKeyA
RegOpenKeyExA
LsaEnumeratePrivilegesOfAccount
LsaEnumeratePrivileges
LsaEnumerateAccountRights
LsaDeleteTrustedDomain
__vbaDateStr
__vbaEraseKeepData
__vbaCyUI1
__vbaCyFix
__vbaCyErrVar
__vbaCopyBytesZero
__vbaAryVarVarg
__vbaAryConstruct2
DirectInputCreateA
DirectInputCreateW
DirectInputCreateEx
Woycd
Wspkughcocw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ