AndBeOr
ServerNeedYouTheIndirectly
ToCALsYour
Static task
static1
Behavioral task
behavioral1
Sample
aac05ca8bf13dbecf013e16ab93b73f6566e69b01e463a776d02b8fc0e7afc53.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aac05ca8bf13dbecf013e16ab93b73f6566e69b01e463a776d02b8fc0e7afc53.dll
Resource
win10v2004-20220812-en
Target
aac05ca8bf13dbecf013e16ab93b73f6566e69b01e463a776d02b8fc0e7afc53
Size
244KB
MD5
541e1f7d6a3737595d112d2bf88e9c30
SHA1
2f32ceb36a88e9882460212f36446992596849ca
SHA256
aac05ca8bf13dbecf013e16ab93b73f6566e69b01e463a776d02b8fc0e7afc53
SHA512
09ab42609ac4e60d9fff9c8e94c0dcdd1fa8f9a641321c0a09493f1460a4d74478c9556b0183daa4660ebc8f3cbc0c9f516f89bec6d2c527617b69bb006f9a9e
SSDEEP
6144:Vx+upJGv1bhoEE9BdUXLxxsvoVP5QNGA:j+QIbhotCXLjsG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SearchPathA
GetProcessHeap
SetFileApisToOEM
WideCharToMultiByte
VerifyVersionInfoW
VerSetConditionMask
GetFileAttributesW
lstrcpynW
FindNextFileW
FindFirstFileW
VirtualProtect
GetStringTypeW
GetStringTypeA
LCMapStringW
VirtualQuery
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
SetLastError
TlsAlloc
SetHandleCount
SetThreadLocale
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleHandleA
HeapAlloc
HeapFree
GetCommandLineA
ExpandEnvironmentStringsA
GetProcAddress
InterlockedIncrement
QueryPerformanceCounter
InterlockedDecrement
WaitForSingleObject
CloseHandle
MultiByteToWideChar
GetStdHandle
GetFileType
WriteConsoleW
LoadLibraryW
FreeLibrary
GetConsoleOutputCP
SearchPathW
LocalFree
LocalAlloc
GetLastError
GetCommandLineW
GetStartupInfoW
GetModuleHandleW
Sleep
GetLocaleInfoW
GetUserDefaultUILanguage
SetErrorMode
SetCurrentDirectoryA
GetEnvironmentStringsW
ExitProcess
DestroyWindow
DefWindowProcW
UpdateWindow
ShowWindow
RegisterClassW
SetThreadDesktop
CharToOemW
wvsprintfW
OemToCharBuffW
LoadStringW
wsprintfW
FindWindowW
GetProcessWindowStation
OpenWindowStationW
SetProcessWindowStation
OpenInputDesktop
GetFocus
GetThreadDesktop
CloseWindowStation
CharLowerBuffA
OpenDesktopW
AllocateAndInitializeSid
LookupAccountSidW
RegCloseKey
RegQueryValueExA
CheckTokenMembership
CoReleaseServerProcess
CoCreateInstanceEx
CoTaskMemFree
CoRevokeClassObject
CoUninitialize
CoInitializeSecurity
vfwprintf
setlocale
fprintf
malloc
_vsnwprintf
vswprintf
wprintf
exit
fwprintf
free
AndBeOr
ServerNeedYouTheIndirectly
ToCALsYour
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ