AcntMgr
EventLogon
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
652f3e3ab65192ed25cb52df70bc95f8aeb87d7f7ad584a3f4948e40c526a0bc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
652f3e3ab65192ed25cb52df70bc95f8aeb87d7f7ad584a3f4948e40c526a0bc.dll
Resource
win10v2004-20220812-en
Target
652f3e3ab65192ed25cb52df70bc95f8aeb87d7f7ad584a3f4948e40c526a0bc
Size
13KB
MD5
9949b77ac477e09a5bcae9c443e61d58
SHA1
d3a9aebc25e82381553cfbbc4fbfbd318c350414
SHA256
652f3e3ab65192ed25cb52df70bc95f8aeb87d7f7ad584a3f4948e40c526a0bc
SHA512
63d70a6cd0231fb8ff0e2fc5927a570fb23da3b244d81a607972fa7720a75b0e8c72f9f2655c616ff5e257f787e4e6860f83b9e9ee95917e8294a63fea783deb
SSDEEP
192:UOwXdlpq2ZwhbKEuzjHCXjiDo9vnnKQj8g7f8KsbfelG6ba1D6NcAUqw:UTNlplZ6uPHC1hiwUPbGlG71DScAU
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ReadFile
GetFileSize
CreateFileA
GetLastError
OpenProcess
GetModuleFileNameA
LoadLibraryA
CreateThread
VirtualProtect
WriteFile
lstrlenA
GetLocalTime
WideCharToMultiByte
SetFilePointer
OutputDebugStringW
lstrlenW
GetProcAddress
WriteProcessMemory
GetModuleHandleA
CreateRemoteThread
GetCurrentProcess
GetFileAttributesA
CreateProcessA
WaitForSingleObject
TerminateProcess
CloseHandle
GetSystemDirectoryA
Sleep
GlobalAlloc
GlobalFree
OutputDebugStringA
wsprintfA
wsprintfW
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
StartServiceA
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyA
ShellExecuteA
recv
send
AcntMgr
EventLogon
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ