DrawThemeIcon
EDsXLG5116
TnawSQ839g7h
ZQdt4j
Overview
overview
10Static
static
Claim_PE84.vhd
windows7-x64
3Claim_PE84.vhd
windows10-2004-x64
3Claim.lnk
windows7-x64
10Claim.lnk
windows10-2004-x64
10respondent...nt.txt
windows7-x64
1respondent...nt.txt
windows10-2004-x64
1respondent...ar.dll
windows7-x64
10respondent...ar.dll
windows10-2004-x64
10respondent...em.cmd
windows7-x64
1respondent...em.cmd
windows10-2004-x64
1respondent...ct.cmd
windows7-x64
1respondent...ct.cmd
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Claim_PE84.vhd
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Claim_PE84.vhd
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Claim.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Claim.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
respondents/advisement.txt
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
respondents/advisement.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
respondents/crossbar.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
respondents/crossbar.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
respondents/ibidem.cmd
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
respondents/ibidem.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
respondents/suspect.cmd
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
respondents/suspect.cmd
Resource
win10v2004-20220812-en
Target
Claim_PE84.vhd
Size
2.0MB
MD5
2fe68553beb0a7b084f1b349d6551d9c
SHA1
c7e8f7b9313e876b10623840989fb07c00203930
SHA256
edcb8d8e80eb826ec95ed9ccdc1d4470c3edd1782350187fc9bcd776c6d96095
SHA512
cf9d306a0948217c32dd865a1926c18405cb0e24aef2eadd4bdd81bf9376783fa1a44de90ddc0926e4e6f41094cff99869b325b6d22a200f8f8161ee177fc0a1
SSDEEP
24576:/wWw8wewswUwBw6gwsw3wTOZqHk2JajfRO8:/wWw8wewswUwBw6gwsw3waZaUY8
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetCommandLineA
CreateActCtxA
ActivateActCtx
DeactivateActCtx
CreateThread
FindFirstFileA
FindNextFileA
GetModuleHandleA
GetCurrentThreadId
GetCurrentProcessId
GetWindowsDirectoryA
SetFileAttributesA
DeleteFileA
CreateFileMappingA
MapViewOfFile
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
GetLastError
HeapFree
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
LoadLibraryExW
LCMapStringW
GetStdHandle
GetFileType
GetStartupInfoW
SetLastError
GetProcessHeap
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
SetStdHandle
MultiByteToWideChar
GetCPInfo
WideCharToMultiByte
IsValidCodePage
GetACP
GetOEMCP
GetFileSizeEx
SetFilePointerEx
GetStringTypeW
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetModuleFileNameW
RaiseException
CreateFileW
WriteConsoleW
DecodePointer
HeapSize
HeapReAlloc
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
InterlockedFlushSList
FindClose
FindFirstFileExW
FindNextFileW
GetCommandLineW
GetEnvironmentStringsW
DrawThemeIcon
EDsXLG5116
TnawSQ839g7h
ZQdt4j
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ