RT_GetVersion
xCreateRemoteThread
xOpenThread
xVirtualAllocEx
xVirtualFreeEx
Static task
static1
Behavioral task
behavioral1
Sample
a886672358f5dca0fb57214b5d653ccf9814d7f9d103ff6f78409304b1ccc1dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a886672358f5dca0fb57214b5d653ccf9814d7f9d103ff6f78409304b1ccc1dd.exe
Resource
win10v2004-20221111-en
Target
a886672358f5dca0fb57214b5d653ccf9814d7f9d103ff6f78409304b1ccc1dd
Size
327KB
MD5
e1f86b7b8b3ea67e5831fa8fd2c639a9
SHA1
f6bb4ce000382de7ddebd8b6ce256dc3995635ea
SHA256
a886672358f5dca0fb57214b5d653ccf9814d7f9d103ff6f78409304b1ccc1dd
SHA512
295bb60394fef5c36b642b9389c9997f436bfa76d4968e95e8ae0a471ad366f1aca6e467c8752d57a27e53666b61d51750f2e011a59e0ba22296e70b7da3452a
SSDEEP
1536:BOrBOigOijuvPulYr1OVBOOOOOOVOOXOOOhAA3H4TROOOOOOO3DOOsoOOOOOOVOn:kP8LCKHJZ9v
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
WriteConsoleA
VirtualAlloc
lstrcatA
WriteFile
VirtualProtectEx
SetFilePointer
lstrcpyA
lstrcmpA
GetModuleHandleA
GetPriorityClass
WriteProcessMemory
WideCharToMultiByte
_lclose
Sleep
GetTickCount
MultiByteToWideChar
CreateFileA
GetWindowsDirectoryA
GetStdHandle
CloseHandle
GetProcAddress
ExitProcess
DeleteFileA
FindFirstFileA
FindNextFileA
GetCurrentProcessId
GetFileSize
GetModuleFileNameA
_lopen
lstrlenA
CreateRemoteThread
VirtualFree
ReadFile
OpenProcess
CreateProcessA
GlobalFree
GlobalAlloc
LoadLibraryA
GetSystemTime
CreateThread
CopyFileA
GetSystemDirectoryA
ResumeThread
FindClose
SetLastError
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyA
RegCloseKey
gethostbyname
WSAStartup
WSACleanup
inet_ntoa
gethostname
wsprintfA
TranslateMessage
ToAsciiEx
SetWindowsHookExA
SetKeyboardState
SendMessageA
RegisterClassA
PeekMessageA
MessageBoxA
GetWindowThreadProcessId
GetWindowTextA
SetClipboardViewer
GetKeyboardState
GetKeyboardLayout
GetKeyNameTextA
GetForegroundWindow
GetFocus
GetClipboardData
EnumWindows
DispatchMessageA
GetMessageA
DefWindowProcA
CreateWindowExA
CloseClipboard
OpenClipboard
CharLowerA
CallNextHookEx
OleInitialize
CoUninitialize
CoCreateInstance
SysStringLen
SysFreeString
SysAllocStringByteLen
SysAllocString
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
HttpAddRequestHeadersA
InternetOpenA
InternetGetConnectedState
InternetCloseHandle
RT_GetVersion
xCreateRemoteThread
xOpenThread
xVirtualAllocEx
xVirtualFreeEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ