9unzip@@YAPAXPADPAK@Z
InstallHook
_WorkProc@4
__mp@4
Static task
static1
Behavioral task
behavioral1
Sample
8789a1c1c255840701010e7675e38b434a24e4c3af35b91bf1f0410feb7be7cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8789a1c1c255840701010e7675e38b434a24e4c3af35b91bf1f0410feb7be7cd.exe
Resource
win10v2004-20221111-en
Target
8789a1c1c255840701010e7675e38b434a24e4c3af35b91bf1f0410feb7be7cd
Size
61KB
MD5
9f51eddb63268d85a3b58847c215b499
SHA1
af969a5d5bbea308a371b69ce0b0a4c632049c91
SHA256
8789a1c1c255840701010e7675e38b434a24e4c3af35b91bf1f0410feb7be7cd
SHA512
56fac48804dce4f4cc857b64a6117bd597a50c78984a6eb8fdd71b9aeace5ea1da621ee1741e1b1118ae6b4112945f28443d2b5b22605900976c115bbbcf31cb
SSDEEP
768:SluOFXRiWRmhpR4NRkZi27v2vFgY48IM9xwA7wmtkeu1kRF6C0gNXNJ8zFFjz8J:SlfVlapLZrIqYGkw7Skq6Epj8JFvk
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
FlushInstructionCache
SetLastError
lstrcmpA
FreeLibrary
IsBadReadPtr
GetVersionExA
GetSystemDirectoryA
ExitProcess
WaitForSingleObjectEx
SetEvent
OpenEventA
InterlockedIncrement
WaitForSingleObject
DeleteCriticalSection
MapViewOfFile
UnmapViewOfFile
OpenFileMappingA
GetFileAttributesA
CreateFileMappingA
DeleteFileA
OutputDebugStringA
GetTickCount
GetProcAddress
VirtualFree
VirtualAlloc
MapViewOfFileEx
lstrcatA
SetThreadContext
VirtualProtectEx
GetThreadContext
ResumeThread
DuplicateHandle
LeaveCriticalSection
OpenProcess
CreateProcessA
Sleep
TerminateProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualAllocEx
VirtualFreeEx
QueryDosDeviceA
GetLogicalDriveStringsA
CreateThread
CopyFileA
GetWindowsDirectoryA
CreateEventA
CreateMutexA
ReleaseMutex
GetFileSize
CreateFileA
SetFileTime
GetFileTime
RemoveDirectoryA
WideCharToMultiByte
MultiByteToWideChar
ResetEvent
OpenFile
GlobalAlloc
GlobalFree
GetCurrentProcess
InitializeCriticalSection
lstrcpynA
HeapAlloc
lstrlenA
HeapReAlloc
GetLastError
lstrcpyA
HeapFree
GetProcessHeap
lstrcmpiA
VirtualQuery
VirtualProtect
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
CreateRemoteThread
LoadLibraryA
wsprintfA
MessageBoxA
wvsprintfA
InitializeSecurityDescriptor
AdjustTokenPrivileges
RegQueryValueExA
OpenProcessToken
GetTokenInformation
RegEnumValueA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SetSecurityDescriptorDacl
SysAllocString
SysFreeString
VariantInit
HttpQueryInfoA
HttpOpenRequestA
InternetConnectA
InternetCanonicalizeUrlA
InternetOpenA
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
InternetCrackUrlA
InternetCloseHandle
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
InternetQueryOptionA
HttpAddRequestHeadersA
InternetSetOptionA
HttpSendRequestA
UuidToStringA
RpcStringFreeA
UuidCreate
ObtainUserAgentString
9unzip@@YAPAXPADPAK@Z
InstallHook
_WorkProc@4
__mp@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE