XXX
YYYYYY
ckjx
main
win7ol
Static task
static1
Behavioral task
behavioral1
Sample
eb875f1a6ac2243d9ea1a72ec399ef9c86fccba60ae6a1af01d577cffb51e584.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb875f1a6ac2243d9ea1a72ec399ef9c86fccba60ae6a1af01d577cffb51e584.dll
Resource
win10v2004-20220812-en
Target
eb875f1a6ac2243d9ea1a72ec399ef9c86fccba60ae6a1af01d577cffb51e584
Size
144KB
MD5
29f1079bee6bc12297749c909fae2d70
SHA1
63cedbacf689040b8cad2128d6070619dc42db8c
SHA256
eb875f1a6ac2243d9ea1a72ec399ef9c86fccba60ae6a1af01d577cffb51e584
SHA512
5117c5ac663fc81250a8522f221acf55c5926ed3f9c932cd67874437ebfa24f3bc284fc55a5f7e0a23cb3d56874d6d69f44f5b0f1c38a7dd49cbc9a2d666f814
SSDEEP
3072:j+5JH5flOp2tpFeDJjDPpfaf7pB54uMxGI2gQ7EKeWp9LK69:abH5fQp6pmJjDPpfmD53iGI2gQ7peE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
HeapAlloc
GetFileSize
WriteFile
GetTickCount
MoveFileA
lstrlenA
CreateThread
OpenProcess
CreateRemoteThread
LocalReAlloc
CreateProcessA
GetFileAttributesA
GetTempPathA
LocalFree
GetProcAddress
GetLastError
CreateFileA
SetFilePointer
ReadFile
DeleteFileA
OutputDebugStringA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetCurrentThreadId
GetModuleFileNameA
GetCurrentProcess
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
Sleep
CancelIo
WaitForSingleObject
CloseHandle
LoadLibraryA
ReleaseMutex
wsprintfA
ExitWindowsEx
MessageBoxA
SendMessageA
FindWindowExA
FindWindowA
GetWindowTextA
GetActiveWindow
MapVirtualKeyA
SetCapture
GetCursorInfo
SetClipboardData
EmptyClipboard
OpenClipboard
CloseClipboard
GetClipboardData
GetSystemMetrics
SetRect
ReleaseDC
GetDC
IsWindowVisible
EnumWindows
OpenInputDesktop
DestroyCursor
LoadCursorA
SetCursorPos
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateDCA
CreateCompatibleDC
CreateDIBSection
SelectObject
RegQueryValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
LsaOpenPolicy
LsaRetrievePrivateData
IsValidSid
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
RegSetKeySecurity
GetLengthSid
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegRestoreKeyA
RegSaveKeyA
EnumServicesStatusA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
AdjustTokenPrivileges
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
SetEntriesInAclA
SHDeleteKeyA
atoi
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
_snprintf
wcscpy
_errno
free
strncmp
strrchr
_strcmpi
fopen
fseek
fwrite
fclose
strncpy
_except_handler3
strcmp
malloc
strchr
??3@YAXPAX@Z
memcpy
memmove
ceil
__CxxFrameHandler
_ftol
_CxxThrowException
strlen
strstr
memset
??2@YAPAXI@Z
memcmp
strcat
strcpy
socket
ntohs
recv
closesocket
select
send
inet_ntoa
inet_addr
getsockname
bind
getpeername
gethostbyname
listen
sendto
recvfrom
__WSAFDIsSet
ioctlsocket
gethostname
setsockopt
WSAIoctl
WSACleanup
WSAStartup
accept
htons
connect
NetUserAdd
NetLocalGroupAddMembers
WTSQueryUserToken
CreateEnvironmentBlock
XXX
YYYYYY
ckjx
main
win7ol
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ