A1
A2
A3
AX
Behavioral task
behavioral1
Sample
9924c4a47bd2ed94809fadc2d253aca28ddf91bd2880fa98c3c33040cd18b342.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9924c4a47bd2ed94809fadc2d253aca28ddf91bd2880fa98c3c33040cd18b342.dll
Resource
win10v2004-20220812-en
Target
9924c4a47bd2ed94809fadc2d253aca28ddf91bd2880fa98c3c33040cd18b342
Size
1.1MB
MD5
74d825f04dc4c58ba6206e27a6c13ce8
SHA1
b4c23c7cc3fe977d6db0cf90c319d1b3d35c41d4
SHA256
9924c4a47bd2ed94809fadc2d253aca28ddf91bd2880fa98c3c33040cd18b342
SHA512
05bd23ca0a89c84987b31ca749b87adae3e0a19b149749c9d59ab5d4c8028892c9738c865031ec6819b1b524c749c16a45a2a1aa43e20c4de7ac5bd5b0117670
SSDEEP
24576:ldQwuqN9ZR6cDlCbUVXsPzA8IxjTnuZcQLqm:ldQw16EuoqA8I1TuKQLB
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
VirtualFree
VirtualQuery
VirtualAlloc
GetLastError
VirtualProtectEx
GetModuleFileNameA
InitializeCriticalSection
SetLastError
lstrlenA
LoadLibraryA
VirtualProtect
OpenProcess
TerminateProcess
GetModuleHandleA
GetProcAddress
CreateFileA
CreateFileMappingA
CloseHandle
MapViewOfFile
UnmapViewOfFile
Sleep
lstrcpyA
DeleteFileA
GetFileSize
GetComputerNameA
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
GetCommandLineA
GetVersion
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
TlsAlloc
TlsFree
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
IsBadWritePtr
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
WriteFile
UnhandledExceptionFilter
InterlockedDecrement
InterlockedIncrement
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
ShowWindow
EndDialog
FindWindowA
KillTimer
PostMessageA
UpdateWindow
RegisterHotKey
UnregisterHotKey
DialogBoxParamA
SetTimer
GetDesktopWindow
MoveWindow
fputwc
rename
isspace
isalnum
isalpha
fputs
isdigit
_access
fgetwc
ungetwc
_strlwr
A1
A2
A3
AX
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ