ALUa7
DrawThemeIcon
PHYST2JX3
UYh41ub
Vemfa4WN
Overview
overview
10Static
static
TE04/Ref.lnk
windows7-x64
10TE04/Ref.lnk
windows10-2004-x64
10TE04/syndr...st.cmd
windows7-x64
1TE04/syndr...st.cmd
windows10-2004-x64
1TE04/syndr...ta.dll
windows7-x64
3TE04/syndr...ta.dll
windows10-2004-x64
3TE04/syndr...la.cmd
windows7-x64
1TE04/syndr...la.cmd
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
TE04/Ref.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TE04/Ref.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
TE04/syndrome/destructionist.cmd
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
TE04/syndrome/destructionist.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
TE04/syndrome/dicta.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
TE04/syndrome/dicta.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
TE04/syndrome/dracula.cmd
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
TE04/syndrome/dracula.cmd
Resource
win10v2004-20220812-en
Target
TE04.7z
Size
329KB
MD5
d3c13daff201f55c94bee220135ee954
SHA1
0e2714430b60be38535cb5173442fb57ade8ad9b
SHA256
5517f176fbd908ab99f0afe8980ce9e118cf89ba982dde9d403f47e9c5f4a8b8
SHA512
4f339ae35b0df5a5c89b55ea3293608fb8d20f41155f35d38b96f9d4cfcb1a15d1d522869d9d17e17d2ae4149aaa4e271d5076968476322ee38997b35db29cbe
SSDEEP
6144:JsGzvEGQfiZutWrBAJK8opx40UeQNWLO4bPmfSb184af/6gOv:iGDQK46q0CNWLpjmc18dqv
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateFileA
CreateFileMappingA
CreateFileW
CreateNamedPipeA
CreateThread
DecodePointer
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindFirstFileExW
FindNextFileA
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetComputerNameA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedFlushSList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
MapViewOfFile
MultiByteToWideChar
OpenThread
QueryPerformanceCounter
RaiseException
ResumeThread
RtlUnwind
SetFileAttributesA
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleW
WriteFile
ALUa7
DrawThemeIcon
PHYST2JX3
UYh41ub
Vemfa4WN
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ