RunW
runW
Static task
static1
Behavioral task
behavioral1
Sample
edf7c1f8eeacc6488b621bafd733ee8b5744ebc76f2bfd2607aeba5cc8b2602a.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
edf7c1f8eeacc6488b621bafd733ee8b5744ebc76f2bfd2607aeba5cc8b2602a.dll
Resource
win10v2004-20230221-en
Target
edf7c1f8eeacc6488b621bafd733ee8b5744ebc76f2bfd2607aeba5cc8b2602a
Size
74KB
MD5
f6ae7a37bae4e80f6514c14695b9cc38
SHA1
42987e66bd73418085e798a60f8ae1e0f1e02119
SHA256
edf7c1f8eeacc6488b621bafd733ee8b5744ebc76f2bfd2607aeba5cc8b2602a
SHA512
7827b6bc56f358ea09b02232ce7f41493d69f3aa9e65c0eb58fb6b696ac13cbed894774ffd9e39a084abfc50c459201e727619fd54b612ea62211a69f1d40700
SSDEEP
1536:daXbNVxTe67EXHnD5Pvs5VlEJkFs0jCp0:ubNVDgmJEJkFLCK
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
SysFreeString
SysAllocString
ZwQuerySystemInformation
RtlGetVersion
RtlGetNativeSystemInformation
RtlVirtualUnwind
WNetAddConnection2W
WNetCancelConnection2W
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
CryptImportKey
GetUserNameW
LookupAccountSidW
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
StartServiceW
QueryServiceStatusEx
OpenServiceA
OpenSCManagerW
OpenSCManagerA
EnumServicesStatusA
DeleteService
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
ControlService
CryptEncrypt
CloseServiceHandle
CreateServiceW
NetApiBufferFree
NetShareEnum
NetGetJoinInformation
NetGetDCName
ord680
CommandLineToArgvW
wsprintfW
memcpy
_wfopen
fgetws
_getch
_vsnwprintf
memset
fclose
feof
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
ReadFile
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
TlsGetValue
TlsSetValue
LeaveCriticalSection
DeleteCriticalSection
AllocConsole
WriteConsoleW
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
GetDriveTypeW
GetVolumeInformationW
GetFileSizeEx
TerminateThread
ResetEvent
lstrcmpiW
DeviceIoControl
EnterCriticalSection
InitializeCriticalSection
GetStdHandle
CopyFileW
DeleteFileW
GetComputerNameW
GlobalMemoryStatus
GetSystemInfo
CreateProcessW
GetTempPathW
GetModuleFileNameW
lstrcmpiA
OpenProcess
TerminateProcess
GetComputerNameA
lstrlenA
TlsAlloc
SetErrorMode
ExitProcess
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcatW
lstrlenW
FindClose
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetLastError
HeapFree
CreateFileW
WriteFile
CloseHandle
SetLastError
HeapReAlloc
GetCurrentProcessId
WideCharToMultiByte
Sleep
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcess
SetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventA
CreateThread
GetTickCount64
CreateSemaphoreA
GetCommandLineW
ord9
StrStrIA
SHRegSetUSValueW
StrChrW
StrCmpNIW
StrCmpIW
StrStrIW
RunW
runW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ