dllstart
init
Static task
static1
Behavioral task
behavioral1
Sample
383b0abb5274e9c87f8d42b0dfca92d82ea28ac940d55d25787a0c3394df6a93.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
383b0abb5274e9c87f8d42b0dfca92d82ea28ac940d55d25787a0c3394df6a93.exe
Resource
win10v2004-20230221-en
Target
fd46b618b6eea54bd5a8e119803f9000.bin
Size
192KB
MD5
5dd6f88fcee0ecf2652b89f22ea0148c
SHA1
1a3deed9502f2f8f24feb75f973742de22445ba8
SHA256
c78cef708e27388757be372ea45aa9e2c64b6bcdcb802f481944253f0c217bc1
SHA512
36cecf545e8a0b7301d40fbc526922fa9893cebf31d7e67baab98ffe09827ab4fd9dcf13821a29c3640020389fdfaee78fd94755ff9f7f0f90bb366aececac78
SSDEEP
3072:Ur7BkJZJi+fXCKW8CtICHnkJlLMF5yhsEjLVX823YYHrqQ/ubGlHdZL:4KlRfSKdCiQkKhEjD3tuQx3L
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CloseHandle
HeapFree
InitializeCriticalSectionEx
HeapSize
MultiByteToWideChar
Sleep
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
WideCharToMultiByte
WriteProcessMemory
WaitForSingleObject
OpenProcess
GetModuleHandleA
GetExitCodeThread
VirtualAllocEx
GlobalMemoryStatusEx
CreateRemoteThread
VirtualFreeEx
GetModuleFileNameA
OutputDebugStringA
GetModuleFileNameW
LocalAlloc
LoadLibraryA
WritePrivateProfileStringA
GetLocalTime
SetCurrentDirectoryW
LocalFree
ExitProcess
GetCurrentProcessId
LocalReAlloc
GetPrivateProfileStringA
SetEndOfFile
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetModuleHandleW
GetCurrentProcess
GetProcAddress
LoadLibraryW
VirtualAlloc
VirtualFree
GetVersionExW
VirtualProtect
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
DeleteFileW
FlushFileBuffers
WriteConsoleW
GetFileSizeEx
GetConsoleCP
EnterCriticalSection
LeaveCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
OutputDebugStringW
RtlUnwind
FreeLibrary
LoadLibraryExW
ReadFile
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReleaseDC
GetDC
GetDeviceCaps
AdjustTokenPrivileges
LookupAccountSidA
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueW
ShellExecuteA
SHGetSpecialFolderPathA
PathRemoveFileSpecW
PathStripPathA
PathFileExistsA
Netbios
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
dllstart
init
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ