_itoa
atoi
atol
free
isdigit
isspace
malloc
realloc
stricmp
Static task
static1
Behavioral task
behavioral1
Sample
simple.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
simple.exe
Resource
win10v2004-20230220-en
Target
SIMPLE0001.7z
Size
10KB
MD5
b3027f685ccfd11515144b5da0edb6ad
SHA1
89a9a796feeaa66e836d522d23d1831db0c592d6
SHA256
b9ffcf9d7f8f7d2a6197eb4a7f9b9a66434434f14a063b72fb6a6a8258870238
SHA512
1d71191573516a35824cc51149d9ace023c45d134193df4967d44a8fb4c0d58a711c90a7f4092de3ee84bd18469648c84c19e35766fb35e1be17897fde6c34a4
SSDEEP
192:PvrKdYcgz+xCigxT6dRgtBfOy1OhYXy9gN9ZAaODnQTd0B39m/Oh6X3fxPn:HUYcMxTtOrhd9gNrAaA39VY3fxP
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTickCount
GetProcAddress
LoadLibraryA
CreateProcessA
LeaveCriticalSection
EnterCriticalSection
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
GetComputerNameA
InitializeCriticalSection
GetACP
CreateDirectoryA
HeapReAlloc
GetDriveTypeA
FileTimeToSystemTime
ReadFile
GetFileSize
TerminateProcess
PeekNamedPipe
CreatePipe
GetFileAttributesA
GetEnvironmentVariableA
GetVersionExA
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
HeapFree
GetProcessHeap
HeapAlloc
WaitForSingleObject
GetLastError
Sleep
GetModuleFileNameA
lstrcpyA
lstrcatA
ExitProcess
CreateFileA
SetFilePointer
TryEnterCriticalSection
WriteFile
wsprintfA
wsprintfW
wvsprintfA
StartServiceCtrlDispatcherA
SetServiceStatus
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
ChangeServiceConfig2A
StartServiceA
QueryServiceStatus
ImpersonateLoggedOnUser
OpenProcessToken
RevertToSelf
RegisterServiceCtrlHandlerA
SHFileOperationA
ShellExecuteA
SHDeleteKeyA
_itoa
atoi
atol
free
isdigit
isspace
malloc
realloc
stricmp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ