AddImage
AddText
Clear
Destroy
Redraw
SetBg
SetReturn
Sound
Overview
overview
8Static
static
3samples.zip
windows10-2004-x64
1a316ae1a72...83.rar
windows10-2004-x64
3URGENT REQ...df.exe
windows10-2004-x64
8$PLUGINSDI...ge.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Afhandlings121.udr
windows10-2004-x64
3Funnelled.txt
windows10-2004-x64
1Hovedlinie.red
windows10-2004-x64
3Premeasure.bob
windows10-2004-x64
3Skingert.bon
windows10-2004-x64
3Svbelsesbrnene.cre
windows10-2004-x64
3discipline...ne.dmo
windows10-2004-x64
3sgnehelligdags.sto
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
samples.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
a316ae1a72c17b6d8c67873adeecac6e4dc0a8c0a3c4be1b868096772ff84383.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
URGENT REQUEST FOR PRICE.pdf.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Afhandlings121.udr
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Funnelled.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Hovedlinie.red
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Premeasure.bob
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Skingert.bon
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Svbelsesbrnene.cre
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
disciplineringerne.dmo
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
sgnehelligdags.sto
Resource
win10v2004-20240709-en
Target
samples.zip
Size
469KB
MD5
a0a1092cc5fdd6f62e7cf81a142d7350
SHA1
95408c512929015a7fc0dd774495e59a6b1b706e
SHA256
170aeed010a6c1b1b7ce14db2bb78392b701401e334c88ee8ab9135619c8644e
SHA512
0c04be6f0907ebbefcd3d66384074ec24e0c8003f5a1c7f62f8d73700c94323e433c0135c3de8576007b0e3fc01e2dc628c12e9d47f05d3b8d67a8dacda1c01b
SSDEEP
12288:UOOOtw/RJZhUdVfWFXE1WVW/GyokHjoeM4y:Uv5/RZUd4FXEAVWl9Dry
Checks for missing Authenticode signature.
resource |
---|
unpack002/URGENT REQUEST FOR PRICE.pdf.exe |
unpack003/$PLUGINSDIR/BgImage.dll |
unpack003/$PLUGINSDIR/nsDialogs.dll |
unpack003/$PLUGINSDIR/nsExec.dll |
resource | yara_rule |
---|---|
static1/unpack002/URGENT REQUEST FOR PRICE.pdf.exe | nsis_installer_1 |
static1/unpack002/URGENT REQUEST FOR PRICE.pdf.exe | nsis_installer_2 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
RegCreateKeyExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
SHFileOperationA
ShellExecuteExA
OleUninitialize
OleInitialize
IIDFromString
CoCreateInstance
CoTaskMemFree
ImageList_Destroy
ord17
ImageList_AddMasked
ImageList_Create
SetDlgItemTextA
GetSystemMetrics
CreatePopupMenu
AppendMenuA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
IsWindowVisible
CallWindowProcA
GetMessagePos
CheckDlgButton
LoadCursorA
SetCursor
GetSysColor
SetWindowPos
GetWindowLongA
IsWindowEnabled
SetClassLongA
GetSystemMenu
EnableMenuItem
GetWindowRect
ScreenToClient
EndDialog
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetDlgItemTextA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
MessageBoxIndirectA
CharPrevA
PeekMessageA
GetClassInfoA
DispatchMessageA
TrackPopupMenu
GetDeviceCaps
SetBkColor
SelectObject
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
CreateFileA
GetTempFileNameA
ReadFile
RemoveDirectoryA
CreateProcessA
CreateDirectoryA
GetLastError
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
SetErrorMode
GetVersionExA
lstrlenA
GetCommandLineA
GetTempPathA
GetWindowsDirectoryA
WriteFile
ExitProcess
CopyFileA
GetCurrentProcess
GetModuleFileNameA
GetFileSize
GetTickCount
Sleep
SetFileAttributesA
GetFileAttributesA
SetCurrentDirectoryA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
CompareFileTime
SetFileTime
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
GetModuleHandleA
LoadLibraryExA
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
MulDiv
lstrcpyA
MoveFileExA
lstrcatA
WideCharToMultiByte
GetSystemDirectoryA
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
SetEnvironmentVariableA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcpyA
GlobalFree
GlobalAlloc
lstrcpynA
EnterCriticalSection
lstrcmpiA
LeaveCriticalSection
DefWindowProcA
CallWindowProcA
LoadImageA
DestroyWindow
BeginPaint
FillRect
EndPaint
IsWindow
SendMessageA
UnregisterClassA
RedrawWindow
ShowWindow
LoadCursorA
RegisterClassA
CreateWindowExA
SetWindowLongA
GetSystemMetrics
SetWindowPos
DrawTextA
SetBkColor
SetMapMode
GetMapMode
CreateCompatibleBitmap
CreateBitmap
DPtoLP
SetTextColor
SetBkMode
CreateSolidBrush
DeleteDC
CreateCompatibleDC
BitBlt
GetObjectA
SelectObject
DeleteObject
PlaySoundA
AddImage
AddText
Clear
Destroy
Redraw
SetBg
SetReturn
Sound
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
GetFileAttributesA
lstrcmpiA
MulDiv
lstrlenA
HeapFree
GetProcessHeap
GetCurrentDirectoryA
HeapReAlloc
GlobalFree
lstrcpynA
GlobalAlloc
HeapAlloc
SetCurrentDirectoryA
GetPropA
DestroyWindow
CallWindowProcA
SetCursor
LoadCursorA
RemovePropA
CharPrevA
GetWindowLongA
DrawTextA
GetWindowTextA
SetWindowLongA
GetDlgItem
GetSysColor
SetWindowPos
CreateDialogParamA
MapWindowPoints
GetWindowRect
SetPropA
CreateWindowExA
IsWindow
SetTimer
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
ShowWindow
wsprintfA
MapDialogRect
GetClientRect
CharNextA
SendMessageA
DrawFocusRect
SetTextColor
SHBrowseForFolderA
SHGetPathFromIDListA
GetSaveFileNameA
GetOpenFileNameA
CommDlgExtendedError
CoTaskMemFree
Create
CreateControl
CreateItem
CreateTimer
GetUserData
KillTimer
OnBack
OnChange
OnClick
OnNotify
SelectFileDialog
SelectFolderDialog
SetRTL
SetUserData
Show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CharNextA
OemToCharBuffA
SendMessageA
CharNextExA
CharPrevA
FindWindowExA
wsprintfA
GetCommandLineA
lstrcpynA
ExitProcess
GetCurrentProcess
GetModuleHandleA
GetProcAddress
Sleep
TerminateProcess
GlobalReAlloc
ReadFile
PeekNamedPipe
GetExitCodeProcess
WaitForSingleObject
GetTickCount
lstrcpyA
CreateProcessA
GetStartupInfoA
CreatePipe
GetVersion
DeleteFileA
lstrcmpiA
lstrlenA
lstrcatA
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CopyFileA
GetTempFileNameA
GlobalFree
GlobalAlloc
GetModuleFileNameA
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ