Edit tour

Windows Analysis Report
elevation_service.exe

Overview

General Information

Sample Name:elevation_service.exe
Analysis ID:1266893
MD5:00b82a84331b50fd0c49af2664bb20f1
SHA1:eb4eb12c53c65a39e3503aec761f9999d1e9a5e1
SHA256:0a3ef578ee9e034215f95495566844f15a283bf8a27c112ce4ed2d2949fa38cb
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Initial sample is implementing a service and should be registered / started as service
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64native
  • cmd.exe (PID: 11020 cmdline: cmd /c sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe" >> C:\servicereg.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 11032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • sc.exe (PID: 11088 cmdline: sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • cmd.exe (PID: 10060 cmdline: cmd /c sc start wZRRZ >> C:\servicestart.log 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 10212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • sc.exe (PID: 11236 cmdline: sc start wZRRZ MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
  • elevation_service.exe (PID: 11220 cmdline: C:\Users\user\Desktop\elevation_service.exe MD5: 00B82A84331B50FD0C49AF2664BB20F1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: elevation_service.exeStatic PE information: certificate valid
Source: elevation_service.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release_x64\elevation_service.exe.pdb source: elevation_service.exe
Source: elevation_service.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: elevation_service.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: elevation_service.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: elevation_service.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: elevation_service.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: elevation_service.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: elevation_service.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: elevation_service.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: elevation_service.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: elevation_service.exeString found in binary or memory: http://ocsp.digicert.com0
Source: elevation_service.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: elevation_service.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: elevation_service.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: elevation_service.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\elevation_service.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A275E6_2_00007FF6172A275E
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A17606_2_00007FF6172A1760
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A32606_2_00007FF6172A3260
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A3C606_2_00007FF6172A3C60
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A40906_2_00007FF6172A4090
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A3EF06_2_00007FF6172A3EF0
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A61206_2_00007FF6172A6120
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A3B006_2_00007FF6172A3B00
Source: elevation_service.exeStatic PE information: Number of sections : 13 > 10
Source: C:\Windows\SysWOW64\sc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe" >> C:\servicereg.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe"
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c sc start wZRRZ >> C:\servicestart.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start wZRRZ
Source: unknownProcess created: C:\Users\user\Desktop\elevation_service.exe C:\Users\user\Desktop\elevation_service.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start wZRRZ Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:10212:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:10212:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:11032:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:11032:304:WilStaging_02
Source: elevation_service.exeString found in binary or memory: partition_alloc/address_space
Source: elevation_service.exeString found in binary or memory: {%3.1f%%}malloc/partitionsmalloc/metadata_fragmentation_cachesmalloc/win_heappartition_alloc/address_spaceh
Source: classification engineClassification label: clean2.winEXE@9/2@0/0
Source: elevation_service.exeStatic file information: File size 1722136 > 1048576
Source: elevation_service.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: elevation_service.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: elevation_service.exeStatic PE information: certificate valid
Source: elevation_service.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14c000
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: elevation_service.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: elevation_service.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release_x64\elevation_service.exe.pdb source: elevation_service.exe
Source: elevation_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: elevation_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: elevation_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: elevation_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: elevation_service.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A4B57 push rax; retf 6_2_00007FF6172A4B53
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A4B3E push rax; retf 6_2_00007FF6172A4B53
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF6172A7F1A push rbx; ret 6_2_00007FF6172A7F1C
Source: elevation_service.exeStatic PE information: section name: .00cfg
Source: elevation_service.exeStatic PE information: section name: .gxfg
Source: elevation_service.exeStatic PE information: section name: .retplne
Source: elevation_service.exeStatic PE information: section name: .voltbl
Source: elevation_service.exeStatic PE information: section name: _RDATA
Source: elevation_service.exeStatic PE information: section name: malloc_h
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe"
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start wZRRZ Jump to behavior
Source: C:\Users\user\Desktop\elevation_service.exeCode function: 6_2_00007FF617357084 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00007FF617357084
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
11
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Service Execution
1
DLL Side-Loading
11
Process Injection
1
DLL Side-Loading
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)1
DLL Side-Loading
1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1266893 Sample: elevation_service.exe Startdate: 05/07/2023 Architecture: WINDOWS Score: 2 5 cmd.exe 2 2->5         started        7 cmd.exe 2 2->7         started        9 elevation_service.exe 2->9         started        process3 11 conhost.exe 5->11         started        13 sc.exe 1 5->13         started        15 conhost.exe 7->15         started        17 sc.exe 1 7->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
elevation_service.exe0%VirustotalBrowse
elevation_service.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:38.0.0 Beryl
Analysis ID:1266893
Start date and time:2023-07-05 05:02:36 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample file name:elevation_service.exe
Detection:CLEAN
Classification:clean2.winEXE@9/2@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 21.9%)
  • Quality average: 12.3%
  • Quality standard deviation: 25%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded IPs from analysis (whitelisted): 20.190.159.23, 40.126.31.71, 40.126.31.67, 20.190.159.64, 20.190.159.75, 20.190.159.71, 40.126.31.69, 20.190.159.68
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, login.msa.msidentity.com, www.tm.lg.prod.aadmsa.trafficmanager.net
  • Execution Graph export aborted for target elevation_service.exe, PID 11220 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):28
Entropy (8bit):3.678439190827718
Encrypted:false
SSDEEP:3:4A4AnXjzSv:4HAnXjg
MD5:A8F4D690C5BDE96AD275C7D4ABE0E3D3
SHA1:7C62C96EFD2CA4F3C3EBF0B24C9B5B4C04A4570A
SHA-256:596CCC911C1772735AAC6A6B756A76D3D55BCECD006B980CF147090B2243FA7B
SHA-512:A875EBE3C5CDF222FF9D08576F4D996AF827A1C86B3E758CE23F6B33530D512A82CE8E39E519837512080C6212A0A19B3385809BE5F5001C4E488DD79550B852
Malicious:false
Reputation:moderate, very likely benign file
Preview:[SC] CreateService SUCCESS..
Process:C:\Windows\SysWOW64\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):410
Entropy (8bit):3.4446506181384065
Encrypted:false
SSDEEP:6:lg3D/8FQTgVKBRjrvnsn8qLLFmLaZnsHgm66//Vh//mIefq:lgAuTgV0HvGZLQqOVxmIcq
MD5:BD64D2D159C17334BC9F394099E3533D
SHA1:7B79545731CE49037959254E6DEFCBBB70E2980E
SHA-256:08E1366334EA20862F3123AEA10A75BEC11FAD4EBADB1CFB12724CA66E3D0CA2
SHA-512:C5C25616204F7CD31F565F61A0E2C9D57A9A2EB92C66FB77CE63224028E57561B79E33070BC1F9324BA3BF1851C628EE2F2730D1D2798A8A894B326E7FEE67CF
Malicious:false
Preview:..SERVICE_NAME: wZRRZ .. TYPE : 10 WIN32_OWN_PROCESS .. STATE : 4 RUNNING .. (STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN).. WIN32_EXIT_CODE : 0 (0x0).. SERVICE_EXIT_CODE : 0 (0x0).. CHECKPOINT : 0x0.. WAIT_HINT : 0x0.. PID : 11220.. FLAGS : ..
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.516571851319777
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:elevation_service.exe
File size:1'722'136 bytes
MD5:00b82a84331b50fd0c49af2664bb20f1
SHA1:eb4eb12c53c65a39e3503aec761f9999d1e9a5e1
SHA256:0a3ef578ee9e034215f95495566844f15a283bf8a27c112ce4ed2d2949fa38cb
SHA512:65d242b068835db40fed569cd3648525291d3dce39a596dd1a669f405da045d489553e9f41dee1f5a030c1329d4c1780749ac77e9790f3a6eb1d73f7519416c7
SSDEEP:49152:WbKaD0LfC4uq8zk5ZVXIt511WhcjCI7gTg8:KHrD6Gt5Vj8
TLSH:1D857B13F28941E8D06EC1B4874AA132E962BC591B35B6DF0690B36A2F77EE45F3D710
File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....m.c.........."..........T......pp.........@....................................L.....`........................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x1400b7070
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x63976DEC [Mon Dec 12 18:07:40 2022 UTC]
TLS Callbacks:0x4005fdc0, 0x1, 0x40068850, 0x1, 0x400b59c0, 0x1, 0x4005edc0, 0x1
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:803a08f42b07f48508203cc8414cb6f2
Signature Valid:true
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 02/07/2021 01:00:00 11/07/2024 00:59:59
Subject Chain
  • CN=Google LLC, O=Google LLC, L=Mountain View, S=California, C=US
Version:3
Thumbprint MD5:DC429A22AA63D23DB8E84F53D05D1D48
Thumbprint SHA-1:2673EA6CC23BEFFDA49AC715B121544098A1284C
Thumbprint SHA-256:7D3D117664F121E592EF897973EF9C159150E3D736326E9CD2755F71E0FEBC0C
Serial:0E4418E2DEDE36DD2974C3443AFB5CE5
Instruction
dec eax
sub esp, 28h
call 00007F888CD857D0h
dec eax
add esp, 28h
jmp 00007F888CD8563Fh
int3
int3
dec eax
mov dword ptr [esp+20h], ebx
push ebp
dec eax
mov ebp, esp
dec eax
sub esp, 20h
dec eax
mov eax, dword ptr [000CAF90h]
dec eax
mov ebx, 2DDFA232h
cdq
sub eax, dword ptr [eax]
add byte ptr [eax+3Bh], cl
ret
jne 00007F888CD85836h
dec eax
and dword ptr [ebp+18h], 00000000h
dec eax
lea ecx, dword ptr [ebp+18h]
call dword ptr [000BDB02h]
dec eax
mov eax, dword ptr [ebp+18h]
dec eax
mov dword ptr [ebp+10h], eax
call dword ptr [000BDA0Ch]
mov eax, eax
dec eax
xor dword ptr [ebp+10h], eax
call dword ptr [000BD9F0h]
mov eax, eax
dec eax
lea ecx, dword ptr [ebp+20h]
dec eax
xor dword ptr [ebp+10h], eax
call dword ptr [000BDC18h]
mov eax, dword ptr [ebp+20h]
dec eax
lea ecx, dword ptr [ebp+10h]
dec eax
shl eax, 20h
dec eax
xor eax, dword ptr [ebp+20h]
dec eax
xor eax, dword ptr [ebp+10h]
dec eax
xor eax, ecx
dec eax
mov ecx, FFFFFFFFh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x173f480x5a.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x173fa20xf0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b50000x1710.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1a00000xb124.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x1a1e000x2918.pdata
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b70000x1954.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x172e640x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x172d480x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x14d2100x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1748380x7a0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x14bfd60x14c000False0.5062395578407379data6.5637417626753285IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x14d0000x344680x34600False0.4221919749403341data5.6179107276024185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1820000x1d7140xfa00False0.034015625data1.4621814463254232IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x1a00000xb1240xb200False0.5072638693820225data5.995875272028912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.00cfg0x1ac0000x280x200False0.0625data0.4339803984665279IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.gxfg0x1ad0000x29700x2a00False0.42587425595238093data5.198183877306727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.retplne0x1b00000x6c0x200False0.08984375data0.9850533023094143
.tls0x1b10000x1c10x200False0.04296875data0.1364637916558982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.voltbl0x1b20000x460x200False0.158203125data1.1423295645151728
_RDATA0x1b30000xf40x200False0.298828125data2.4312939888528167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
malloc_h0x1b40000xea0x200False0.4375data3.6541214822331987IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x1b50000x17100x1800False0.3981119791666667data4.462261152320793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1b70000x19540x1a00False0.3523137019230769data5.420124655622583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
TYPELIB0x1b51000xdb4dataEnglishUnited States0.3831242873432155
RT_VERSION0x1b5eb80x480dataEnglishUnited States0.4401041666666667
RT_MANIFEST0x1b63380x3d2XML 1.0 document, ASCII text, with very long lines (864)EnglishUnited States0.5398773006134969
DLLImport
ADVAPI32.dllAddAce, CopySid, CreateProcessAsUserW, EventRegister, EventUnregister, EventWrite, GetAclInformation, GetLengthSid, GetSecurityDescriptorControl, GetSecurityDescriptorDacl, GetSecurityDescriptorGroup, GetSecurityDescriptorOwner, GetSecurityDescriptorSacl, GetSidLengthRequired, GetSidSubAuthority, InitializeAcl, InitializeSecurityDescriptor, InitializeSid, IsValidSid, MakeAbsoluteSD, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, RegisterServiceCtrlHandlerW, SetSecurityDescriptorDacl, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, SetServiceStatus, StartServiceCtrlDispatcherW, SystemFunction036
OLEAUT32.dllSysAllocStringByteLen, SysStringByteLen
USER32.dllAllowSetForegroundWindow, GetActiveWindow, UnregisterClassW
KERNEL32.dllAcquireSRWLockExclusive, AcquireSRWLockShared, AssignProcessToJobObject, CloseHandle, CompareStringW, CreateDirectoryW, CreateEventW, CreateFileA, CreateFileMappingW, CreateFileW, CreateProcessW, CreateThread, DecodePointer, DeleteCriticalSection, DeleteFileW, DeleteProcThreadAttributeList, DuplicateHandle, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetDriveTypeW, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileSizeEx, GetFileType, GetFullPathNameW, GetLastError, GetLocalTime, GetLocaleInfoW, GetLogicalProcessorInformation, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOEMCP, GetProcAddress, GetProcessHeap, GetProcessId, GetProductInfo, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetThreadId, GetThreadPriority, GetTickCount, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, GetVersionExW, GetWindowsDirectoryW, HeapAlloc, HeapDestroy, HeapFree, HeapReAlloc, HeapSetInformation, HeapSize, InitOnceExecuteOnce, InitializeConditionVariable, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeProcThreadAttributeList, InitializeSListHead, InitializeSRWLock, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, IsWow64Process, LCMapStringW, LeaveCriticalSection, LoadLibraryExA, LoadLibraryExW, LocalFree, MapViewOfFile, MoveFileExW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, OutputDebugStringW, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, QueryThreadCycleTime, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, ReleaseSRWLockShared, RemoveDirectoryW, ResetEvent, RtlCaptureContext, RtlCaptureStackBackTrace, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetEndOfFile, SetEnvironmentVariableW, SetEvent, SetFileAttributesW, SetFilePointer, SetFilePointerEx, SetFileTime, SetHandleInformation, SetLastError, SetStdHandle, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableSRW, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, TzSpecificLocalTimeToSystemTime, UnhandledExceptionFilter, UnmapViewOfFile, UnregisterWaitEx, UpdateProcThreadAttribute, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForSingleObject, WaitForSingleObjectEx, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile, lstrcmpiW, lstrlenA
ole32.dllCoAddRefServerProcess, CoImpersonateClient, CoInitializeEx, CoInitializeSecurity, CoRegisterClassObject, CoRegisterInitializeSpy, CoReleaseServerProcess, CoResumeClassObjects, CoRevertToSelf, CoRevokeClassObject, CoRevokeInitializeSpy, CoTaskMemFree, CoUninitialize, IIDFromString
CRYPT32.dllCryptProtectData, CryptUnprotectData
RPCRT4.dllI_RpcOpenClientProcess
SHELL32.dllCommandLineToArgvW, SHGetFolderPathW, SHGetKnownFolderPath, ShellExecuteExW
USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock
SHLWAPI.dllPathMatchSpecW
WINMM.dlltimeGetTime
NameOrdinalAddress
GetHandleVerifier10x14004c830
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:05:07:15
Start date:05/07/2023
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd /c sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe" >> C:\servicereg.log 2>&1
Imagebase:0x9a0000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:1
Start time:05:07:15
Start date:05/07/2023
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff652920000
File size:875'008 bytes
MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:2
Start time:05:07:15
Start date:05/07/2023
Path:C:\Windows\SysWOW64\sc.exe
Wow64 process (32bit):true
Commandline:sc create wZRRZ binpath= "C:\Users\user\Desktop\elevation_service.exe"
Imagebase:0x520000
File size:61'440 bytes
MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Target ID:3
Start time:05:07:16
Start date:05/07/2023
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd /c sc start wZRRZ >> C:\servicestart.log 2>&1
Imagebase:0x9a0000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:4
Start time:05:07:16
Start date:05/07/2023
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff652920000
File size:875'008 bytes
MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:5
Start time:05:07:16
Start date:05/07/2023
Path:C:\Windows\SysWOW64\sc.exe
Wow64 process (32bit):true
Commandline:sc start wZRRZ
Imagebase:0x520000
File size:61'440 bytes
MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

Target ID:6
Start time:05:07:16
Start date:05/07/2023
Path:C:\Users\user\Desktop\elevation_service.exe
Wow64 process (32bit):false
Commandline:C:\Users\user\Desktop\elevation_service.exe
Imagebase:0x7ff6172a0000
File size:1'722'136 bytes
MD5 hash:00B82A84331B50FD0C49AF2664BB20F1
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Non-executed Functions

C-Code - Quality: 100%
			E00007FF67FF617357084(long long __rbx, long long _a32) {

				_a32 = __rbx;
			}



0x7ff617357084

APIs
Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
  • String ID:
  • API String ID: 2933794660-0
  • Opcode ID: 43e90d1bb748842540aeb39ecc8a617cc09d1079feca2c5b1342bf84fd3f0dd8
  • Instruction ID: 073ecebd0aa1e801af15d0897b54a1370b1bc53e01091bc805fe11638ab59af9
  • Opcode Fuzzy Hash: 43e90d1bb748842540aeb39ecc8a617cc09d1079feca2c5b1342bf84fd3f0dd8
  • Instruction Fuzzy Hash: 01112A32A08F418AEB10DF64F8552A833A4FB5DB68F451A31EA5D86B95DF3CE1B4C344
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 169d5007a4e51eca8526089c016788fe66a1efd3892f81c36a52d6a5de386cc0
  • Instruction ID: 64715afb7cd438e0b9a99f453ba3cdb09bd8a87276772df53fa412fcd8c37f28
  • Opcode Fuzzy Hash: 169d5007a4e51eca8526089c016788fe66a1efd3892f81c36a52d6a5de386cc0
  • Instruction Fuzzy Hash: 4C326CB6B90A6596DB048F16EA0178D7764F359BD8F898526DF8C83F54EB38E472C300
Uniqueness

Uniqueness Score: -1.00%

C-Code - Quality: 79%
			E00007FF67FF6172A275E(void* __eax, signed int __ecx, void* __eflags, void* __rax) {

				if (__eflags < 0) goto 0x172a2787;
				_t2 = __rax - 0x75;
				 *_t2 =  *(__rax - 0x75) | __ecx &  *(__rax - 0x75);
				if ( *_t2 == 0) goto 0x172a278c;
				asm("adc bl, dh");
				return __eax;
			}



0x7ff6172a2761
0x7ff6172a2763
0x7ff6172a2763
0x7ff6172a2766
0x7ff6172a2768
0x7ff6172a276a

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 0b63a59bd46f44d74feec07330cb66c4a6596ee91dbdb420ddb48ac830f6d868
  • Instruction ID: 0f92553fd16685c9aeb5d9b03594eb5c6401d5ad2be0c975e3f493b6227aa2b8
  • Opcode Fuzzy Hash: 0b63a59bd46f44d74feec07330cb66c4a6596ee91dbdb420ddb48ac830f6d868
  • Instruction Fuzzy Hash: EC328312D08FAA52E6234739D5031B56710EFB7B98F00E717FED8B19A3DF75AA859200
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 1b7633674f7232d67529eeb60fe047a1c9c15b76f84946bdb734799fd101bbff
  • Instruction ID: 4eb542d1e664b3d0975a862f64ea59f5bfd3865083d75979259d381564840647
  • Opcode Fuzzy Hash: 1b7633674f7232d67529eeb60fe047a1c9c15b76f84946bdb734799fd101bbff
  • Instruction Fuzzy Hash: 18F11A12D1CFC583E6254B3996012BA6730FFB9798F11E715EFD922962DF28F2E59200
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: d380521fee7a1ebd6110a4f732cacaaaf19048dc836484462e2281a47f047d38
  • Instruction ID: 1c990b549b5b29c5f7c84108a9ed033bdba2812544881f6ecc10051f466400a6
  • Opcode Fuzzy Hash: d380521fee7a1ebd6110a4f732cacaaaf19048dc836484462e2281a47f047d38
  • Instruction Fuzzy Hash: 21B18C61C0DF8245F7073B350913264D2206FA3AA4F50CB36FDA9B1EB7DFA9B6895120
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 206240b070a8f18d04f3a7bb22e6d580ce9d8d56ce66c1096eab1f7bc1aa5e68
  • Instruction ID: 34aa307c2650843278daefb05adf16c8f0a61eeba6af454a1397740613df5f37
  • Opcode Fuzzy Hash: 206240b070a8f18d04f3a7bb22e6d580ce9d8d56ce66c1096eab1f7bc1aa5e68
  • Instruction Fuzzy Hash: 4641CE2AE2CFD761F31383396403636E2005FF7595A81EB2FBDE4B5C62EB6453426218
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: ef3c0bd79dccf4b915acd6a90ca7f5efba926c63d7852f2c2b15f6ee0e6c3926
  • Instruction ID: 5698a066a130c3a483bdb0f31278ef92fe613a20ef0aa1f7fdfa19f9bcc4cbd5
  • Opcode Fuzzy Hash: ef3c0bd79dccf4b915acd6a90ca7f5efba926c63d7852f2c2b15f6ee0e6c3926
  • Instruction Fuzzy Hash: 1331052AD2DFDB91F723873E6507525D614AFF3285A90E31BFAA835C22FB119741A304
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: ffbfac51568561a3ea02b062807baf878668f5e9efa995e2cdac28f9238f5569
  • Instruction ID: 0b3aa2e4d462d59ec7a11e80e6e2f300caa8a5fea99eb55ba3fbf5b0bb53d61a
  • Opcode Fuzzy Hash: ffbfac51568561a3ea02b062807baf878668f5e9efa995e2cdac28f9238f5569
  • Instruction Fuzzy Hash: 7C315A11D1DF4792F602277C66032BA92206FA1B74F61D332E9ACB6CB3EF1CA5936141
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000006.00000002.761000273.00007FF6172A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6172A0000, based on PE: true
  • Associated: 00000006.00000002.760975344.00007FF6172A0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762384891.00007FF6173ED000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762616449.00007FF617422000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762635475.00007FF617423000.00000008.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762653911.00007FF617424000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617431000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF617435000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762677395.00007FF61743A000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF617440000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762753834.00007FF61744D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762847303.00007FF617453000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762865863.00007FF617454000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000006.00000002.762884906.00007FF617455000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_6_2_7ff6172a0000_elevation_service.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 67308f6e00fae7ea95a400d7a9ec75fb636c76b12d8955447e382391754f696c
  • Instruction ID: dd4697f3c324871e56f054bdd141b54bbdd7d602a8f62c99126949b747978b94
  • Opcode Fuzzy Hash: 67308f6e00fae7ea95a400d7a9ec75fb636c76b12d8955447e382391754f696c
  • Instruction Fuzzy Hash: 6321352AC2DFDB51F713833E6507216D600AFF3685A90E72FFDA834C62EB1587816218
Uniqueness

Uniqueness Score: -1.00%