Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
myidJB8lDL.exe

Overview

General Information

Sample name:myidJB8lDL.exe
renamed because original name is a hash value
Original sample name:b83412ee8e4b5e4b96d43ff7832cac8f.exe
Analysis ID:1363401
MD5:b83412ee8e4b5e4b96d43ff7832cac8f
SHA1:40db2bcf274f0968cc8f9c153fb88b13821af357
SHA256:446cf6ac1de71c4307ec105d6fa09d48b7fd65f788c1be8fcea56ba097a6d818
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Creates autorun.inf (USB autostart)
Disables zone checking for all users
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • myidJB8lDL.exe (PID: 6820 cmdline: C:\Users\user\Desktop\myidJB8lDL.exe MD5: B83412EE8E4B5E4B96D43FF7832CAC8F)
    • server.exe (PID: 3484 cmdline: "C:\Users\user\AppData\Local\Temp\server.exe" MD5: B83412EE8E4B5E4B96D43FF7832CAC8F)
      • netsh.exe (PID: 6184 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 6312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Microsoft Corporation.exe (PID: 6312 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe" MD5: B83412EE8E4B5E4B96D43FF7832CAC8F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "c57556e5735bc2d214eb9a21cf22ff31", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
myidJB8lDL.exeJoeSecurity_NjratYara detected NjratJoe Security
    myidJB8lDL.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x1266a:$a1: get_Registry
    • 0x15167:$a2: SEE_MASK_NOZONECHECKS
    • 0x14e09:$a3: Download ERROR
    • 0x153bd:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13346:$a5: netsh firewall delete allowedprogram "
    myidJB8lDL.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x153bd:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x12ed2:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x14e27:$s3: Executed As
    • 0x1165d:$s5: Stub.exe
    • 0x14e09:$s6: Download ERROR
    • 0x12e94:$s8: Select * From AntiVirusProduct
    myidJB8lDL.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x15167:$reg: SEE_MASK_NOZONECHECKS
    • 0x14ded:$msg: Execute ERROR
    • 0x14e41:$msg: Execute ERROR
    • 0x153bd:$ping: cmd.exe /c ping 0 -n 2 & del
    myidJB8lDL.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x13346:$s1: netsh firewall delete allowedprogram
    • 0x13398:$s2: netsh firewall add allowedprogram
    • 0x153bd:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
    • 0x14ded:$s4: Execute ERROR
    • 0x14e41:$s4: Execute ERROR
    • 0x14e09:$s5: Download ERROR
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x1266a:$a1: get_Registry
      • 0x15167:$a2: SEE_MASK_NOZONECHECKS
      • 0x14e09:$a3: Download ERROR
      • 0x153bd:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13346:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeJoeSecurity_NjratYara detected NjratJoe Security
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
        • 0x153bd:$x1: cmd.exe /c ping 0 -n 2 & del "
        • 0x12ed2:$s1: winmgmts:\\.\root\SecurityCenter2
        • 0x14e27:$s3: Executed As
        • 0x1165d:$s5: Stub.exe
        • 0x14e09:$s6: Download ERROR
        • 0x12e94:$s8: Select * From AntiVirusProduct
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x15167:$reg: SEE_MASK_NOZONECHECKS
        • 0x14ded:$msg: Execute ERROR
        • 0x14e41:$msg: Execute ERROR
        • 0x153bd:$ping: cmd.exe /c ping 0 -n 2 & del
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x1246a:$a1: get_Registry
          • 0x14f67:$a2: SEE_MASK_NOZONECHECKS
          • 0x14c09:$a3: Download ERROR
          • 0x151bd:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x13146:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
          • 0x14f67:$reg: SEE_MASK_NOZONECHECKS
          • 0x14bed:$msg: Execute ERROR
          • 0x14c41:$msg: Execute ERROR
          • 0x151bd:$ping: cmd.exe /c ping 0 -n 2 & del
          00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x1268a:$a1: get_Registry
            • 0x15187:$a2: SEE_MASK_NOZONECHECKS
            • 0x14e29:$a3: Download ERROR
            • 0x153dd:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x13366:$a5: netsh firewall delete allowedprogram "
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.0.myidJB8lDL.exe.dc0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
              0.0.myidJB8lDL.exe.dc0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
              • 0x1266a:$a1: get_Registry
              • 0x15167:$a2: SEE_MASK_NOZONECHECKS
              • 0x14e09:$a3: Download ERROR
              • 0x153bd:$a4: cmd.exe /c ping 0 -n 2 & del "
              • 0x13346:$a5: netsh firewall delete allowedprogram "
              0.0.myidJB8lDL.exe.dc0000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
              • 0x153bd:$x1: cmd.exe /c ping 0 -n 2 & del "
              • 0x12ed2:$s1: winmgmts:\\.\root\SecurityCenter2
              • 0x14e27:$s3: Executed As
              • 0x1165d:$s5: Stub.exe
              • 0x14e09:$s6: Download ERROR
              • 0x12e94:$s8: Select * From AntiVirusProduct
              0.0.myidJB8lDL.exe.dc0000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
              • 0x15167:$reg: SEE_MASK_NOZONECHECKS
              • 0x14ded:$msg: Execute ERROR
              • 0x14e41:$msg: Execute ERROR
              • 0x153bd:$ping: cmd.exe /c ping 0 -n 2 & del
              0.0.myidJB8lDL.exe.dc0000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
              • 0x13346:$s1: netsh firewall delete allowedprogram
              • 0x13398:$s2: netsh firewall add allowedprogram
              • 0x153bd:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
              • 0x14ded:$s4: Execute ERROR
              • 0x14e41:$s4: Execute ERROR
              • 0x14e09:$s5: Download ERROR
              No Sigma rule has matched
              Timestamp:192.168.2.43.69.115.17849736124192814856 12/16/23-14:32:34.069646
              SID:2814856
              Source Port:49736
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849738124192814856 12/16/23-14:33:07.134713
              SID:2814856
              Source Port:49738
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849744124192814856 12/16/23-14:35:56.314002
              SID:2814856
              Source Port:49744
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049742124192033132 12/16/23-14:34:40.325313
              SID:2033132
              Source Port:49742
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049743124192033132 12/16/23-14:35:11.327522
              SID:2033132
              Source Port:49743
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049743124192814860 12/16/23-14:35:13.739948
              SID:2814860
              Source Port:49743
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849744124192033132 12/16/23-14:35:56.072047
              SID:2033132
              Source Port:49744
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849736124192033132 12/16/23-14:32:33.827942
              SID:2033132
              Source Port:49736
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849729124192814856 12/16/23-14:32:00.247681
              SID:2814856
              Source Port:49729
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849738124192825564 12/16/23-14:33:11.248802
              SID:2825564
              Source Port:49738
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849739124192814856 12/16/23-14:33:41.766455
              SID:2814856
              Source Port:49739
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049740124192814856 12/16/23-14:34:16.768267
              SID:2814856
              Source Port:49740
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849729124192825564 12/16/23-14:32:04.581044
              SID:2825564
              Source Port:49729
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849739124192825564 12/16/23-14:33:42.660469
              SID:2825564
              Source Port:49739
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049743124192814856 12/16/23-14:35:11.568835
              SID:2814856
              Source Port:49743
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849729124192033132 12/16/23-14:32:00.007016
              SID:2033132
              Source Port:49729
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849738124192033132 12/16/23-14:33:06.894258
              SID:2033132
              Source Port:49738
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849739124192033132 12/16/23-14:33:41.525416
              SID:2033132
              Source Port:49739
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849738124192814860 12/16/23-14:33:11.248802
              SID:2814860
              Source Port:49738
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049742124192814856 12/16/23-14:34:40.567429
              SID:2814856
              Source Port:49742
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049741124192814856 12/16/23-14:34:36.971005
              SID:2814856
              Source Port:49741
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849729124192814860 12/16/23-14:32:04.581044
              SID:2814860
              Source Port:49729
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049741124192033132 12/16/23-14:34:36.729114
              SID:2033132
              Source Port:49741
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.115.17849739124192814860 12/16/23-14:33:42.660469
              SID:2814860
              Source Port:49739
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049740124192033132 12/16/23-14:34:16.527045
              SID:2033132
              Source Port:49740
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.43.69.157.22049743124192825564 12/16/23-14:35:13.739948
              SID:2825564
              Source Port:49743
              Destination Port:12419
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: myidJB8lDL.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Umbrella.flv.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Local\Temp\server.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "c57556e5735bc2d214eb9a21cf22ff31", "Install Dir": "system", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
              Source: 6.tcp.eu.ngrok.ioVirustotal: Detection: 11%Perma Link
              Source: C:\Umbrella.flv.exeVirustotal: Detection: 81%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\server.exeVirustotal: Detection: 81%Perma Link
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeVirustotal: Detection: 81%Perma Link
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeVirustotal: Detection: 81%Perma Link
              Source: myidJB8lDL.exeVirustotal: Detection: 81%Perma Link
              Source: Yara matchFile source: myidJB8lDL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: myidJB8lDL.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 6312, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJoe Sandbox ML: detected
              Source: C:\Umbrella.flv.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\server.exeJoe Sandbox ML: detected
              Source: myidJB8lDL.exeJoe Sandbox ML: detected
              Source: myidJB8lDL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: myidJB8lDL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Spreading

              barindex
              Source: myidJB8lDL.exe, -.cs.Net Code: @
              Source: server.exe.0.dr, -.cs.Net Code: @
              Source: Microsoft Corporation.exe.1.dr, -.cs.Net Code: @
              Source: c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.dr, -.cs.Net Code: @
              Source: Umbrella.flv.exe.1.dr, -.cs.Net Code: @
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\autorun.infJump to behavior
              Source: myidJB8lDL.exe, 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
              Source: myidJB8lDL.exe, 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
              Source: myidJB8lDL.exe, 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
              Source: myidJB8lDL.exe, 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
              Source: myidJB8lDL.exe, 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
              Source: myidJB8lDL.exe, 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
              Source: myidJB8lDL.exeBinary or memory string: \autorun.inf
              Source: myidJB8lDL.exeBinary or memory string: [autorun]
              Source: myidJB8lDL.exeBinary or memory string: autorun.inf
              Source: autorun.inf.1.drBinary or memory string: [autorun]
              Source: Microsoft Corporation.exe.1.drBinary or memory string: \autorun.inf
              Source: Microsoft Corporation.exe.1.drBinary or memory string: [autorun]
              Source: Microsoft Corporation.exe.1.drBinary or memory string: autorun.inf
              Source: Umbrella.flv.exe.1.drBinary or memory string: \autorun.inf
              Source: Umbrella.flv.exe.1.drBinary or memory string: [autorun]
              Source: Umbrella.flv.exe.1.drBinary or memory string: autorun.inf
              Source: c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.drBinary or memory string: \autorun.inf
              Source: c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.drBinary or memory string: [autorun]
              Source: c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.drBinary or memory string: autorun.inf
              Source: server.exe.0.drBinary or memory string: \autorun.inf
              Source: server.exe.0.drBinary or memory string: [autorun]
              Source: server.exe.0.drBinary or memory string: autorun.inf

              Networking

              barindex
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49729 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49729 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49729 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49729 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49736 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49738 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49738 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49738 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49739 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49739 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49739 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49740 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49741 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49741 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49742 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49742 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49743 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49743 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49743 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49743 -> 3.69.157.220:12419
              Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49744 -> 3.69.115.178:12419
              Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49744 -> 3.69.115.178:12419
              Source: global trafficTCP traffic: 192.168.2.4:49729 -> 3.69.115.178:12419
              Source: global trafficTCP traffic: 192.168.2.4:49740 -> 3.69.157.220:12419
              Source: Joe Sandbox ViewIP Address: 3.69.115.178 3.69.115.178
              Source: Joe Sandbox ViewIP Address: 3.69.157.220 3.69.157.220
              Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
              Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownDNS traffic detected: queries for: 6.tcp.eu.ngrok.io
              Source: C:\Users\user\Desktop\myidJB8lDL.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: myidJB8lDL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: myidJB8lDL.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 6312, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED

              System Summary

              barindex
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\myidJB8lDL.exeCode function: 0_2_055A42980_2_055A4298
              Source: C:\Users\user\Desktop\myidJB8lDL.exeCode function: 0_2_055A427D0_2_055A427D
              Source: myidJB8lDL.exe, 00000000.00000002.1652385743.00000000013FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs myidJB8lDL.exe
              Source: myidJB8lDL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: myidJB8lDL.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Umbrella.flv.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
              Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@7/9@4/2
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\c57556e5735bc2d214eb9a21cf22ff31
              Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6312:120:WilError_03
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
              Source: myidJB8lDL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: myidJB8lDL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\myidJB8lDL.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: myidJB8lDL.exeVirustotal: Detection: 81%
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile read: C:\Users\user\Desktop\myidJB8lDL.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\myidJB8lDL.exe C:\Users\user\Desktop\myidJB8lDL.exe
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe"
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLEJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
              Source: myidJB8lDL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: myidJB8lDL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: myidJB8lDL.exe, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
              Source: server.exe.0.dr, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
              Source: Microsoft Corporation.exe.1.dr, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
              Source: c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.dr, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
              Source: Umbrella.flv.exe.1.dr, -.cs.Net Code: @ System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
              Source: C:\Users\user\Desktop\myidJB8lDL.exeFile created: C:\Users\user\AppData\Local\Temp\server.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Umbrella.flv.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exeJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 1229Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 3049Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 434Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 451Jump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exe TID: 6880Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 7088Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 7152Thread sleep time: -614500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 7152Thread sleep time: -1524500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe TID: 6412Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\myidJB8lDL.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: netsh.exe, 00000002.00000003.1671654790.00000000006C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\myidJB8lDL.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
              Source: myidJB8lDL.exe, Microsoft Corporation.exe.1.dr, Umbrella.flv.exe.1.dr, c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.dr, server.exe.0.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
              Source: Microsoft Corporation.exe, 00000005.00000002.1913543026.0000000004F0B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: dProgram Manager
              Source: myidJB8lDL.exe, 00000000.00000002.1652745855.0000000003371000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033A3000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: myidJB8lDL.exe, Microsoft Corporation.exe.1.dr, Umbrella.flv.exe.1.dr, c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.dr, server.exe.0.drBinary or memory string: Shell_TrayWnd
              Source: myidJB8lDL.exe, Microsoft Corporation.exe.1.dr, Umbrella.flv.exe.1.dr, c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.dr, server.exe.0.drBinary or memory string: ProgMan
              Source: myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033A3000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager\O
              Source: myidJB8lDL.exe, 00000000.00000002.1653006002.000000000574B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: dProgram Managerp
              Source: myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033A3000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/16 | 14:31:52 - Program Manager
              Source: myidJB8lDL.exe, 00000000.00000002.1652745855.0000000003371000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033A3000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ledProgram Manager
              Source: myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033A3000.00000004.00000800.00020000.00000000.sdmp, myidJB8lDL.exe, 00000000.00000002.1652745855.00000000033AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/16 | 14:31:51 - Program Manager
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: myidJB8lDL.exe, -.cs.Net Code: @
              Source: server.exe.0.dr, -.cs.Net Code: @
              Source: Microsoft Corporation.exe.1.dr, -.cs.Net Code: @
              Source: c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe.1.dr, -.cs.Net Code: @
              Source: Umbrella.flv.exe.1.dr, -.cs.Net Code: @
              Source: C:\Users\user\AppData\Local\Temp\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
              Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: myidJB8lDL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: myidJB8lDL.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 6312, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: myidJB8lDL.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.myidJB8lDL.exe.dc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: myidJB8lDL.exe PID: 6820, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 6312, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, type: DROPPED
              Source: Yara matchFile source: C:\Umbrella.flv.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
              21
              Replication Through Removable Media
              Windows Management Instrumentation12
              Registry Run Keys / Startup Folder
              12
              Process Injection
              1
              Masquerading
              OS Credential Dumping11
              Security Software Discovery
              21
              Replication Through Removable Media
              1
              Archive Collected Data
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
              Registry Run Keys / Startup Folder
              41
              Disable or Modify Tools
              LSASS Memory2
              Process Discovery
              Remote Desktop Protocol1
              Clipboard Data
              Exfiltration Over Bluetooth1
              Non-Standard Port
              SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
              Domain AccountsAtLogon Script (Windows)Logon Script (Windows)21
              Virtualization/Sandbox Evasion
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Non-Application Layer Protocol
              Data Encrypted for ImpactDNS ServerEmail Addresses
              Local AccountsCronLogin HookLogin Hook12
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureTraffic Duplication1
              Application Layer Protocol
              Data DestructionVirtual Private ServerEmployee Names
              Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets1
              Peripheral Device Discovery
              SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
              Replication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
              External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              myidJB8lDL.exe82%VirustotalBrowse
              myidJB8lDL.exe100%AviraTR/Dropper.Gen
              myidJB8lDL.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%AviraTR/Dropper.Gen
              C:\Umbrella.flv.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Local\Temp\server.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%Joe Sandbox ML
              C:\Umbrella.flv.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\server.exe100%Joe Sandbox ML
              C:\Umbrella.flv.exe82%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\server.exe82%VirustotalBrowse
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe82%VirustotalBrowse
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe82%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              6.tcp.eu.ngrok.io11%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              6.tcp.eu.ngrok.io
              3.69.115.178
              truetrueunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              3.69.115.178
              6.tcp.eu.ngrok.ioUnited States
              16509AMAZON-02UStrue
              3.69.157.220
              unknownUnited States
              16509AMAZON-02UStrue
              Joe Sandbox version:38.0.0 Ammolite
              Analysis ID:1363401
              Start date and time:2023-12-16 14:31:04 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 50s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:myidJB8lDL.exe
              renamed because original name is a hash value
              Original Sample Name:b83412ee8e4b5e4b96d43ff7832cac8f.exe
              Detection:MAL
              Classification:mal100.spre.phis.troj.adwa.evad.winEXE@7/9@4/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 94%
              • Number of executed functions: 69
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              13:31:58AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe
              13:32:08AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
              14:32:32API Interceptor163260x Sleep call for process: server.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3.69.115.178rkIcS0Y2WY.exeGet hashmaliciousNjratBrowse
                30b4CoDmKk.exeGet hashmaliciousNjratBrowse
                  QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                    xZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                      sCXwkZrcZ3.exeGet hashmaliciousNjratBrowse
                        wiUnP1h5Ex.exeGet hashmaliciousNjratBrowse
                          d09l64ZAW6.exeGet hashmaliciousNjratBrowse
                            8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                              uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                  7U23YeVgmF.exeGet hashmaliciousNjratBrowse
                                    KD9rMPUEBM.exeGet hashmaliciousNjratBrowse
                                      8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                        2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                          64EithtAyN.exeGet hashmaliciousNjratBrowse
                                            QuX5A6qz9G.exeGet hashmaliciousNjratBrowse
                                              TdxWv8SpDq.exeGet hashmaliciousNjratBrowse
                                                OperaSetup.exeGet hashmaliciousQuasarBrowse
                                                  887F546123CD59024356557175BD77FE1144BA5C56D93.exeGet hashmaliciousNjratBrowse
                                                    HR0Hh3FsOH.exeGet hashmaliciousnjRatBrowse
                                                      3.69.157.220QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                                                        xZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                                                          dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                                                            bRxR.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                              X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                                                ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                                                  BqFosj9Wcb.exeGet hashmaliciousNjratBrowse
                                                                    8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                                                      uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                                                        X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                                                          KD9rMPUEBM.exeGet hashmaliciousNjratBrowse
                                                                            2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                                                              64EithtAyN.exeGet hashmaliciousNjratBrowse
                                                                                TdxWv8SpDq.exeGet hashmaliciousNjratBrowse
                                                                                  887F546123CD59024356557175BD77FE1144BA5C56D93.exeGet hashmaliciousNjratBrowse
                                                                                    Android_USB_Jailbreaker.exeGet hashmaliciousNjratBrowse
                                                                                      NNUqIKtjza.exeGet hashmaliciousUnknownBrowse
                                                                                        lOOwpUqlJq.exeGet hashmaliciousnjRatBrowse
                                                                                          gAtrO34ote.exeGet hashmaliciousnjRatBrowse
                                                                                            1VprX52hNY.exeGet hashmaliciousnjRatBrowse
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              6.tcp.eu.ngrok.iorkIcS0Y2WY.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.115.178
                                                                                              30b4CoDmKk.exeGet hashmaliciousNjratBrowse
                                                                                              • 18.197.239.109
                                                                                              N1aqZIb7KG.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.68.171.119
                                                                                              m5l9v13hIi.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.66.38.117
                                                                                              QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.157.220
                                                                                              xZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.157.220
                                                                                              sCXwkZrcZ3.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.68.171.119
                                                                                              dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.157.220
                                                                                              bRxR.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                              • 18.197.239.109
                                                                                              X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.157.220
                                                                                              ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                                                                              • 52.28.247.255
                                                                                              wiUnP1h5Ex.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.115.178
                                                                                              BqFosj9Wcb.exeGet hashmaliciousNjratBrowse
                                                                                              • 52.28.247.255
                                                                                              d09l64ZAW6.exeGet hashmaliciousNjratBrowse
                                                                                              • 52.28.247.255
                                                                                              8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.68.171.119
                                                                                              uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.66.38.117
                                                                                              X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.68.171.119
                                                                                              7U23YeVgmF.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.69.115.178
                                                                                              KD9rMPUEBM.exeGet hashmaliciousNjratBrowse
                                                                                              • 3.68.171.119
                                                                                              8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                                                                              • 52.28.247.255
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              AMAZON-02USarm4-20231216-1307.elfGet hashmaliciousMiraiBrowse
                                                                                              • 157.175.21.160
                                                                                              arm5-20231216-1307.elfGet hashmaliciousMiraiBrowse
                                                                                              • 65.2.197.43
                                                                                              SecuriteInfo.com.FileRepMetagen.14347.4124.exeGet hashmaliciousUnknownBrowse
                                                                                              • 52.216.56.248
                                                                                              x86_64-20231216-1226.elfGet hashmaliciousMiraiBrowse
                                                                                              • 13.250.98.133
                                                                                              SecuriteInfo.com.FileRepMetagen.14347.4124.exeGet hashmaliciousUnknownBrowse
                                                                                              • 52.217.227.136
                                                                                              mips-20231216-1225.elfGet hashmaliciousMiraiBrowse
                                                                                              • 157.175.43.253
                                                                                              arm7-20231216-1225.elfGet hashmaliciousMiraiBrowse
                                                                                              • 35.79.232.156
                                                                                              viXBSh9JRd.exeGet hashmaliciousNjratBrowse
                                                                                              • 35.158.159.254
                                                                                              arm4-20231216-1200.elfGet hashmaliciousMiraiBrowse
                                                                                              • 52.16.84.76
                                                                                              gs0e9zuvJl.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 34.212.247.228
                                                                                              w2WeaYML3S.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 44.239.89.105
                                                                                              Loan+Easy.apkGet hashmaliciousUnknownBrowse
                                                                                              • 13.249.98.120
                                                                                              K9nM2bWboK.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 108.156.83.53
                                                                                              Or0dzqpsOa.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 18.230.90.119
                                                                                              mQ1UfmBFtz.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 108.156.83.53
                                                                                              ZOe53Zwi1a.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 108.156.83.96
                                                                                              4ifWSHuWZo.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 108.156.83.119
                                                                                              vZ3cyoSmwf.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 18.230.90.119
                                                                                              WIbO7w8btd.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 108.156.83.53
                                                                                              FTq09uH032.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 108.156.83.53
                                                                                              AMAZON-02USarm4-20231216-1307.elfGet hashmaliciousMiraiBrowse
                                                                                              • 157.175.21.160
                                                                                              arm5-20231216-1307.elfGet hashmaliciousMiraiBrowse
                                                                                              • 65.2.197.43
                                                                                              SecuriteInfo.com.FileRepMetagen.14347.4124.exeGet hashmaliciousUnknownBrowse
                                                                                              • 52.216.56.248
                                                                                              x86_64-20231216-1226.elfGet hashmaliciousMiraiBrowse
                                                                                              • 13.250.98.133
                                                                                              SecuriteInfo.com.FileRepMetagen.14347.4124.exeGet hashmaliciousUnknownBrowse
                                                                                              • 52.217.227.136
                                                                                              mips-20231216-1225.elfGet hashmaliciousMiraiBrowse
                                                                                              • 157.175.43.253
                                                                                              arm7-20231216-1225.elfGet hashmaliciousMiraiBrowse
                                                                                              • 35.79.232.156
                                                                                              viXBSh9JRd.exeGet hashmaliciousNjratBrowse
                                                                                              • 35.158.159.254
                                                                                              arm4-20231216-1200.elfGet hashmaliciousMiraiBrowse
                                                                                              • 52.16.84.76
                                                                                              gs0e9zuvJl.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 34.212.247.228
                                                                                              w2WeaYML3S.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 44.239.89.105
                                                                                              Loan+Easy.apkGet hashmaliciousUnknownBrowse
                                                                                              • 13.249.98.120
                                                                                              K9nM2bWboK.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 108.156.83.53
                                                                                              Or0dzqpsOa.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 18.230.90.119
                                                                                              mQ1UfmBFtz.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 108.156.83.53
                                                                                              ZOe53Zwi1a.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 108.156.83.96
                                                                                              4ifWSHuWZo.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 108.156.83.119
                                                                                              vZ3cyoSmwf.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 18.230.90.119
                                                                                              WIbO7w8btd.exeGet hashmaliciousSmokeLoaderBrowse
                                                                                              • 108.156.83.53
                                                                                              FTq09uH032.exeGet hashmaliciousRisePro Stealer, SmokeLoader, VidarBrowse
                                                                                              • 108.156.83.53
                                                                                              No context
                                                                                              No context
                                                                                              Process:C:\Users\user\AppData\Local\Temp\server.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):93184
                                                                                              Entropy (8bit):5.549094511461939
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:Sd4XkWOqipj69Qos0n2NDkNskqVR1mpwv:O43qj69QMGqxqVRQw
                                                                                              MD5:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              SHA1:40DB2BCF274F0968CC8F9C153FB88B13821AF357
                                                                                              SHA-256:446CF6AC1DE71C4307EC105D6FA09D48B7FD65F788C1BE8FCEA56BA097A6D818
                                                                                              SHA-512:8E189FF517E5613FB7D211E5B7589572B1C42B7C8B65E11935BA67AA89C7E1FAC7DBFD09EF242801451B49B859377CE706DE96143F1EAC6361E84FC157FE643C
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Umbrella.flv.exe, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Umbrella.flv.exe, Author: unknown
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Umbrella.flv.exe, Author: Florian Roth
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Umbrella.flv.exe, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Umbrella.flv.exe, Author: ditekSHen
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Virustotal, Detection: 82%, Browse
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ixe.................h..........N.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...Tf... ...h.................. ..`.reloc...............j..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                              Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):525
                                                                                              Entropy (8bit):5.259753436570609
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                              MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                              SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                              SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                              SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                              Malicious:false
                                                                                              Reputation:moderate, very likely benign file
                                                                                              Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                              Process:C:\Users\user\Desktop\myidJB8lDL.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):525
                                                                                              Entropy (8bit):5.259753436570609
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                              MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                              SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                              SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                              SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                              Malicious:false
                                                                                              Reputation:moderate, very likely benign file
                                                                                              Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                              Process:C:\Users\user\Desktop\myidJB8lDL.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):93184
                                                                                              Entropy (8bit):5.549094511461939
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:Sd4XkWOqipj69Qos0n2NDkNskqVR1mpwv:O43qj69QMGqxqVRQw
                                                                                              MD5:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              SHA1:40DB2BCF274F0968CC8F9C153FB88B13821AF357
                                                                                              SHA-256:446CF6AC1DE71C4307EC105D6FA09D48B7FD65F788C1BE8FCEA56BA097A6D818
                                                                                              SHA-512:8E189FF517E5613FB7D211E5B7589572B1C42B7C8B65E11935BA67AA89C7E1FAC7DBFD09EF242801451B49B859377CE706DE96143F1EAC6361E84FC157FE643C
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Virustotal, Detection: 82%, Browse
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ixe.................h..........N.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...Tf... ...h.................. ..`.reloc...............j..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                              Process:C:\Users\user\AppData\Local\Temp\server.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):93184
                                                                                              Entropy (8bit):5.549094511461939
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:Sd4XkWOqipj69Qos0n2NDkNskqVR1mpwv:O43qj69QMGqxqVRQw
                                                                                              MD5:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              SHA1:40DB2BCF274F0968CC8F9C153FB88B13821AF357
                                                                                              SHA-256:446CF6AC1DE71C4307EC105D6FA09D48B7FD65F788C1BE8FCEA56BA097A6D818
                                                                                              SHA-512:8E189FF517E5613FB7D211E5B7589572B1C42B7C8B65E11935BA67AA89C7E1FAC7DBFD09EF242801451B49B859377CE706DE96143F1EAC6361E84FC157FE643C
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: unknown
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Florian Roth
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Virustotal, Detection: 82%, Browse
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ixe.................h..........N.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...Tf... ...h.................. ..`.reloc...............j..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                              Process:C:\Users\user\AppData\Local\Temp\server.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):93184
                                                                                              Entropy (8bit):5.549094511461939
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:Sd4XkWOqipj69Qos0n2NDkNskqVR1mpwv:O43qj69QMGqxqVRQw
                                                                                              MD5:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              SHA1:40DB2BCF274F0968CC8F9C153FB88B13821AF357
                                                                                              SHA-256:446CF6AC1DE71C4307EC105D6FA09D48B7FD65F788C1BE8FCEA56BA097A6D818
                                                                                              SHA-512:8E189FF517E5613FB7D211E5B7589572B1C42B7C8B65E11935BA67AA89C7E1FAC7DBFD09EF242801451B49B859377CE706DE96143F1EAC6361E84FC157FE643C
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, Author: unknown
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, Author: Florian Roth
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c57556e5735bc2d214eb9a21cf22ff31Windows Update.exe, Author: ditekSHen
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: Virustotal, Detection: 82%, Browse
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ixe.................h..........N.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...Tf... ...h.................. ..`.reloc...............j..............@..B........................................................0.......H.......................................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                              Process:C:\Users\user\Desktop\myidJB8lDL.exe
                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):5
                                                                                              Entropy (8bit):2.321928094887362
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:1n:1
                                                                                              MD5:02B81B0CBE1FAAA1FA62D5FC876AB443
                                                                                              SHA1:D473CFE21FB1F188689415B0BDD239688F8FDDD9
                                                                                              SHA-256:E7E9E2C247BC872BACCE77661C78F001A17D70EE3130A9016A5818DA9DA00CDB
                                                                                              SHA-512:592AB5B200D4C560951CB70288DC1B7A562F0CBFAEE01CE03076B6934D537B88575C2E1E0FEDCC05DB95E6C224CA739923E7D74F9165E683F3FBAD7BBF641784
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:.16
                                                                                              Process:C:\Users\user\AppData\Local\Temp\server.exe
                                                                                              File Type:Microsoft Windows Autorun file
                                                                                              Category:dropped
                                                                                              Size (bytes):55
                                                                                              Entropy (8bit):4.474554204780528
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:It1KV2PHQCyK0x:e1KAwCyD
                                                                                              MD5:40B1630BE21F39CB17BD1963CAE5A207
                                                                                              SHA1:63C14BD151D42820DD45C033363FA5B9E1D34124
                                                                                              SHA-256:F87E55F1A423B65FD639146F71F6027DBD4D6E69B65D9A17F1744774AA6589E1
                                                                                              SHA-512:833112ED4A9A3C621D2FFFC78F83502B2937B82A2CF9BC692D75D907CE2AA46C2D97CFE23C402DB3292B2DD2655FF8692C3CD00D5BA4D792C3D8AF24958E1926
                                                                                              Malicious:true
                                                                                              Preview:[autorun]..open=C:\Umbrella.flv.exe..shellexecute=C:\..
                                                                                              Process:C:\Windows\SysWOW64\netsh.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):313
                                                                                              Entropy (8bit):4.971939296804078
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                              MD5:689E2126A85BF55121488295EE068FA1
                                                                                              SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                              SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                              SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                              Malicious:false
                                                                                              Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):5.549094511461939
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                              • Windows Screen Saver (13104/52) 0.07%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                              File name:myidJB8lDL.exe
                                                                                              File size:93'184 bytes
                                                                                              MD5:b83412ee8e4b5e4b96d43ff7832cac8f
                                                                                              SHA1:40db2bcf274f0968cc8f9c153fb88b13821af357
                                                                                              SHA256:446cf6ac1de71c4307ec105d6fa09d48b7fd65f788c1be8fcea56ba097a6d818
                                                                                              SHA512:8e189ff517e5613fb7d211e5b7589572b1c42b7c8b65e11935ba67aa89c7e1fac7dbfd09ef242801451b49b859377ce706de96143f1eac6361e84fc157fe643c
                                                                                              SSDEEP:1536:Sd4XkWOqipj69Qos0n2NDkNskqVR1mpwv:O43qj69QMGqxqVRQw
                                                                                              TLSH:2F93D74933E15069E2FE8AF3A971B2404FB9F0471742934D49E179BA1A33AD84F44DBB
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ixe.................h..........N.... ........@.. ....................................@................................
                                                                                              Icon Hash:90cececece8e8eb0
                                                                                              Entrypoint:0x41864e
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x657869AD [Tue Dec 12 14:09:49 2023 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                              Instruction
                                                                                              jmp dword ptr [00402000h]
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x185fc0x4f.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000x166540x16800False0.36357421875data5.581764800393336IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .reloc0x1a0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              DLLImport
                                                                                              mscoree.dll_CorExeMain
                                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                              192.168.2.43.69.115.17849736124192814856 12/16/23-14:32:34.069646TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973612419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849738124192814856 12/16/23-14:33:07.134713TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973812419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849744124192814856 12/16/23-14:35:56.314002TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974412419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.157.22049742124192033132 12/16/23-14:34:40.325313TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974212419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.157.22049743124192033132 12/16/23-14:35:11.327522TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974312419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.157.22049743124192814860 12/16/23-14:35:13.739948TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974312419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.115.17849744124192033132 12/16/23-14:35:56.072047TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974412419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849736124192033132 12/16/23-14:32:33.827942TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973612419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849729124192814856 12/16/23-14:32:00.247681TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849738124192825564 12/16/23-14:33:11.248802TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973812419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849739124192814856 12/16/23-14:33:41.766455TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.157.22049740124192814856 12/16/23-14:34:16.768267TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974012419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.115.17849729124192825564 12/16/23-14:32:04.581044TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849739124192825564 12/16/23-14:33:42.660469TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.157.22049743124192814856 12/16/23-14:35:11.568835TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974312419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.115.17849729124192033132 12/16/23-14:32:00.007016TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849738124192033132 12/16/23-14:33:06.894258TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973812419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849739124192033132 12/16/23-14:33:41.525416TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.115.17849738124192814860 12/16/23-14:33:11.248802TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973812419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.157.22049742124192814856 12/16/23-14:34:40.567429TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974212419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.157.22049741124192814856 12/16/23-14:34:36.971005TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974112419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.115.17849729124192814860 12/16/23-14:32:04.581044TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.157.22049741124192033132 12/16/23-14:34:36.729114TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974112419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.115.17849739124192814860 12/16/23-14:33:42.660469TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973912419192.168.2.43.69.115.178
                                                                                              192.168.2.43.69.157.22049740124192033132 12/16/23-14:34:16.527045TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974012419192.168.2.43.69.157.220
                                                                                              192.168.2.43.69.157.22049743124192825564 12/16/23-14:35:13.739948TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974312419192.168.2.43.69.157.220
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 16, 2023 14:31:59.035231113 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:31:59.275862932 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:31:59.275995016 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:00.007015944 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:00.247627020 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:00.247680902 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:00.488594055 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:04.581043959 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:04.822370052 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:20.026465893 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:20.026551008 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:31.558994055 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:31.559171915 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:33.582874060 CET4972912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:33.584408998 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:33.823575974 CET12419497293.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:33.826924086 CET12419497363.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:33.827033997 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:33.827941895 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:34.069569111 CET12419497363.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:34.069645882 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:32:34.311275005 CET12419497363.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:49.314373970 CET12419497363.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:32:49.314538956 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:04.417042971 CET12419497363.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:04.566236019 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:06.119353056 CET12419497363.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:06.119787931 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:06.487353086 CET4973612419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:06.652798891 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:06.893275023 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:06.893388033 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:06.894258022 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:07.134310007 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:07.134712934 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:07.375221968 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:11.248801947 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:11.488835096 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:26.591304064 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:26.591372967 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:39.211601973 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:39.211679935 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:41.269531012 CET4973812419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:41.283359051 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:41.509959936 CET12419497383.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:41.524477005 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:41.524585962 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:41.525415897 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:41.766379118 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:41.766454935 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:42.007452965 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:42.660469055 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:33:42.901652098 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:57.915380955 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:33:57.915451050 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:34:13.158987045 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:34:13.159055948 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:34:13.836472988 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:34:13.836541891 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:34:15.882673979 CET4973912419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:34:16.123564959 CET12419497393.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:34:16.284879923 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:16.525989056 CET12419497403.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:16.526078939 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:16.527045012 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:16.768194914 CET12419497403.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:16.768266916 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:17.009557962 CET12419497403.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:32.010734081 CET12419497403.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:32.010790110 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:34.417634010 CET12419497403.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:34.566462994 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:36.429744005 CET4974012419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:36.486466885 CET4974112419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:36.728203058 CET12419497413.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:36.728286028 CET4974112419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:36.729114056 CET4974112419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:36.970912933 CET12419497413.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:36.971004963 CET4974112419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:37.212752104 CET12419497413.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:37.719657898 CET12419497413.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:37.719733000 CET4974112419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:39.747711897 CET4974112419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:39.989487886 CET12419497413.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:40.082439899 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:40.324565887 CET12419497423.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:40.324650049 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:40.325313091 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:40.567329884 CET12419497423.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:40.567429066 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:34:40.809442043 CET12419497423.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:55.811029911 CET12419497423.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:34:55.811111927 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:09.019859076 CET12419497423.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:09.020138025 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:11.059429884 CET4974212419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:11.085500002 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:11.301548004 CET12419497423.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:11.326488018 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:11.326592922 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:11.327522039 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:11.568744898 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:11.568835020 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:11.809950113 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:13.739948034 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:13.980770111 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:29.226701975 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:29.226794004 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:43.617218971 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:43.617324114 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:45.629297018 CET4974312419192.168.2.43.69.157.220
                                                                                              Dec 16, 2023 14:35:45.870225906 CET12419497433.69.157.220192.168.2.4
                                                                                              Dec 16, 2023 14:35:55.828751087 CET4974412419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:35:56.070957899 CET12419497443.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:35:56.071086884 CET4974412419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:35:56.072046995 CET4974412419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:35:56.313889980 CET12419497443.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:35:56.314002037 CET4974412419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:35:56.555645943 CET12419497443.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:36:04.427779913 CET12419497443.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:36:04.473119020 CET4974412419192.168.2.43.69.115.178
                                                                                              Dec 16, 2023 14:36:16.980392933 CET12419497443.69.115.178192.168.2.4
                                                                                              Dec 16, 2023 14:36:16.980572939 CET4974412419192.168.2.43.69.115.178
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 16, 2023 14:31:58.778795958 CET6363253192.168.2.41.1.1.1
                                                                                              Dec 16, 2023 14:31:59.012172937 CET53636321.1.1.1192.168.2.4
                                                                                              Dec 16, 2023 14:33:06.488557100 CET6257953192.168.2.41.1.1.1
                                                                                              Dec 16, 2023 14:33:06.631305933 CET53625791.1.1.1192.168.2.4
                                                                                              Dec 16, 2023 14:34:15.883997917 CET5133053192.168.2.41.1.1.1
                                                                                              Dec 16, 2023 14:34:16.010274887 CET53513301.1.1.1192.168.2.4
                                                                                              Dec 16, 2023 14:35:49.703478098 CET5901953192.168.2.41.1.1.1
                                                                                              Dec 16, 2023 14:35:49.844868898 CET53590191.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Dec 16, 2023 14:31:58.778795958 CET192.168.2.41.1.1.10xb3bStandard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                              Dec 16, 2023 14:33:06.488557100 CET192.168.2.41.1.1.10x9213Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                              Dec 16, 2023 14:34:15.883997917 CET192.168.2.41.1.1.10x7f52Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                              Dec 16, 2023 14:35:49.703478098 CET192.168.2.41.1.1.10x9304Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Dec 16, 2023 14:31:59.012172937 CET1.1.1.1192.168.2.40xb3bNo error (0)6.tcp.eu.ngrok.io3.69.115.178A (IP address)IN (0x0001)false
                                                                                              Dec 16, 2023 14:33:06.631305933 CET1.1.1.1192.168.2.40x9213No error (0)6.tcp.eu.ngrok.io3.69.115.178A (IP address)IN (0x0001)false
                                                                                              Dec 16, 2023 14:34:16.010274887 CET1.1.1.1192.168.2.40x7f52No error (0)6.tcp.eu.ngrok.io3.69.157.220A (IP address)IN (0x0001)false
                                                                                              Dec 16, 2023 14:35:49.844868898 CET1.1.1.1192.168.2.40x9304No error (0)6.tcp.eu.ngrok.io3.69.115.178A (IP address)IN (0x0001)false

                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:14:31:51
                                                                                              Start date:16/12/2023
                                                                                              Path:C:\Users\user\Desktop\myidJB8lDL.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Users\user\Desktop\myidJB8lDL.exe
                                                                                              Imagebase:0xdc0000
                                                                                              File size:93'184 bytes
                                                                                              MD5 hash:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1632581383.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1652805753.0000000004378000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:14:31:52
                                                                                              Start date:16/12/2023
                                                                                              Path:C:\Users\user\AppData\Local\Temp\server.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Local\Temp\server.exe"
                                                                                              Imagebase:0x980000
                                                                                              File size:93'184 bytes
                                                                                              MD5 hash:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 82%, Virustotal, Browse
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:2
                                                                                              Start time:14:31:54
                                                                                              Start date:16/12/2023
                                                                                              Path:C:\Windows\SysWOW64\netsh.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
                                                                                              Imagebase:0x1560000
                                                                                              File size:82'432 bytes
                                                                                              MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:moderate
                                                                                              Has exited:true

                                                                                              Target ID:3
                                                                                              Start time:14:31:54
                                                                                              Start date:16/12/2023
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:5
                                                                                              Start time:14:32:16
                                                                                              Start date:16/12/2023
                                                                                              Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
                                                                                              Imagebase:0x4e0000
                                                                                              File size:93'184 bytes
                                                                                              MD5 hash:B83412EE8E4B5E4B96D43FF7832CAC8F
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: unknown
                                                                                              • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: Florian Roth
                                                                                              • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: JPCERT/CC Incident Response Group
                                                                                              • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe, Author: ditekSHen
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 82%, Virustotal, Browse
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:10.6%
                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:58
                                                                                                Total number of Limit Nodes:4
                                                                                                execution_graph 2651 13ea65e 2652 13ea68a OleInitialize 2651->2652 2653 13ea6c0 2651->2653 2654 13ea698 2652->2654 2653->2652 2655 13eabbe 2656 13eabea FindCloseChangeNotification 2655->2656 2657 13eac29 2655->2657 2658 13eabf8 2656->2658 2657->2656 2706 13ea61e 2707 13ea65e OleInitialize 2706->2707 2709 13ea698 2707->2709 2690 13ea9bf 2691 13ea9c9 SetErrorMode 2690->2691 2693 13eaa53 2691->2693 2710 13eab7c 2711 13eabbe FindCloseChangeNotification 2710->2711 2713 13eabf8 2711->2713 2659 13ea59a 2660 13ea5d8 DuplicateHandle 2659->2660 2661 13ea610 2659->2661 2662 13ea5e6 2660->2662 2661->2660 2694 13eb036 2696 13eb06a CreateMutexW 2694->2696 2697 13eb0e5 2696->2697 2698 13eac37 2699 13eac6a GetFileType 2698->2699 2701 13eaccc 2699->2701 2714 13eae77 2715 13eaeae WriteFile 2714->2715 2717 13eaf15 2715->2717 2718 13eaa75 2720 13eaaa6 CreateFileW 2718->2720 2721 13eab2d 2720->2721 2663 13eaa12 2664 13eaa3e SetErrorMode 2663->2664 2665 13eaa67 2663->2665 2666 13eaa53 2664->2666 2665->2664 2722 13ea573 2723 13ea59a DuplicateHandle 2722->2723 2725 13ea5e6 2723->2725 2670 13eaeae 2672 13eaee3 WriteFile 2670->2672 2673 13eaf15 2672->2673 2726 13ea6ce 2727 13ea72e OleGetClipboard 2726->2727 2729 13ea78c 2727->2729 2678 13eb06a 2679 13eb0a2 CreateMutexW 2678->2679 2681 13eb0e5 2679->2681 2682 13eb446 2683 13eb46c ShellExecuteExW 2682->2683 2685 13eb488 2683->2685 2686 13eaaa6 2687 13eaade CreateFileW 2686->2687 2689 13eab2d 2687->2689 2702 13eb424 2705 13eb446 ShellExecuteExW 2702->2705 2704 13eb488 2705->2704

                                                                                                Callgraph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                • Opacity -> Relevance
                                                                                                • Disassembly available
                                                                                                callgraph 0 Function_055A0958 101 Function_055A00B8 0->101 1 Function_013E213C 2 Function_013C003E 3 Function_013EA23A 4 Function_013EB236 5 Function_013EA836 6 Function_013EB036 7 Function_013EAC37 8 Function_013C0736 9 Function_013EB134 10 Function_013E2430 11 Function_013EA02E 12 Function_013EA72E 13 Function_013EB424 14 Function_055A0947 15 Function_013EA61E 16 Function_055A717B 17 Function_055A4278 82 Function_055A36F0 17->82 18 Function_013E201C 19 Function_055A0879 29 Function_013C0606 19->29 100 Function_013C05E0 19->100 20 Function_055A427D 20->17 41 Function_055A4210 20->41 21 Function_055A0076 22 Function_013C0710 23 Function_013EAA12 24 Function_013EB411 25 Function_013EA20C 26 Function_055A4269 27 Function_013EA50A 28 Function_013EB306 30 Function_013EA005 31 Function_013C0000 32 Function_055A0118 32->29 33 Function_055A3B18 32->33 47 Function_055A3815 32->47 32->100 103 Function_055A39BF 32->103 33->20 33->29 92 Function_055A4298 33->92 33->100 34 Function_013E247C 35 Function_013EAB7C 36 Function_013C067F 37 Function_013EA078 38 Function_013E2676 39 Function_013C0074 40 Function_013EAE77 42 Function_013EB374 43 Function_013EAA75 44 Function_013EB172 45 Function_013EA472 46 Function_013EA573 47->20 47->29 47->92 47->100 48 Function_013C026D 49 Function_013EB06A 50 Function_013EAC6A 51 Function_013C066A 52 Function_055A3802 53 Function_055A4200 54 Function_013E2264 55 Function_013E2364 56 Function_013EA865 57 Function_055A0006 58 Function_013EA65E 59 Function_055A4238 60 Function_013E2458 61 Function_013EAF57 62 Function_013EAD52 63 Function_055A0928 64 Function_013EA44A 65 Function_013C0649 65->51 66 Function_013EB446 67 Function_013EA140 68 Function_013EABBE 69 Function_013EA0BE 70 Function_013EA9BF 71 Function_013E23BC 72 Function_013C05BF 73 Function_055A36DF 74 Function_013EA2B0 75 Function_013EA7B0 76 Function_013EAEAE 77 Function_013EA3A8 78 Function_013EAAA6 79 Function_013EB39E 80 Function_013EA59A 81 Function_013E2098 83 Function_013E2194 84 Function_013EAF92 85 Function_055A0AEA 86 Function_055A2CEE 87 Function_013EA186 88 Function_055A01E2 89 Function_013EA384 90 Function_055A37E1 91 Function_013EA2FE 92->17 92->41 93 Function_013EB4FA 94 Function_013EACF8 95 Function_013E23F4 96 Function_013E21F0 97 Function_013EADEE 98 Function_013EB1E6 99 Function_013EB2E4 101->3 101->25 101->29 101->33 101->47 101->100 101->103 102 Function_013EB2DC 103->20 103->29 103->92 103->100 104 Function_013EA4D8 105 Function_013EA2D2 106 Function_013E20D0 107 Function_013EA7D1 108 Function_013EA6CE 109 Function_055A36A8 109->29 109->100 110 Function_055A00A8 110->3 110->25 110->29 110->33 110->47 110->100 110->103 111 Function_013EADCC 112 Function_013C05CF 113 Function_013EA3CA 114 Function_013EB4C7

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 55a4298-55a42c9 4 55a42cf-55a4350 0->4 5 55a4352-55a435a 0->5 4->5 32 55a435c 4->32 6 55a4366-55a437a 5->6 7 55a452f-55a467d 6->7 8 55a4380-55a43bc 6->8 45 55a480d-55a4821 7->45 46 55a4683-55a47d2 7->46 20 55a43be-55a43e6 8->20 21 55a43ed-55a44ea 8->21 20->21 142 55a44ef 21->142 32->6 48 55a496f-55a4983 45->48 49 55a4827-55a4934 45->49 46->45 52 55a49d6-55a49ea 48->52 53 55a4985-55a499b call 55a4210 48->53 49->48 55 55a49ec-55a49f7 52->55 56 55a4a32-55a4a46 52->56 53->52 55->56 58 55a4a4c-55a4b59 56->58 59 55a4b94-55a4ba8 56->59 58->59 64 55a4bae-55a4bc2 59->64 65 55a4cd4-55a4ce8 59->65 69 55a4bd0-55a4be4 64->69 70 55a4bc4-55a4bcb 64->70 73 55a4cee-55a4f2d 65->73 74 55a4f74-55a4f88 65->74 77 55a4bef-55a4c03 69->77 78 55a4be6-55a4bed 69->78 76 55a4c48-55a4c5c 70->76 73->74 79 55a4f8a-55a4f9b 74->79 80 55a4fe2-55a4ff6 74->80 84 55a4c5e-55a4c74 76->84 85 55a4c76-55a4c82 76->85 87 55a4c0e-55a4c22 77->87 88 55a4c05-55a4c0c 77->88 78->76 79->80 82 55a4ff8-55a4ffe 80->82 83 55a5045-55a5059 80->83 82->83 92 55a505b 83->92 93 55a50a2-55a50b6 83->93 91 55a4c8d 84->91 85->91 95 55a4c2d-55a4c41 87->95 96 55a4c24-55a4c2b 87->96 88->76 91->65 92->93 99 55a50b8-55a50e1 93->99 100 55a512d-55a5141 93->100 95->76 101 55a4c43-55a4c45 95->101 96->76 99->100 107 55a5147-55a5363 100->107 108 55a53b4-55a53c8 100->108 101->76 490 55a5367 107->490 491 55a5365 107->491 115 55a549e-55a54b2 108->115 116 55a53ce-55a5457 108->116 120 55a54b8-55a5628 115->120 121 55a566f-55a5683 115->121 116->115 120->121 126 55a5689-55a579f 121->126 127 55a57e6-55a57fa 121->127 126->127 134 55a595d-55a5971 127->134 135 55a5800-55a5916 127->135 138 55a5977-55a5a8d 134->138 139 55a5ad4-55a5ae8 134->139 135->134 138->139 145 55a5c4b-55a5c5f 139->145 146 55a5aee-55a5c04 139->146 142->7 152 55a5dc2-55a5dd6 145->152 153 55a5c65-55a5d7b 145->153 146->145 159 55a5f39-55a5f4d 152->159 160 55a5ddc-55a5ef2 152->160 153->152 172 55a5f53-55a6069 159->172 173 55a60b0-55a60c4 159->173 160->159 172->173 181 55a60ca-55a61e0 173->181 182 55a6227-55a623b 173->182 181->182 190 55a639e-55a63b2 182->190 191 55a6241-55a6357 182->191 198 55a63b8-55a63fd call 55a4278 190->198 199 55a6536-55a654a 190->199 191->190 323 55a64bd-55a64df 198->323 204 55a668d-55a66a1 199->204 205 55a6550-55a656f 199->205 216 55a67ee-55a6802 204->216 217 55a66a7-55a67a7 204->217 238 55a6614-55a6636 205->238 224 55a6808-55a6908 216->224 225 55a694f-55a6963 216->225 217->216 224->225 242 55a6969-55a6a69 225->242 243 55a6ab0-55a6ada 225->243 249 55a663c 238->249 250 55a6574-55a6583 238->250 242->243 264 55a6b9a-55a6bae 243->264 265 55a6ae0-55a6b53 243->265 249->204 261 55a6589-55a65bc 250->261 262 55a663e 250->262 354 55a65be-55a65f8 261->354 355 55a6603-55a660c 261->355 294 55a6643-55a668b 262->294 279 55a6c8b-55a6c9f 264->279 280 55a6bb4-55a6c44 264->280 265->264 285 55a6de5-55a6df9 279->285 286 55a6ca5-55a6d9e 279->286 280->279 299 55a6dff-55a6e4f 285->299 300 55a705c-55a7070 285->300 286->285 294->204 419 55a6ebd-55a6ee8 299->419 420 55a6e51-55a6e77 299->420 307 55a7158-55a715f 300->307 308 55a7076-55a7111 call 55a4278 * 2 300->308 308->307 336 55a6402-55a6411 323->336 337 55a64e5 323->337 348 55a64e7 336->348 349 55a6417-55a64b5 336->349 337->199 383 55a64ec-55a6534 348->383 349->383 492 55a64b7 349->492 354->355 355->294 366 55a660e 355->366 366->238 383->199 496 55a6eee-55a6fc1 419->496 497 55a6fc6-55a7057 419->497 493 55a6eb8 420->493 494 55a6e79-55a6e99 420->494 501 55a536d 490->501 491->501 492->323 493->300 494->493 496->300 497->300 501->108
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :@k$:@k$:@k$:@k$:@k$:@k$@
                                                                                                • API String ID: 0-4108611281
                                                                                                • Opcode ID: 2a7ab0504f6b71af3838ede61d02cad9029b71a3404b891703091381ab4d0269
                                                                                                • Instruction ID: c41662686067b298fede999af66dd099c96843f87c4107fc7725b03d56b1a442
                                                                                                • Opcode Fuzzy Hash: 2a7ab0504f6b71af3838ede61d02cad9029b71a3404b891703091381ab4d0269
                                                                                                • Instruction Fuzzy Hash: 1D234875A01228CFDB25DF64D894BADB7B6FB48304F1041E9D949A73A0DB39AE81CF50
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 557 55a427d-55a4288 558 55a428a-55a4290 557->558 559 55a42b1-55a42c2 557->559 560 55a4292-55a42af 558->560 561 55a42c4-55a42c9 558->561 559->561 560->559 564 55a42cf-55a4350 561->564 565 55a4352-55a435a 561->565 564->565 592 55a435c 564->592 566 55a4366-55a437a 565->566 567 55a452f-55a467d 566->567 568 55a4380-55a43bc 566->568 605 55a480d-55a4821 567->605 606 55a4683-55a47d2 567->606 580 55a43be-55a43e6 568->580 581 55a43ed-55a44ea 568->581 580->581 702 55a44ef 581->702 592->566 608 55a496f-55a4983 605->608 609 55a4827-55a4934 605->609 606->605 612 55a49d6-55a49ea 608->612 613 55a4985-55a499b call 55a4210 608->613 609->608 615 55a49ec-55a49f7 612->615 616 55a4a32-55a4a46 612->616 613->612 615->616 618 55a4a4c-55a4b59 616->618 619 55a4b94-55a4ba8 616->619 618->619 624 55a4bae-55a4bc2 619->624 625 55a4cd4-55a4ce8 619->625 629 55a4bd0-55a4be4 624->629 630 55a4bc4-55a4bcb 624->630 633 55a4cee-55a4f2d 625->633 634 55a4f74-55a4f88 625->634 637 55a4bef-55a4c03 629->637 638 55a4be6-55a4bed 629->638 636 55a4c48-55a4c5c 630->636 633->634 639 55a4f8a-55a4f9b 634->639 640 55a4fe2-55a4ff6 634->640 644 55a4c5e-55a4c74 636->644 645 55a4c76-55a4c82 636->645 647 55a4c0e-55a4c22 637->647 648 55a4c05-55a4c0c 637->648 638->636 639->640 642 55a4ff8-55a4ffe 640->642 643 55a5045-55a5059 640->643 642->643 652 55a505b 643->652 653 55a50a2-55a50b6 643->653 651 55a4c8d 644->651 645->651 655 55a4c2d-55a4c41 647->655 656 55a4c24-55a4c2b 647->656 648->636 651->625 652->653 659 55a50b8-55a50e1 653->659 660 55a512d-55a5141 653->660 655->636 661 55a4c43-55a4c45 655->661 656->636 659->660 667 55a5147-55a5363 660->667 668 55a53b4-55a53c8 660->668 661->636 1050 55a5367 667->1050 1051 55a5365 667->1051 675 55a549e-55a54b2 668->675 676 55a53ce-55a5457 668->676 680 55a54b8-55a5628 675->680 681 55a566f-55a5683 675->681 676->675 680->681 686 55a5689-55a579f 681->686 687 55a57e6-55a57fa 681->687 686->687 694 55a595d-55a5971 687->694 695 55a5800-55a5916 687->695 698 55a5977-55a5a8d 694->698 699 55a5ad4-55a5ae8 694->699 695->694 698->699 705 55a5c4b-55a5c5f 699->705 706 55a5aee-55a5c04 699->706 702->567 712 55a5dc2-55a5dd6 705->712 713 55a5c65-55a5d7b 705->713 706->705 719 55a5f39-55a5f4d 712->719 720 55a5ddc-55a5ef2 712->720 713->712 732 55a5f53-55a6069 719->732 733 55a60b0-55a60c4 719->733 720->719 732->733 741 55a60ca-55a61e0 733->741 742 55a6227-55a623b 733->742 741->742 750 55a639e-55a63b2 742->750 751 55a6241-55a6357 742->751 758 55a63b8-55a63fd call 55a4278 750->758 759 55a6536-55a654a 750->759 751->750 883 55a64bd-55a64df 758->883 764 55a668d-55a66a1 759->764 765 55a6550-55a656f 759->765 776 55a67ee-55a6802 764->776 777 55a66a7-55a67a7 764->777 798 55a6614-55a6636 765->798 784 55a6808-55a6908 776->784 785 55a694f-55a6963 776->785 777->776 784->785 802 55a6969-55a6a69 785->802 803 55a6ab0-55a6ada 785->803 809 55a663c 798->809 810 55a6574-55a6583 798->810 802->803 824 55a6b9a-55a6bae 803->824 825 55a6ae0-55a6b53 803->825 809->764 821 55a6589-55a65bc 810->821 822 55a663e 810->822 914 55a65be-55a65f8 821->914 915 55a6603-55a660c 821->915 854 55a6643-55a668b 822->854 839 55a6c8b-55a6c9f 824->839 840 55a6bb4-55a6c44 824->840 825->824 845 55a6de5-55a6df9 839->845 846 55a6ca5-55a6d9e 839->846 840->839 859 55a6dff-55a6e4f 845->859 860 55a705c-55a7070 845->860 846->845 854->764 979 55a6ebd-55a6ee8 859->979 980 55a6e51-55a6e77 859->980 867 55a7158-55a715f 860->867 868 55a7076-55a7111 call 55a4278 * 2 860->868 868->867 896 55a6402-55a6411 883->896 897 55a64e5 883->897 908 55a64e7 896->908 909 55a6417-55a64b5 896->909 897->759 943 55a64ec-55a6534 908->943 909->943 1052 55a64b7 909->1052 914->915 915->854 926 55a660e 915->926 926->798 943->759 1056 55a6eee-55a6fc1 979->1056 1057 55a6fc6-55a7057 979->1057 1053 55a6eb8 980->1053 1054 55a6e79-55a6e99 980->1054 1061 55a536d 1050->1061 1051->1061 1052->883 1053->860 1054->1053 1056->860 1057->860 1061->668
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $:@k$:@k$:@k$:@k$:@k$:@k
                                                                                                • API String ID: 0-3720531893
                                                                                                • Opcode ID: 0c10406d31ae061ef168173bfe7892e231e12f17db0a00b8767c62fb75190faa
                                                                                                • Instruction ID: 4e15d530184d5814a62b5e13a12bced813751abc9860a5450de8bef533f13939
                                                                                                • Opcode Fuzzy Hash: 0c10406d31ae061ef168173bfe7892e231e12f17db0a00b8767c62fb75190faa
                                                                                                • Instruction Fuzzy Hash: E9135775A01228CFDB25DF64D894BADB7B6FB48304F1041E9D949A73A0DB39AE81CF50
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1117 13eaa75-13eaafe 1121 13eab03-13eab0f 1117->1121 1122 13eab00 1117->1122 1123 13eab14-13eab1d 1121->1123 1124 13eab11 1121->1124 1122->1121 1125 13eab6e-13eab73 1123->1125 1126 13eab1f-13eab43 CreateFileW 1123->1126 1124->1123 1125->1126 1129 13eab75-13eab7a 1126->1129 1130 13eab45-13eab6b 1126->1130 1129->1130
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 013EAB25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 5e9ecc6485740bb6eb0f8b84e007b89179f37c0f09c5aaf0901a19183365679c
                                                                                                • Instruction ID: 8b4b8084529810513d7420b9b76722c116d88a2d44a0ee68fd7c0c7280f070ce
                                                                                                • Opcode Fuzzy Hash: 5e9ecc6485740bb6eb0f8b84e007b89179f37c0f09c5aaf0901a19183365679c
                                                                                                • Instruction Fuzzy Hash: 87318271509340AFEB22CF65CC85F56BFF8EF05214F08899AE9458B692D365E848CB61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1133 13eb036-13eb0b9 1137 13eb0be-13eb0c7 1133->1137 1138 13eb0bb 1133->1138 1139 13eb0cc-13eb0d5 1137->1139 1140 13eb0c9 1137->1140 1138->1137 1141 13eb126-13eb12b 1139->1141 1142 13eb0d7-13eb0fb CreateMutexW 1139->1142 1140->1139 1141->1142 1145 13eb12d-13eb132 1142->1145 1146 13eb0fd-13eb123 1142->1146 1145->1146
                                                                                                APIs
                                                                                                • CreateMutexW.KERNELBASE(?,?), ref: 013EB0DD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateMutex
                                                                                                • String ID:
                                                                                                • API String ID: 1964310414-0
                                                                                                • Opcode ID: 901fcc0cdec9adcc6cdb77db1cda8733bafa76a5c75386e195cbace65c5b6c65
                                                                                                • Instruction ID: 5b8358b520db4175bc241ce1ff98b0f8331163234f6b0976a29e540b28c41266
                                                                                                • Opcode Fuzzy Hash: 901fcc0cdec9adcc6cdb77db1cda8733bafa76a5c75386e195cbace65c5b6c65
                                                                                                • Instruction Fuzzy Hash: 7B31B3B15093805FE712CB65DC85B96FFF8EF06214F08849AE984CB293D375E909CB62
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1149 13ea6ce-13ea72b 1150 13ea72e-13ea786 OleGetClipboard 1149->1150 1152 13ea78c-13ea7a2 1150->1152
                                                                                                APIs
                                                                                                • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 013EA77E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard
                                                                                                • String ID:
                                                                                                • API String ID: 220874293-0
                                                                                                • Opcode ID: 0d0646bbf205bbb9cc6201b98c66923ff6995f13a07e0d4eb92ca227d113ba05
                                                                                                • Instruction ID: 98b8f8970ac75c6e263d29789ff47df8bf990491e12ee1e9bbedc4bc26ff829f
                                                                                                • Opcode Fuzzy Hash: 0d0646bbf205bbb9cc6201b98c66923ff6995f13a07e0d4eb92ca227d113ba05
                                                                                                • Instruction Fuzzy Hash: A8316D7104E3C06FD3138B259C61B61BFB4EF87614F0A80CBE884CB6A3D2296919D772
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1153 13eae77-13eaf05 1157 13eaf49-13eaf4e 1153->1157 1158 13eaf07-13eaf27 WriteFile 1153->1158 1157->1158 1161 13eaf29-13eaf46 1158->1161 1162 13eaf50-13eaf55 1158->1162 1162->1161
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,00000E24,F47A4BD8,00000000,00000000,00000000,00000000), ref: 013EAF0D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: 17ace3fa2fa23e7442ccd0dfa3bbd6481e66ba4593daf31951d40e3c1df6704f
                                                                                                • Instruction ID: 16f05e3eb10e06877d0b812939a8026394b8247145b5c5b3503d27a7acb81709
                                                                                                • Opcode Fuzzy Hash: 17ace3fa2fa23e7442ccd0dfa3bbd6481e66ba4593daf31951d40e3c1df6704f
                                                                                                • Instruction Fuzzy Hash: DD21D6B1409380AFDB22CF51DD44F96BFB8EF46314F0984DAE9449B593D224A50DCB71
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1165 13eaaa6-13eaafe 1168 13eab03-13eab0f 1165->1168 1169 13eab00 1165->1169 1170 13eab14-13eab1d 1168->1170 1171 13eab11 1168->1171 1169->1168 1172 13eab6e-13eab73 1170->1172 1173 13eab1f-13eab27 CreateFileW 1170->1173 1171->1170 1172->1173 1175 13eab2d-13eab43 1173->1175 1176 13eab75-13eab7a 1175->1176 1177 13eab45-13eab6b 1175->1177 1176->1177
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 013EAB25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: cda7cd9fd0625ae2f57046cd695111f5bc5011ff0a5fd9f9ef3c016afb2fc2bf
                                                                                                • Instruction ID: e3d6c011c43ae8bd9a37d3b2a001ed5c0778042d056b2c28f442a7fa47333052
                                                                                                • Opcode Fuzzy Hash: cda7cd9fd0625ae2f57046cd695111f5bc5011ff0a5fd9f9ef3c016afb2fc2bf
                                                                                                • Instruction Fuzzy Hash: 70218171604304AFEB21CF65CD45B66FBE8EF04224F048969E9458BB91D375E408CB71
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1180 13ea9bf-13eaa3c 1185 13eaa3e-13eaa51 SetErrorMode 1180->1185 1186 13eaa67-13eaa6c 1180->1186 1187 13eaa6e-13eaa73 1185->1187 1188 13eaa53-13eaa66 1185->1188 1186->1185 1187->1188
                                                                                                APIs
                                                                                                • SetErrorMode.KERNELBASE(?), ref: 013EAA44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode
                                                                                                • String ID:
                                                                                                • API String ID: 2340568224-0
                                                                                                • Opcode ID: 1d8b847df6d28c0722feef01b94e2f21459a8d583bd5cf3531ea38af1055a242
                                                                                                • Instruction ID: 8b754cb5924cdb41b8e4ff6909e7e10c529191d46dcee2f2a814bb5d083e1c9c
                                                                                                • Opcode Fuzzy Hash: 1d8b847df6d28c0722feef01b94e2f21459a8d583bd5cf3531ea38af1055a242
                                                                                                • Instruction Fuzzy Hash: A1214A6544E3C49FDB138B258C64A51BFB4AF53624F0E80DBD8848F5A3C1689809CB72
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1191 13eac37-13eacb5 1195 13eacea-13eacef 1191->1195 1196 13eacb7-13eacca GetFileType 1191->1196 1195->1196 1197 13eaccc-13eace9 1196->1197 1198 13eacf1-13eacf6 1196->1198 1198->1197
                                                                                                APIs
                                                                                                • GetFileType.KERNELBASE(?,00000E24,F47A4BD8,00000000,00000000,00000000,00000000), ref: 013EACBD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileType
                                                                                                • String ID:
                                                                                                • API String ID: 3081899298-0
                                                                                                • Opcode ID: ed87744ecf0667567e0a283a03b3987391dc870749b86bb100a54469f189858e
                                                                                                • Instruction ID: 2d8b2b2cbd72f3dacb7af2c3cb73e8633b87edf804d28a965ae9a185fbf4e457
                                                                                                • Opcode Fuzzy Hash: ed87744ecf0667567e0a283a03b3987391dc870749b86bb100a54469f189858e
                                                                                                • Instruction Fuzzy Hash: FB21D5B54093806FE7128B55DC44BA2BFB8EF47324F0880DAE9848B693D264A94DC771
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1202 13eb06a-13eb0b9 1205 13eb0be-13eb0c7 1202->1205 1206 13eb0bb 1202->1206 1207 13eb0cc-13eb0d5 1205->1207 1208 13eb0c9 1205->1208 1206->1205 1209 13eb126-13eb12b 1207->1209 1210 13eb0d7-13eb0df CreateMutexW 1207->1210 1208->1207 1209->1210 1212 13eb0e5-13eb0fb 1210->1212 1213 13eb12d-13eb132 1212->1213 1214 13eb0fd-13eb123 1212->1214 1213->1214
                                                                                                APIs
                                                                                                • CreateMutexW.KERNELBASE(?,?), ref: 013EB0DD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateMutex
                                                                                                • String ID:
                                                                                                • API String ID: 1964310414-0
                                                                                                • Opcode ID: 8b6abff93871e01ecaa49d9c7977a286154914981a0481ce37cd1614467ee943
                                                                                                • Instruction ID: 92d59abdb102ee00eafcadfe2d2c9f10840f5a7de6ecfe00d66e83d341ca8674
                                                                                                • Opcode Fuzzy Hash: 8b6abff93871e01ecaa49d9c7977a286154914981a0481ce37cd1614467ee943
                                                                                                • Instruction Fuzzy Hash: B021D4716043049FEB21CF65DD85BA6FBE8EF04224F08846AE948CB785D375E808CB72
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1217 13eab7c-13eabe8 1219 13eabea-13eabf2 FindCloseChangeNotification 1217->1219 1220 13eac29-13eac2e 1217->1220 1221 13eabf8-13eac0a 1219->1221 1220->1219 1223 13eac0c-13eac28 1221->1223 1224 13eac30-13eac35 1221->1224 1224->1223
                                                                                                APIs
                                                                                                • FindCloseChangeNotification.KERNELBASE(?), ref: 013EABF0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChangeCloseFindNotification
                                                                                                • String ID:
                                                                                                • API String ID: 2591292051-0
                                                                                                • Opcode ID: 575511c3fb53da90e303344b2c3c9bf9d322c0159dd4b8a1eee4b009ff21a238
                                                                                                • Instruction ID: 6bafd16b396c0c191fa0b7ea1f4ec6c089a9eeb8e3468733d12e4836c7933912
                                                                                                • Opcode Fuzzy Hash: 575511c3fb53da90e303344b2c3c9bf9d322c0159dd4b8a1eee4b009ff21a238
                                                                                                • Instruction Fuzzy Hash: 7B21F3B550A7C09FDB138B25DC95752BFB8EF07220F0984DBDC858F6A3D2649908CB62
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1226 13ea61e-13ea688 1228 13ea68a-13ea692 OleInitialize 1226->1228 1229 13ea6c0-13ea6c5 1226->1229 1231 13ea698-13ea6aa 1228->1231 1229->1228 1232 13ea6ac-13ea6bf 1231->1232 1233 13ea6c7-13ea6cc 1231->1233 1233->1232
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: ee69b15558aea0ab7a139f1916e6eee56c055053768c164853a13d1efe8def9e
                                                                                                • Instruction ID: a5d422cb26475de09183a7420fa482972a02794638cbb9d09607f2204b689948
                                                                                                • Opcode Fuzzy Hash: ee69b15558aea0ab7a139f1916e6eee56c055053768c164853a13d1efe8def9e
                                                                                                • Instruction Fuzzy Hash: 5321587140E3C05FDB138B259C94B52BFB4EF47224F0984DBD8848F2A3D2699908CBB2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1235 13ea573-13ea5d6 1237 13ea5d8-13ea5e0 DuplicateHandle 1235->1237 1238 13ea610-13ea615 1235->1238 1240 13ea5e6-13ea5f8 1237->1240 1238->1237 1241 13ea5fa-13ea60d 1240->1241 1242 13ea617-13ea61c 1240->1242 1242->1241
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013EA5DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 145ad662d75c3cf8b95fddba622c6648de96afee5c07f4daf31ced68ab84dc07
                                                                                                • Instruction ID: 787b29bf8c1b9c08377f335e69b53da8a091541dab8cf63adb50991e46fd7b50
                                                                                                • Opcode Fuzzy Hash: 145ad662d75c3cf8b95fddba622c6648de96afee5c07f4daf31ced68ab84dc07
                                                                                                • Instruction Fuzzy Hash: CE118471449780AFDB228F55DC44B62FFF4EF4A320F0888DAED858B563C275A518DB61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1244 13eaeae-13eaf05 1247 13eaf49-13eaf4e 1244->1247 1248 13eaf07-13eaf0f WriteFile 1244->1248 1247->1248 1249 13eaf15-13eaf27 1248->1249 1251 13eaf29-13eaf46 1249->1251 1252 13eaf50-13eaf55 1249->1252 1252->1251
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,00000E24,F47A4BD8,00000000,00000000,00000000,00000000), ref: 013EAF0D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: 4ede84a9fb8bbea200d40f02dccb6b2382197f4bb93fa29f83461365a0bd8a0b
                                                                                                • Instruction ID: 8f3cc3bc061c50243807fd185e79ed895c6075cb9952e867db33ab2b1a2fdd18
                                                                                                • Opcode Fuzzy Hash: 4ede84a9fb8bbea200d40f02dccb6b2382197f4bb93fa29f83461365a0bd8a0b
                                                                                                • Instruction Fuzzy Hash: 5011C471504304AFEB21CF55DC84FA6FBE8EF44324F04845AE9459BA91C375E54D8BB1
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1255 13eb424-13eb46a 1257 13eb46f-13eb478 1255->1257 1258 13eb46c 1255->1258 1259 13eb47a-13eb49a ShellExecuteExW 1257->1259 1260 13eb4b9-13eb4be 1257->1260 1258->1257 1263 13eb49c-13eb4b8 1259->1263 1264 13eb4c0-13eb4c5 1259->1264 1260->1259 1264->1263
                                                                                                APIs
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 013EB480
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExecuteShell
                                                                                                • String ID:
                                                                                                • API String ID: 587946157-0
                                                                                                • Opcode ID: 925a5d21172f6328b6a3e455614b553dd222fa712e4116b8ad605340a831e2cb
                                                                                                • Instruction ID: 47adf69940d819f44a97e25901a022964c697057b9f3c8f437feabf4c29f26fd
                                                                                                • Opcode Fuzzy Hash: 925a5d21172f6328b6a3e455614b553dd222fa712e4116b8ad605340a831e2cb
                                                                                                • Instruction Fuzzy Hash: 591190715093849FDB12CF25DC84B52BFF8EF46224F0884EAED85CB296D274E908CB61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • GetFileType.KERNELBASE(?,00000E24,F47A4BD8,00000000,00000000,00000000,00000000), ref: 013EACBD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileType
                                                                                                • String ID:
                                                                                                • API String ID: 3081899298-0
                                                                                                • Opcode ID: ba0712c5b870ea05024efb698f1d22512bce7bab94a2e2d731731b2c341cc7c8
                                                                                                • Instruction ID: 08fe27a028a6a10eb8e2fcdc075d8d50e62d75b0ee73304d4b2719bbe57df7e2
                                                                                                • Opcode Fuzzy Hash: ba0712c5b870ea05024efb698f1d22512bce7bab94a2e2d731731b2c341cc7c8
                                                                                                • Instruction Fuzzy Hash: C001C071504304AFEB208B46DD89BA6FBECDF55728F18C096ED049BB81D774E4488AA1
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 013EB480
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExecuteShell
                                                                                                • String ID:
                                                                                                • API String ID: 587946157-0
                                                                                                • Opcode ID: 638cb7b16166839baf983adad12c2483d19999be8ae685d04a72adaf43494aa2
                                                                                                • Instruction ID: 09bc5c3bf842f4fbd5f23f43b338c8594f3d504f790a630b504e1e72232f4102
                                                                                                • Opcode Fuzzy Hash: 638cb7b16166839baf983adad12c2483d19999be8ae685d04a72adaf43494aa2
                                                                                                • Instruction Fuzzy Hash: 200192716043048FEB11CF5AD889766FBD8EF05224F08C4AADD49DB79AD278E408CF61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013EA5DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: fac4bc93b54986e383c7da89522843123b34d9547cee0b5ec367c71196f5a6c2
                                                                                                • Instruction ID: e483eeadb809aa8d73ca8c7ce6798ab7fbcb8194adae8709271cae6e0d8a7ac1
                                                                                                • Opcode Fuzzy Hash: fac4bc93b54986e383c7da89522843123b34d9547cee0b5ec367c71196f5a6c2
                                                                                                • Instruction Fuzzy Hash: B6016D72500700DFDB218F95D844B62FFE4EF59324F08899ADE894BA96C376E418DF62
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • FindCloseChangeNotification.KERNELBASE(?), ref: 013EABF0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChangeCloseFindNotification
                                                                                                • String ID:
                                                                                                • API String ID: 2591292051-0
                                                                                                • Opcode ID: 497851f8ebee78f5c3a7deaa0af5c62b4b3b2957ca6153b6c73908f3530e918b
                                                                                                • Instruction ID: 2dcb6d8cd85b9d8a7e4edc9ec5ff654c94c79f6f2be2ea076666f79251120f4d
                                                                                                • Opcode Fuzzy Hash: 497851f8ebee78f5c3a7deaa0af5c62b4b3b2957ca6153b6c73908f3530e918b
                                                                                                • Instruction Fuzzy Hash: E301D4715043048FDF108F56D889765FBD8DF04224F08C4AADC05CB796D275E418CA61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 013EA77E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard
                                                                                                • String ID:
                                                                                                • API String ID: 220874293-0
                                                                                                • Opcode ID: b54711ea84d27700c06820e81d5037f4a1a0419c6fd9dc384f02649383d698e9
                                                                                                • Instruction ID: 8364075c083c6be518a796a8433448ef50a1c3e3cde7d4c253572ee71145ef9b
                                                                                                • Opcode Fuzzy Hash: b54711ea84d27700c06820e81d5037f4a1a0419c6fd9dc384f02649383d698e9
                                                                                                • Instruction Fuzzy Hash: C301A271500600ABD310DF16CD46B66FBE8FB88A20F14815AEC089BB41D731F959CBE5
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: d45b5d070d7c53aefcf8d494be3cb613eaa8f8a69c007730841347ee7e598a5a
                                                                                                • Instruction ID: 6c284e7401f66d41412b11a59af898d89ef71566a806ab8f1c62aefef50aa364
                                                                                                • Opcode Fuzzy Hash: d45b5d070d7c53aefcf8d494be3cb613eaa8f8a69c007730841347ee7e598a5a
                                                                                                • Instruction Fuzzy Hash: 7901AD719043448FDB10CF56D888766FBE8EF55324F08C4AADD488F796D279E408CEA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • SetErrorMode.KERNELBASE(?), ref: 013EAA44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652374693.00000000013EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 013EA000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13ea000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode
                                                                                                • String ID:
                                                                                                • API String ID: 2340568224-0
                                                                                                • Opcode ID: 1188cedfffeb0cf2365bb82bebbec5b66b77af6204e677acbe26e06df2c0c40b
                                                                                                • Instruction ID: 776fd688ad79487d7f7e32e6045422428de1883d66f8f1fa897c29d595f0f9b2
                                                                                                • Opcode Fuzzy Hash: 1188cedfffeb0cf2365bb82bebbec5b66b77af6204e677acbe26e06df2c0c40b
                                                                                                • Instruction Fuzzy Hash: 07F0FF31800344CFEB208F06D988B61FBE4EF54328F08C09ADD090BB92C279E408CEA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :@k
                                                                                                • API String ID: 0-2277858631
                                                                                                • Opcode ID: 7d6e440e91279c651690ec356cbbb3c056c16da61bb8d4c6f4893973211ec53e
                                                                                                • Instruction ID: 94266718051ae838b3574d412049c42c6a00855f7463a9586cfe77b6f7863e8e
                                                                                                • Opcode Fuzzy Hash: 7d6e440e91279c651690ec356cbbb3c056c16da61bb8d4c6f4893973211ec53e
                                                                                                • Instruction Fuzzy Hash: F831B031B002119FDB14ABB9C8157BF72ABFBD8308F50402AD505977A4EF3DAD168B91
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 779fd7d5f0230d270af6ee28e094c6f144cd1d65a8c052025fa5c7aefa4666a6
                                                                                                • Instruction ID: 7ce748224c8ea1ebce9da4d6c39ac0296762b23ea17c198434e7579098053e33
                                                                                                • Opcode Fuzzy Hash: 779fd7d5f0230d270af6ee28e094c6f144cd1d65a8c052025fa5c7aefa4666a6
                                                                                                • Instruction Fuzzy Hash: 9B22E371A00218CFDB24DFB4C855BADB7B2FB89308F1045A9D549AB3A4DB799E85CF40
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0cfe146bb5bf7f1cdcc0833394c8f36a7cb3bf6d73cff4aa8c18b3996141f7b2
                                                                                                • Instruction ID: df398f3c408460860ebfa1916f7c813d6c483a266709e95bd3c22d588bad50f7
                                                                                                • Opcode Fuzzy Hash: 0cfe146bb5bf7f1cdcc0833394c8f36a7cb3bf6d73cff4aa8c18b3996141f7b2
                                                                                                • Instruction Fuzzy Hash: 4F816731A00258CFDB24DBB4C855BEDB7B2BF89308F5045A9D00AAB3A4DB799D85CF51
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 63b1a512535091c3b7d28104f058afe4eb1798d2b117baa045c5a672dc7392af
                                                                                                • Instruction ID: de27b832f1addc5018b001a64e52d297ad4c959a556e9fe0a4222440a1e38cd7
                                                                                                • Opcode Fuzzy Hash: 63b1a512535091c3b7d28104f058afe4eb1798d2b117baa045c5a672dc7392af
                                                                                                • Instruction Fuzzy Hash: 9A414631A00258CFDB14DBB5C855BEDB7B2BF88308F5045AAD009AB390DB789E84CF61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cff11e96e016305cd27278a2342826998d6c3de5412d7692f6b600eb45e9321b
                                                                                                • Instruction ID: 3642dcabe1052fd880e9cafd70d44e0313e75297b7995d011131aaa686178001
                                                                                                • Opcode Fuzzy Hash: cff11e96e016305cd27278a2342826998d6c3de5412d7692f6b600eb45e9321b
                                                                                                • Instruction Fuzzy Hash: DF3135327443005FD718D7B69862BAE7BABABC6208F1495AAD040CF7C0DF39AC0587A1
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 37ba6ac3c14c24af2bec5aa4b20e33ce99ec44d880063d9330f02c93e1d1ecfa
                                                                                                • Instruction ID: f711f12a71f0db32ef8427fc83d2ff690994b6befd937f16a95cb5ff74cc9097
                                                                                                • Opcode Fuzzy Hash: 37ba6ac3c14c24af2bec5aa4b20e33ce99ec44d880063d9330f02c93e1d1ecfa
                                                                                                • Instruction Fuzzy Hash: 7C11E5367401105BC328D7BAA4627BA77CF9BD620CB54596DD041CBB80CF79EC0987A2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652342165.00000000013C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13c0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3476629abf8278b40944ff5887dd04fa124074cc6642e417f5ba049351356a47
                                                                                                • Instruction ID: ebd95266db9be2530f289a0cba5cdf6ed144d897f7186f6dfda92a422c6a16e6
                                                                                                • Opcode Fuzzy Hash: 3476629abf8278b40944ff5887dd04fa124074cc6642e417f5ba049351356a47
                                                                                                • Instruction Fuzzy Hash: EC0186B55097806FD7118F16AC41863FFB8EB86620709C59FEC498B652D239A818CBA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6a6b3d19c4c75f01d135c08cbabb1991d3b3880bd4c2e50b7b348f1e375e5e62
                                                                                                • Instruction ID: adb60e3000920bf27672db15d5f50f031a075029b5c41cac708c3f2324aea4ee
                                                                                                • Opcode Fuzzy Hash: 6a6b3d19c4c75f01d135c08cbabb1991d3b3880bd4c2e50b7b348f1e375e5e62
                                                                                                • Instruction Fuzzy Hash: 3D019235A41202CBCB40EB79D55956E77E5EB98308F90A81CE0598B794EF74EC05CB42
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9f9c945fb940b1d1a27a7bc4072eaf989ecc96a20b500a420ff18ba11febb647
                                                                                                • Instruction ID: 1046afc093f1cfb609ec5f5b2539013efe171b8aaa2bc1b4c401984d89a5d871
                                                                                                • Opcode Fuzzy Hash: 9f9c945fb940b1d1a27a7bc4072eaf989ecc96a20b500a420ff18ba11febb647
                                                                                                • Instruction Fuzzy Hash: 30F0F632A403046BEB04DA70CC62BAF7B66EF81724F1081AAA5409F2C1DA3568408790
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652342165.00000000013C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13c0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c67e27317edfdfd243ed27350b91bfc563120911c40d1de09e841ecfa0206395
                                                                                                • Instruction ID: 0ff30a6775e13694d32ae7542e0cf25f931cd8d52bb0427bbc1bd2c84c224f9b
                                                                                                • Opcode Fuzzy Hash: c67e27317edfdfd243ed27350b91bfc563120911c40d1de09e841ecfa0206395
                                                                                                • Instruction Fuzzy Hash: 34E092B66046005B9750CF0BEC41452F7D8EB84631718C47FDC0D8BB11D236B508CEA5
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2b875c3eefd9b96812cb0a4105547abbbb1fe6b29da2821256813ad41a95510c
                                                                                                • Instruction ID: 98f2925063a56655f6de15dc83f9f42f3912306787d6b7916ecdfee4259f6f16
                                                                                                • Opcode Fuzzy Hash: 2b875c3eefd9b96812cb0a4105547abbbb1fe6b29da2821256813ad41a95510c
                                                                                                • Instruction Fuzzy Hash: 7AD01732142314DBCB186638D42AADA336DAF8634DB8018B8D4565A765FA3AE881CA90
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652363778.00000000013E2000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E2000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13e2000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a17e674f502fe5ef4d83840b5170993096e33d7830677694ea030d119087d996
                                                                                                • Instruction ID: 71e56bc0ad11bc2d97c5eab24b70f8328e9c7bd4334d666c6e2cb6c00489e9bb
                                                                                                • Opcode Fuzzy Hash: a17e674f502fe5ef4d83840b5170993096e33d7830677694ea030d119087d996
                                                                                                • Instruction Fuzzy Hash: B3D05E79205BD14FE3169B1CC1A8B963BE8AB61718F4A44F9A8009B7A3C768E5C1DA00
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652363778.00000000013E2000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E2000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_13e2000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bb9b194895b9949b356abf542d1ef58449c09161786a3327679ab123b48d9f98
                                                                                                • Instruction ID: d0c2473503bdd75672b96b27bf02bc8081d07201c5aad73a2b8c982de28a67db
                                                                                                • Opcode Fuzzy Hash: bb9b194895b9949b356abf542d1ef58449c09161786a3327679ab123b48d9f98
                                                                                                • Instruction Fuzzy Hash: 02D05E342007818BD715DA0CC6D8F5A3BD8AB50B18F1A44E8AC108B7A2C7A4E8C0CE00
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1652948808.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_55a0000_myidJB8lDL.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 76a1882c0d9e3a3cad9fbe225d657e425fae2db9a8f4169f9e20a62e26d8ebd0
                                                                                                • Instruction ID: b039bf99a4d97b80285cd36c77aa984af15e5cf4a6beb6d841c8fd7012ec9b2d
                                                                                                • Opcode Fuzzy Hash: 76a1882c0d9e3a3cad9fbe225d657e425fae2db9a8f4169f9e20a62e26d8ebd0
                                                                                                • Instruction Fuzzy Hash: 63C012308411419EC711D726E5847917754A77E70CFC456C8D0800AB44C3BC685ACBE0
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Execution Graph

                                                                                                Execution Coverage:12.8%
                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:52
                                                                                                Total number of Limit Nodes:4
                                                                                                execution_graph 1755 99a59a 1756 99a5d8 DuplicateHandle 1755->1756 1757 99a610 1755->1757 1758 99a5e6 1756->1758 1757->1756 1810 99ab7c 1811 99abbe FindCloseChangeNotification 1810->1811 1813 99abf8 1811->1813 1794 99a9bf 1795 99a9c9 SetErrorMode 1794->1795 1797 99aa53 1795->1797 1759 99abbe 1760 99abea FindCloseChangeNotification 1759->1760 1762 99ac29 1759->1762 1761 99abf8 1760->1761 1762->1760 1763 99a65e 1764 99a68a OleInitialize 1763->1764 1765 99a6c0 1763->1765 1766 99a698 1764->1766 1765->1764 1790 99a61e 1791 99a65e OleInitialize 1790->1791 1793 99a698 1791->1793 1814 99a573 1816 99a59a DuplicateHandle 1814->1816 1817 99a5e6 1816->1817 1767 99aa12 1768 99aa3e SetErrorMode 1767->1768 1769 99aa67 1767->1769 1770 99aa53 1768->1770 1769->1768 1818 99aa75 1820 99aaa6 CreateFileW 1818->1820 1821 99ab2d 1820->1821 1798 99ac37 1799 99ac6a GetFileType 1798->1799 1801 99accc 1799->1801 1822 99af76 1823 99afaa CreateMutexW 1822->1823 1825 99b025 1823->1825 1771 99afaa 1773 99afe2 CreateMutexW 1771->1773 1774 99b025 1773->1774 1779 99adee 1780 99ae23 WriteFile 1779->1780 1782 99ae55 1780->1782 1802 99a6ce 1803 99a72e OleGetClipboard 1802->1803 1805 99a78c 1803->1805 1806 99adce 1807 99adee WriteFile 1806->1807 1809 99ae55 1807->1809 1786 99aaa6 1788 99aade CreateFileW 1786->1788 1789 99ab2d 1788->1789

                                                                                                Callgraph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                • Opacity -> Relevance
                                                                                                • Disassembly available
                                                                                                callgraph 0 Function_00992098 1 Function_0099A59A 2 Function_00EA00EC 3 Function_00E901E1 4 Function_00EA05E0 3->4 15 Function_00EA05CF 3->15 42 Function_00EA05BF 3->42 104 Function_00EA0606 3->104 5 Function_00E904E2 6 Function_00992194 7 Function_0099AE97 8 Function_00E937F9 9 Function_00E93CF9 10 Function_00E941F8 11 Function_00992682 12 Function_0099A384 13 Function_0099A186 14 Function_00EA00C9 16 Function_009923BC 17 Function_0099A9BF 18 Function_0099ABBE 19 Function_0099A0BE 20 Function_00E902C0 40 Function_00E900B8 20->40 21 Function_00E93FC0 22 Function_0099A2B0 23 Function_0099A7B0 24 Function_0099B0B2 25 Function_00EA00C1 26 Function_00E93DC4 27 Function_009922B4 28 Function_0099A3A8 29 Function_0099AFAA 30 Function_0099AAA6 31 Function_00E900A8 31->4 31->8 31->15 31->42 46 Function_00E939B7 31->46 66 Function_0099A20C 31->66 73 Function_0099A23A 31->73 31->104 111 Function_00E93B10 31->111 32 Function_0099A4D8 33 Function_00EA00A9 34 Function_00EA04A9 35 Function_0099A7D1 36 Function_009920D0 37 Function_0099AED2 38 Function_0099A2D2 39 Function_00EA04A1 40->4 40->8 40->15 40->42 40->46 40->66 40->73 40->104 40->111 41 Function_0099A3CA 43 Function_0099A6CE 44 Function_0099ADCE 45 Function_00E902B1 45->40 47 Function_0099ACF8 48 Function_009925FA 49 Function_0099A2FE 50 Function_009921F0 51 Function_009923F4 52 Function_00EA009B 53 Function_0099ADEE 54 Function_00E90290 55 Function_00EA066A 56 Function_0099A61E 57 Function_00EA026D 58 Function_00E93160 59 Function_00E90060 60 Function_00992310 61 Function_0099AA12 62 Function_00E94278 82 Function_00E93058 62->82 63 Function_00EA077B 64 Function_0099A50A 65 Function_00EA067F 67 Function_00E9007F 68 Function_0099A005 69 Function_00EA0074 70 Function_00992006 71 Function_00E90449 72 Function_00EA0648 72->55 74 Function_0099213C 75 Function_00E93141 76 Function_00EA0042 77 Function_00992430 78 Function_00EA0740 79 Function_00E93047 80 Function_00E94147 81 Function_0099AC37 83 Function_00E9265D 84 Function_0099A72E 85 Function_0099A02E 86 Function_00E93C5E 87 Function_00992458 88 Function_0099A65E 89 Function_0099AD52 90 Function_00EA0024 91 Function_0099A44A 92 Function_00E9003C 93 Function_00E94230 94 Function_0099A140 95 Function_00992044 96 Function_00E94208 97 Function_0099A078 98 Function_0099AB7C 99 Function_0099247C 100 Function_00EA000C 101 Function_0099A573 102 Function_0099A472 103 Function_00EA0001 105 Function_0099AA75 106 Function_0099B074 107 Function_0099AF76 108 Function_00E90118 108->4 108->8 108->15 108->42 108->46 108->104 108->111 109 Function_0099AC6A 110 Function_00E93010 110->4 110->15 110->42 110->104 112 Function_00EA0710 113 Function_0099A865 114 Function_00992264 115 Function_00992364

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 99aa75-99aafe 4 99ab00 0->4 5 99ab03-99ab0f 0->5 4->5 6 99ab11 5->6 7 99ab14-99ab1d 5->7 6->7 8 99ab1f-99ab43 CreateFileW 7->8 9 99ab6e-99ab73 7->9 12 99ab75-99ab7a 8->12 13 99ab45-99ab6b 8->13 9->8 12->13
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0099AB25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 9d669635038585f74d949dcdf7b8a262a00f05b93b006bfb5046e64a8ddd38ca
                                                                                                • Instruction ID: 72a6dd1624c747e1437c14bd32d96c305fe3cfeaa758b02abfc709d930e10cbb
                                                                                                • Opcode Fuzzy Hash: 9d669635038585f74d949dcdf7b8a262a00f05b93b006bfb5046e64a8ddd38ca
                                                                                                • Instruction Fuzzy Hash: A6318071508380AFEB21CF65CC85F56BBF8EF05324F08849EE9858B652D365E848CB62
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 16 99af76-99aff9 20 99affb 16->20 21 99affe-99b007 16->21 20->21 22 99b009 21->22 23 99b00c-99b015 21->23 22->23 24 99b017-99b03b CreateMutexW 23->24 25 99b066-99b06b 23->25 28 99b06d-99b072 24->28 29 99b03d-99b063 24->29 25->24 28->29
                                                                                                APIs
                                                                                                • CreateMutexW.KERNELBASE(?,?), ref: 0099B01D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateMutex
                                                                                                • String ID:
                                                                                                • API String ID: 1964310414-0
                                                                                                • Opcode ID: 3ff5970c764ebe2bc6d8d3f796e7ee67398f915529446c0dc2d3dcddc374fa17
                                                                                                • Instruction ID: dd155b1c6b253bc5d36f9ab94badd6c94506a57e2d5da1985eb93777d0485ab1
                                                                                                • Opcode Fuzzy Hash: 3ff5970c764ebe2bc6d8d3f796e7ee67398f915529446c0dc2d3dcddc374fa17
                                                                                                • Instruction Fuzzy Hash: 6231A1B15093805FE711CB65DD45F96BFF8EF06310F08849AE984CB292D365E909C762
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 32 99a6ce-99a72b 33 99a72e-99a786 OleGetClipboard 32->33 35 99a78c-99a7a2 33->35
                                                                                                APIs
                                                                                                • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0099A77E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard
                                                                                                • String ID:
                                                                                                • API String ID: 220874293-0
                                                                                                • Opcode ID: d2dafafd4605f118fbf698dba4ef064f71dd770a4ea81aeb27b153ab4c018bde
                                                                                                • Instruction ID: 2ce72222ca78de2d2704b28e09b2c71028fc64b8d4a7f92782473135686b8f9b
                                                                                                • Opcode Fuzzy Hash: d2dafafd4605f118fbf698dba4ef064f71dd770a4ea81aeb27b153ab4c018bde
                                                                                                • Instruction Fuzzy Hash: 8C315C7104D3C06FD3138B259C61B61BFB4EF87614F0A80CBE884CB6A3D2296919D776
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 36 99aaa6-99aafe 39 99ab00 36->39 40 99ab03-99ab0f 36->40 39->40 41 99ab11 40->41 42 99ab14-99ab1d 40->42 41->42 43 99ab1f-99ab27 CreateFileW 42->43 44 99ab6e-99ab73 42->44 46 99ab2d-99ab43 43->46 44->43 47 99ab75-99ab7a 46->47 48 99ab45-99ab6b 46->48 47->48
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0099AB25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 8c12e127ba11d0354b195dfb72519a5dd175b165d8422ffda6e9f64b9d2eed29
                                                                                                • Instruction ID: 63b72537064b5ec5437dbd9666b3b5eaed53992538f401e237bf6e3ec33da01d
                                                                                                • Opcode Fuzzy Hash: 8c12e127ba11d0354b195dfb72519a5dd175b165d8422ffda6e9f64b9d2eed29
                                                                                                • Instruction Fuzzy Hash: A9219271604200AFEB21CF65CD45F66FBE8EF18324F048969E9458B651D375E848CBB2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 51 99a9bf-99aa3c 56 99aa3e-99aa51 SetErrorMode 51->56 57 99aa67-99aa6c 51->57 58 99aa6e-99aa73 56->58 59 99aa53-99aa66 56->59 57->56 58->59
                                                                                                APIs
                                                                                                • SetErrorMode.KERNELBASE(?), ref: 0099AA44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode
                                                                                                • String ID:
                                                                                                • API String ID: 2340568224-0
                                                                                                • Opcode ID: fb9ef781f6e2d8c6d2d62a952db90adb83f10e22a978e4020c3d24f92281d495
                                                                                                • Instruction ID: 8727fe37bc4c4cb906a62c54424577de690e209fae5d5ea88867a942189f7644
                                                                                                • Opcode Fuzzy Hash: fb9ef781f6e2d8c6d2d62a952db90adb83f10e22a978e4020c3d24f92281d495
                                                                                                • Instruction Fuzzy Hash: 1F21486544E3C0AFDB138B258C64A51BFB4EF57624F0E80DBD884CF5A3C2689809CB72
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 62 99ac37-99acb5 66 99acea-99acef 62->66 67 99acb7-99acca GetFileType 62->67 66->67 68 99accc-99ace9 67->68 69 99acf1-99acf6 67->69 69->68
                                                                                                APIs
                                                                                                • GetFileType.KERNELBASE(?,00000E24,F21627FB,00000000,00000000,00000000,00000000), ref: 0099ACBD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileType
                                                                                                • String ID:
                                                                                                • API String ID: 3081899298-0
                                                                                                • Opcode ID: c00f157991e27eafcb5ed7ad6c5104fd323432b0d599133c7c2f62fba0e64cb4
                                                                                                • Instruction ID: ed0de99f7951c21d3187940ec509e462a827c3d4822d87c2f3232e83833dbf51
                                                                                                • Opcode Fuzzy Hash: c00f157991e27eafcb5ed7ad6c5104fd323432b0d599133c7c2f62fba0e64cb4
                                                                                                • Instruction Fuzzy Hash: AB21C6B540C3806FE7128B559C40BA2BFB8EF46314F1880DAE9848B653D264A909D771
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 73 99afaa-99aff9 76 99affb 73->76 77 99affe-99b007 73->77 76->77 78 99b009 77->78 79 99b00c-99b015 77->79 78->79 80 99b017-99b01f CreateMutexW 79->80 81 99b066-99b06b 79->81 82 99b025-99b03b 80->82 81->80 84 99b06d-99b072 82->84 85 99b03d-99b063 82->85 84->85
                                                                                                APIs
                                                                                                • CreateMutexW.KERNELBASE(?,?), ref: 0099B01D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateMutex
                                                                                                • String ID:
                                                                                                • API String ID: 1964310414-0
                                                                                                • Opcode ID: b108ed622f70fc6b6efe68a014a02423913db673e74c31d6ec2c30b5d8b1ed49
                                                                                                • Instruction ID: be16fb756ad21139118fbdef01b779675486a9101c66b6adec65f1260453721f
                                                                                                • Opcode Fuzzy Hash: b108ed622f70fc6b6efe68a014a02423913db673e74c31d6ec2c30b5d8b1ed49
                                                                                                • Instruction Fuzzy Hash: 8C2180715042009FEB20DF69DD45FA6FBE8EF04324F188469E948CB645D779E948CA72
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 88 99ab7c-99abe8 90 99ac29-99ac2e 88->90 91 99abea-99abf2 FindCloseChangeNotification 88->91 90->91 92 99abf8-99ac0a 91->92 94 99ac0c-99ac28 92->94 95 99ac30-99ac35 92->95 95->94
                                                                                                APIs
                                                                                                • FindCloseChangeNotification.KERNELBASE(?), ref: 0099ABF0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChangeCloseFindNotification
                                                                                                • String ID:
                                                                                                • API String ID: 2591292051-0
                                                                                                • Opcode ID: a659096503443ea70057d556414ac72d5bf6fdbea4ce8aacb69b36700045e4a1
                                                                                                • Instruction ID: 2fb0ee4cc8ca9f8070e0312f5e512dc40db9c63630a046ba975530809a051317
                                                                                                • Opcode Fuzzy Hash: a659096503443ea70057d556414ac72d5bf6fdbea4ce8aacb69b36700045e4a1
                                                                                                • Instruction Fuzzy Hash: E4219F755097C09FDB138B25DC95652BFB8EF07220F0984DBDD858F6A3D2649908CB62
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 97 99adce-99ae45 101 99ae89-99ae8e 97->101 102 99ae47-99ae67 WriteFile 97->102 101->102 105 99ae69-99ae86 102->105 106 99ae90-99ae95 102->106 106->105
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,00000E24,F21627FB,00000000,00000000,00000000,00000000), ref: 0099AE4D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: edcf1e5a7832104cc735599bad2dd515638e02657af1eae8314429e0fddcdbec
                                                                                                • Instruction ID: 0cccbd2d602c0a71eb67a3598ec6dddfe86124367a863f8dde0c8a7198c76fff
                                                                                                • Opcode Fuzzy Hash: edcf1e5a7832104cc735599bad2dd515638e02657af1eae8314429e0fddcdbec
                                                                                                • Instruction Fuzzy Hash: 7F21A471409340AFDB22CF55DC44FA7FFB8EF45320F08849AE9449B552C234A908CBB6
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 109 99a61e-99a688 111 99a68a-99a692 OleInitialize 109->111 112 99a6c0-99a6c5 109->112 114 99a698-99a6aa 111->114 112->111 115 99a6ac-99a6bf 114->115 116 99a6c7-99a6cc 114->116 116->115
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: 6e6e34d3fbbab0dfc8a0f530528c50e3af99f189d6bda921cd0214c4c2f28ada
                                                                                                • Instruction ID: 3d9d05f7f60af5d4fcaea95672a54d93b3e97bba481cc3aec4f18d9458f99fc0
                                                                                                • Opcode Fuzzy Hash: 6e6e34d3fbbab0dfc8a0f530528c50e3af99f189d6bda921cd0214c4c2f28ada
                                                                                                • Instruction Fuzzy Hash: C421387150D3C05FDB138B259C95A52BFB4EF47220F0D84DBD9848F1A3D2699908CBB2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 118 99a573-99a5d6 120 99a5d8-99a5e0 DuplicateHandle 118->120 121 99a610-99a615 118->121 122 99a5e6-99a5f8 120->122 121->120 124 99a5fa-99a60d 122->124 125 99a617-99a61c 122->125 125->124
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0099A5DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: 64f5e718d3ec3c54803175586961f2026eade431ff35ac28226fed371c3ca578
                                                                                                • Instruction ID: e8dedcd45cb16293befefe60430c4e44a7e43b3025e14fa5de5a910253143d41
                                                                                                • Opcode Fuzzy Hash: 64f5e718d3ec3c54803175586961f2026eade431ff35ac28226fed371c3ca578
                                                                                                • Instruction Fuzzy Hash: 01117571449380AFDB228F55DC44B62FFF4EF4A310F08889AED858B552C275A518DB61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 127 99adee-99ae45 130 99ae89-99ae8e 127->130 131 99ae47-99ae4f WriteFile 127->131 130->131 133 99ae55-99ae67 131->133 134 99ae69-99ae86 133->134 135 99ae90-99ae95 133->135 135->134
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,00000E24,F21627FB,00000000,00000000,00000000,00000000), ref: 0099AE4D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: 1d6a86a3b3e0b714747f1759f9a2fdd1558d4d4a407b4dfc26df7757ae689aa1
                                                                                                • Instruction ID: 98aa9aa638cfb89715e36d012372544d350ffe924190d9054f97d88fd7852016
                                                                                                • Opcode Fuzzy Hash: 1d6a86a3b3e0b714747f1759f9a2fdd1558d4d4a407b4dfc26df7757ae689aa1
                                                                                                • Instruction Fuzzy Hash: E211C471504200AFEB21CF95DC44FA6FBECEF54324F14885AE9458B651C374A5488BF6
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 138 99ac6a-99acb5 141 99acea-99acef 138->141 142 99acb7-99acca GetFileType 138->142 141->142 143 99accc-99ace9 142->143 144 99acf1-99acf6 142->144 144->143
                                                                                                APIs
                                                                                                • GetFileType.KERNELBASE(?,00000E24,F21627FB,00000000,00000000,00000000,00000000), ref: 0099ACBD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileType
                                                                                                • String ID:
                                                                                                • API String ID: 3081899298-0
                                                                                                • Opcode ID: ac8f6132910182354b5c1668bf2ba12ffd757ebf9f6fa9e99eadd5b93c3de357
                                                                                                • Instruction ID: 4a53c36edd47cfbb24879c6a787a336459da7f20cad61d5d3eaaa74761179e05
                                                                                                • Opcode Fuzzy Hash: ac8f6132910182354b5c1668bf2ba12ffd757ebf9f6fa9e99eadd5b93c3de357
                                                                                                • Instruction Fuzzy Hash: 9001C071508200AFEB208B05DD85FA6FBACDF55724F18C49AED458F741D778E8488AA6
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 148 99a59a-99a5d6 149 99a5d8-99a5e0 DuplicateHandle 148->149 150 99a610-99a615 148->150 151 99a5e6-99a5f8 149->151 150->149 153 99a5fa-99a60d 151->153 154 99a617-99a61c 151->154 154->153
                                                                                                APIs
                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0099A5DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: DuplicateHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3793708945-0
                                                                                                • Opcode ID: d3c23ff74086c4760bb58ee55f58d1f0a4c2ca7a18187832ddbf3218d12d14b9
                                                                                                • Instruction ID: 1d8403c377be7a94bd3f1b48197822ca74e10e5fc623f406005b7d52617efeea
                                                                                                • Opcode Fuzzy Hash: d3c23ff74086c4760bb58ee55f58d1f0a4c2ca7a18187832ddbf3218d12d14b9
                                                                                                • Instruction Fuzzy Hash: 61015E715046009FDF218F55D844B66FFE4EF58310F08889AED454B651C275E454DFA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • FindCloseChangeNotification.KERNELBASE(?), ref: 0099ABF0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChangeCloseFindNotification
                                                                                                • String ID:
                                                                                                • API String ID: 2591292051-0
                                                                                                • Opcode ID: 54c58b0d98ab27f2b033317bd96413d921314bb200bbbaaef52f332d7a17e201
                                                                                                • Instruction ID: 82387e7bc618f214ed5fdb1c672b290dc40d3fa5eaf9e2778b805e40fed84398
                                                                                                • Opcode Fuzzy Hash: 54c58b0d98ab27f2b033317bd96413d921314bb200bbbaaef52f332d7a17e201
                                                                                                • Instruction Fuzzy Hash: BE01D4715042008FDF108F59D885765FBD8DF14320F18C4AADC458F641D679E404CAA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 156 99a72e-99a786 OleGetClipboard 158 99a78c-99a7a2 156->158
                                                                                                APIs
                                                                                                • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0099A77E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard
                                                                                                • String ID:
                                                                                                • API String ID: 220874293-0
                                                                                                • Opcode ID: 31255d106f50ad7824861cc5118db40d5ccba23f858d4e841c360b14d58b7919
                                                                                                • Instruction ID: fcbbcfe624b8f44cde5a9382b16dac570503dc1f9e71f0a204bc9c6d2c5b7529
                                                                                                • Opcode Fuzzy Hash: 31255d106f50ad7824861cc5118db40d5ccba23f858d4e841c360b14d58b7919
                                                                                                • Instruction Fuzzy Hash: BA018F71500200ABD310DF1ACD46B66FBE8EB88A20F148159EC089BB41D731B955CBE5
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: 367a8dc37b481228eaa0b1378df59d3544bf598ec39a13b8749ef587ce433266
                                                                                                • Instruction ID: 662ab52c7bc3aca3b7dd81023664bbb90476654a223f01ff7d12c024d59d9f14
                                                                                                • Opcode Fuzzy Hash: 367a8dc37b481228eaa0b1378df59d3544bf598ec39a13b8749ef587ce433266
                                                                                                • Instruction Fuzzy Hash: 2301A2719042408FEB10CF59D884B65FBE8EF14320F18C8AADD488F656D27AE404CEA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                APIs
                                                                                                • SetErrorMode.KERNELBASE(?), ref: 0099AA44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902454991.000000000099A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099A000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_99a000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorMode
                                                                                                • String ID:
                                                                                                • API String ID: 2340568224-0
                                                                                                • Opcode ID: 2d476f43e05686c86cff68cd3ecd1bfd14433b5716494568152343c23f611e87
                                                                                                • Instruction ID: 3206eeea855a88557c782be247e550eece0efa015b96fb60093631334441dcc9
                                                                                                • Opcode Fuzzy Hash: 2d476f43e05686c86cff68cd3ecd1bfd14433b5716494568152343c23f611e87
                                                                                                • Instruction Fuzzy Hash: F7F0F931804240CFEB208F0AD984B65FBE4EF14324F08C09ADD484B752C278E808CEA2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :@k
                                                                                                • API String ID: 0-2277858631
                                                                                                • Opcode ID: 465a575ec27d80984faef7815a9e7cdecad2dbc22dee821c68ce8182c66e2092
                                                                                                • Instruction ID: 46e69f3d07986b5773dcbc628a621f2a19044db62f772d2b8d0045607200266d
                                                                                                • Opcode Fuzzy Hash: 465a575ec27d80984faef7815a9e7cdecad2dbc22dee821c68ce8182c66e2092
                                                                                                • Instruction Fuzzy Hash: 0231E331B012019FDB04BBB9D9227BE72A7ABD820CF504429D405DBBA9EF398D16C791
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d067b9edd4c234b33b170b8b87e0fe43f66ee1591b374cd1fa00bb4022bc60ee
                                                                                                • Instruction ID: 3513ef5d80f89124549114ca7456b2fda929d7228dca1835863cdac81b27a463
                                                                                                • Opcode Fuzzy Hash: d067b9edd4c234b33b170b8b87e0fe43f66ee1591b374cd1fa00bb4022bc60ee
                                                                                                • Instruction Fuzzy Hash: 17324970A01218CFDB54EF74D955BECB7B2AF89308F1045A9D409AB7A8EB759E81CF40
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4aab2cc354c1ec0db0bbcfeb0a02df207d1cf38c3d1ef01eb6506e92510ad102
                                                                                                • Instruction ID: 92f974324c9af2af66577023c7780c6373e3cdc19908ee010616da4309390231
                                                                                                • Opcode Fuzzy Hash: 4aab2cc354c1ec0db0bbcfeb0a02df207d1cf38c3d1ef01eb6506e92510ad102
                                                                                                • Instruction Fuzzy Hash: 2F818D30A01258CFDB14EFB4C955BEDB7B2AF89308F1044A9D009AB7A4EB759E85CF51
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: afcc059d66e9ff2691489242a897fe8fd2a22ef9287904d521f3540066f6c576
                                                                                                • Instruction ID: 3ce47d3fef1d4165260dc49f679b3a401574bbe4ad9b4f11900c698fd191c2f9
                                                                                                • Opcode Fuzzy Hash: afcc059d66e9ff2691489242a897fe8fd2a22ef9287904d521f3540066f6c576
                                                                                                • Instruction Fuzzy Hash: 98416D30A012188FDB14EFB5C955BECB7F2BF89308F5040A9D009AB6A5DB745E44CF61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c3ccfdc05b77121934ce18e24bf2b3c9381e4406579a7541e5965b0f303edfea
                                                                                                • Instruction ID: 30c7e08a0ede0ecd345379fe5346acb343782955411c54271faf25f82497f9b0
                                                                                                • Opcode Fuzzy Hash: c3ccfdc05b77121934ce18e24bf2b3c9381e4406579a7541e5965b0f303edfea
                                                                                                • Instruction Fuzzy Hash: 3A3136317093509FD705A7B598217AD7BA79FC6308B0489AAD001CF7D2DF759D0987E2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9946edb50687de3cfdd4ed47002f43b61b5b7f1e80dd59efe2f3459471817552
                                                                                                • Instruction ID: f328ffeec4a0eb4b0910b186e71c1b713576a5539f185437c4a852d48d993182
                                                                                                • Opcode Fuzzy Hash: 9946edb50687de3cfdd4ed47002f43b61b5b7f1e80dd59efe2f3459471817552
                                                                                                • Instruction Fuzzy Hash: 811121317082608FD316A7F9A4213A877D39BD6308314886AD001CFB92CF76DD0A8BE2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1911085907.0000000000EA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_ea0000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9412f68cfc5845d76115b08bceccf9b2c3feb73587e584bfb71d0548266a791b
                                                                                                • Instruction ID: 64deccce0729a8a32d5fd4bbbac8031d3492b41cb772aaab511fb0bb0a8e14a8
                                                                                                • Opcode Fuzzy Hash: 9412f68cfc5845d76115b08bceccf9b2c3feb73587e584bfb71d0548266a791b
                                                                                                • Instruction Fuzzy Hash: 8001A7B65097806FDB11CB15DC40C66FFE8DB96620708849FEC4997612C125B808CB62
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1911085907.0000000000EA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_ea0000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 586551a7671dfd8b9c3c2b4dc59b603148c31783e911b5321dbd12c17cc36362
                                                                                                • Instruction ID: 4f393aee248b9f8c3f52dc6a56b4f8491a15a9bdf5c5ea9e8a385e9186e2f806
                                                                                                • Opcode Fuzzy Hash: 586551a7671dfd8b9c3c2b4dc59b603148c31783e911b5321dbd12c17cc36362
                                                                                                • Instruction Fuzzy Hash: 1F0162B65097806FD7118B169C40862FFA8EA86620709C49FEC499B612D225B908CBA1
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3d9ffae587f741d8f19e24f01b31ac99aea1f7edacf8fb15559767d450d7b555
                                                                                                • Instruction ID: d7ca9ea52a764cdd4a9b02b986f00567720e71f9ee71de418cf903606b9af304
                                                                                                • Opcode Fuzzy Hash: 3d9ffae587f741d8f19e24f01b31ac99aea1f7edacf8fb15559767d450d7b555
                                                                                                • Instruction Fuzzy Hash: 2E01C83060E741DFCB00EBB8D59855D7BE1AFC6308B05881DE4598B75AEB749854DBC2
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f97bd23d5f5fdbb5ec2f5c9778e5e540c7f0714e99bc38a79b0a1e63d3156909
                                                                                                • Instruction ID: ee14261c2a1167b18fd5592bf67056aa611817d280210d78fbc04ffac49d65dc
                                                                                                • Opcode Fuzzy Hash: f97bd23d5f5fdbb5ec2f5c9778e5e540c7f0714e99bc38a79b0a1e63d3156909
                                                                                                • Instruction Fuzzy Hash: 72F0F072A01304AFFB04DA70C812BAEBB72EF81718F00C5AEE1459F2C2EA355D40CB80
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1911085907.0000000000EA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_ea0000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 953314f808b03997c1598259443b66e783017aa14853b433ee73a7c05c860bc7
                                                                                                • Instruction ID: 28017cfa55864a602a0c29413f1d7863280cb6f64b0957a6b4e133819fc320a3
                                                                                                • Opcode Fuzzy Hash: 953314f808b03997c1598259443b66e783017aa14853b433ee73a7c05c860bc7
                                                                                                • Instruction Fuzzy Hash: DFF09C765056409FCB11CF09EC41896FBE8DB55730714C46FDC4997711D235B504CF61
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1911085907.0000000000EA0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_ea0000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ec1c90d44a66fb3985da7fc0140d941128468ae5fadddeafd5ecf9f3f033713f
                                                                                                • Instruction ID: 44b292013f6b4cbfd396d480051ac15bca7c5758419da1665fffc9845c154ffd
                                                                                                • Opcode Fuzzy Hash: ec1c90d44a66fb3985da7fc0140d941128468ae5fadddeafd5ecf9f3f033713f
                                                                                                • Instruction Fuzzy Hash: A3E092B66046005B9750CF0AEC81866F7D8EB88630718C47FDC0D8B701D635B508CAA5
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1910887267.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_e90000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 66f8f3e78c33b1b4a4ce4c8f468fad1a4b2d8214c35523d725c37b2c970fe8c0
                                                                                                • Instruction ID: 6d5c961f5300ed5b1f29d2f70e897379ac6b9f85010233fda21bccb5bd26bc4f
                                                                                                • Opcode Fuzzy Hash: 66f8f3e78c33b1b4a4ce4c8f468fad1a4b2d8214c35523d725c37b2c970fe8c0
                                                                                                • Instruction Fuzzy Hash: 03E0123425A3C0CFD7172734E4284983B316F8614D34908FEC4564A77AEA3A8841CF40
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902287588.0000000000992000.00000040.00000800.00020000.00000000.sdmp, Offset: 00992000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_992000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b5dffa714d35efb6d425d1c84233b08a0fa0451a144acd7eb1d1f732ce8df9af
                                                                                                • Instruction ID: b634e12856de204d88b43ff30fac75764e4688f9693e99aec266a49cee9b8182
                                                                                                • Opcode Fuzzy Hash: b5dffa714d35efb6d425d1c84233b08a0fa0451a144acd7eb1d1f732ce8df9af
                                                                                                • Instruction Fuzzy Hash: 12D05E79209AC15FD7169B1CC1A4B9537D8AB61718F4A44F9A8008B773C768E9C1D600
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%

                                                                                                Memory Dump Source
                                                                                                • Source File: 00000005.00000002.1902287588.0000000000992000.00000040.00000800.00020000.00000000.sdmp, Offset: 00992000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_5_2_992000_Microsoft Corporation.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e7103a66687567d2b4c4e723ab8a771fb466db24ad99289ee48729c55f6b0f5a
                                                                                                • Instruction ID: 18ce028d189e564d183180c0230c11d5d591f17d4c44f260254b2f3f5ce34e69
                                                                                                • Opcode Fuzzy Hash: e7103a66687567d2b4c4e723ab8a771fb466db24ad99289ee48729c55f6b0f5a
                                                                                                • Instruction Fuzzy Hash: 1BD05E342006814BCB15DB0CC6D5F5937D8AB50B14F0684E8AC108F762C7A8E8C0CA00
                                                                                                Uniqueness

                                                                                                Uniqueness Score: -1.00%