Edit tour

Windows Analysis Report
SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe

Overview

General Information

Sample name:SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Analysis ID:1384627
MD5:403e9b77b7ad2d0acbfe9d9764492665
SHA1:ad97802970b3969906c57f7cc98e8911a7c65322
SHA256:72b7678679919d45bce5de37f3c7ced38449cdb6e7d119477978ed7fa8c75afc
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Tries to load missing DLLs
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe (PID: 720 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe MD5: 403E9B77B7AD2D0ACBFE9D9764492665)
    • BOWENGOD.exe (PID: 3908 cmdline: "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe" MD5: AC7CBFE3C9275BB46C7A4B2A98BDBFEA)
      • conhost.exe (PID: 6900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe" , CommandLine: "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, ParentProcessId: 720, ParentProcessName: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, ProcessCommandLine: "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe" , ProcessId: 3908, ProcessName: BOWENGOD.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeVirustotal: Detection: 7%Perma Link
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeReversingLabs: Detection: 78%
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeVirustotal: Detection: 78%Perma Link
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\src_punch2\ConsoleApp1\obj\Debug\BOWENGOD.pdb source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1208739068.00000000046C4000.00000004.00000800.00020000.00000000.sdmp, BOWENGOD.exe, 00000002.00000000.1205968049.0000000000B42000.00000002.00000001.01000000.00000006.sdmp, BOWENGOD.exe.0.dr
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeCode function: 4x nop then jmp 02DF11B2h2_2_02DF0848
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeCode function: 4x nop then jmp 02DF11B2h2_2_02DF04E4
Source: BOWENGOD.exe, 00000002.00000002.2455333771.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, ConDrv.2.dr, BOWENGOD.exe.0.drString found in binary or memory: https://discord.gg/km3GnKqJMz
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1208739068.00000000046C4000.00000004.00000800.00020000.00000000.sdmp, BOWENGOD.exe, 00000002.00000000.1205968049.0000000000B42000.00000002.00000001.01000000.00000006.sdmp, BOWENGOD.exe.0.drString found in binary or memory: https://discord.gg/km3GnKqJMz/
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeCode function: 0_2_01A609980_2_01A60998
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeCode function: 2_2_02DF08482_2_02DF0848
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000000.1199203901.0000000001022000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBOWENGOD.exe4 vs SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1206584465.000000000159E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1208739068.000000000478B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBOWENGOD.exe8 vs SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1208661806.00000000036C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoddlights.dll4 vs SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1207752269.0000000001A90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameoddlights.dll4 vs SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeBinary or memory string: OriginalFilenameBOWENGOD.exe4 vs SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeSection loaded: sspicli.dllJump to behavior
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe.1a90000.0.raw.unpack, Worker.csCryptographic APIs: 'TransformFinalBlock'
Source: 0.2.SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe.36e1574.1.raw.unpack, Worker.csCryptographic APIs: 'TransformFinalBlock'
Source: classification engineClassification label: mal72.evad.winEXE@4/3@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe.logJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6900:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeFile created: C:\Users\user\AppData\Local\Temp\TempJump to behavior
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeReversingLabs: Detection: 78%
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeVirustotal: Detection: 78%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess created: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe"
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess created: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe" Jump to behavior
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\src_punch2\ConsoleApp1\obj\Debug\BOWENGOD.pdb source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1208739068.00000000046C4000.00000004.00000800.00020000.00000000.sdmp, BOWENGOD.exe, 00000002.00000000.1205968049.0000000000B42000.00000002.00000001.01000000.00000006.sdmp, BOWENGOD.exe.0.dr

Data Obfuscation

barindex
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
Source: BOWENGOD.exe.0.drStatic PE information: 0xA02892CA [Tue Feb 23 16:39:38 2055 UTC]
Source: SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeStatic PE information: section name: .text entropy: 7.989803577691876
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeFile created: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeMemory allocated: 19F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeMemory allocated: 36C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeMemory allocated: 56C0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeMemory allocated: 2E30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeMemory allocated: 4E30000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe TID: 1108Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exeProcess created: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe "C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services11
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Timestomp
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1384627 Sample: SecuriteInfo.com.BackDoor.O... Startdate: 01/02/2024 Architecture: WINDOWS Score: 72 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 .NET source code contains potential unpacker 2->21 23 Machine Learning detection for sample 2->23 7 SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe 6 2->7         started        process3 file4 15 C:\Users\user\AppData\Local\...\BOWENGOD.exe, PE32 7->15 dropped 10 BOWENGOD.exe 1 7->10         started        process5 signatures6 25 Multi AV Scanner detection for dropped file 10->25 13 conhost.exe 10->13         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe79%ReversingLabsByteCode-MSIL.Trojan.Remcos
SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe79%VirustotalBrowse
SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe100%AviraTR/Dropper.MSIL.Gen
SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe3%ReversingLabs
C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://discord.gg/km3GnKqJMz/0%Avira URL Cloudsafe
https://discord.gg/km3GnKqJMz0%Avira URL Cloudsafe
https://discord.gg/km3GnKqJMz/0%VirustotalBrowse
https://discord.gg/km3GnKqJMz0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://discord.gg/km3GnKqJMzBOWENGOD.exe, 00000002.00000002.2455333771.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, ConDrv.2.dr, BOWENGOD.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://discord.gg/km3GnKqJMz/SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe, 00000000.00000002.1208739068.00000000046C4000.00000004.00000800.00020000.00000000.sdmp, BOWENGOD.exe, 00000002.00000000.1205968049.0000000000B42000.00000002.00000001.01000000.00000006.sdmp, BOWENGOD.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:39.0.0 Ruby
Analysis ID:1384627
Start date and time:2024-02-01 10:12:25 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:17
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Detection:MAL
Classification:mal72.evad.winEXE@4/3@0/0
EGA Information:
  • Successful, ratio: 50%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 31
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target BOWENGOD.exe, PID 3908 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):128
Entropy (8bit):5.194931008531234
Encrypted:false
SSDEEP:3:QHXMKaZImrnLCR2RA+URVL1WQBf2cWDLFv:Q3LadLCR2hUv1XAcW1v
MD5:93A3E3F3DE8B5BE893B967514787E5DB
SHA1:CF13D577C969B0504862145E8112D39ED473C049
SHA-256:ED48B7378FD1993A7AA9B5F65A8506821A3A97FDEB3A4466C63E969C52DDBA56
SHA-512:0AD270E8776F46996BF27CCAA1C85923A03BBA52FB0DCD2AE99071C8B67D6DD3014C9039FADA37C9E6A11930D4ED51039A295AC3F28E901BA40DB1655BA4F607
Malicious:false
Reputation:low
Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..
Process:C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Category:dropped
Size (bytes):281600
Entropy (8bit):6.47440593938211
Encrypted:false
SSDEEP:6144:UALRYLXLL7OrXq5wRbeavVr0lOv++6KyD4xu:sPOPrX5
MD5:AC7CBFE3C9275BB46C7A4B2A98BDBFEA
SHA1:328914FD0FD6CD5642A99D4E3A5B5DFDF71C7710
SHA-256:E4AA6DC90C2F16CB46D826F2F59BF867C6CE5C9ADBB105C752ACAAED4FBD7EDC
SHA-512:6FCDA201B6A445E2A248B253122204DF3C765F810FA01E88F53C3B13CCFED46084E20F7ED448016CB54A56C47AB54A88D10D658E77A87843E7D5D66BF1E8F0D4
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 3%
  • Antivirus: Virustotal, Detection: 7%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....(..........."...0.. ...*......J?... ...@....@.. ....................................`..................................>..O....@...&..........................t>..8............................................ ............... ..H............text...P.... ... .................. ..`.rsrc....&...@...(..."..............@..@.reloc...............J..............@..B................)?......H........%...............................................................0..D.........r...p(........(......(........rS..p..(.......(.....r...p(.......(.....rQ..p(....r...p(....(.....r...p(.......(.....r...p(.......(.....r...p(.....r...p(.......(.....r...p(.....(.....~....r)..po.......rQ..p(........9.....(......(........8v..............,...(......8T....rU..ps....%.o.....%.o.....%.o.....(........o ...r]..po!......o ...r...po!......o ...r...po!......o ...rC..po!......o ...r...po
Process:C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe
File Type:ASCII text, with CRLF, LF line terminators
Category:dropped
Size (bytes):890
Entropy (8bit):3.3893024588729563
Encrypted:false
SSDEEP:12:IxmjJWcmJohZxKpjs+Cy1q1QAxWN8nR4NMQMcZu+3HRin:Ixmkc7qo+Cy6WAUBUUHUn
MD5:2C2E7B9D29283413BC4F3CC3FD8ED610
SHA1:47EF3B3F665EF072C38FCF5DDA8BEC3CFE7F1F57
SHA-256:6E29F42B91C85A236B5698A10050A8479CE9141B0BAD724EE2456CE3C44CC2E0
SHA-512:7D59D5464500701EBAC06031B11620CFEE479B1259894FE2E41EFA60612FADDD916A5E0378DBDE351918F0A017CC125B34B8D8521D7B44C96600D3F4BE7C0C43
Malicious:false
Reputation:low
Preview:....$$$$$$$\ $$$$$$\ $$\ $$\ $$$$$$$$\ $$\ $$\ $$$$$$\ $$$$$$\ $$$$$$$\ ....$$ __$$\ $$ __$$\ $$ | $\ $$ |$$ _____|$$$\ $$ |$$ __$$\ $$ __$$\ $$ __$$\ ....$$ | $$ |$$ / $$ |$$ |$$$\ $$ |$$ | $$$$\ $$ |$$ / \__|$$ / $$ |$$ | $$ |....$$$$$$$\ |$$ | $$ |$$ $$ $$\$$ |$$$$$\ $$ $$\$$ |$$ |$$$$\ $$ | $$ |$$ | $$ |....$$ __$$\ $$ | $$ |$$$$ _$$$$ |$$ __| $$ \$$$$ |$$ |\_$$ |$$ | $$ |$$ | $$ |....$$ | $$ |$$ | $$ |$$$ / \$$$ |$$ | $$ |\$$$ |$$ | $$ |$$ | $$ |$$ | $$ |....$$$$$$$ | $$$$$$ |$$ / \$$ |$$$$$$$$\ $$ | \$$ |\$$$$$$ | $$$$$$ |$$$$$$$ |....\_______/ \______/ \__/ \__|\________|\__| \__| \______/ \______/ \_______/ ....... DISCORD : SKY SHOP | LINK : https://discord.gg/km3GnKqJMz....... USERNAME : [user]......1 | CONFIG + REGISTRY SETTING ALL...2 | BOOST FPS......SKYSHOP | OPTION BOWENGOD :
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.289383402403807
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
File size:463'872 bytes
MD5:403e9b77b7ad2d0acbfe9d9764492665
SHA1:ad97802970b3969906c57f7cc98e8911a7c65322
SHA256:72b7678679919d45bce5de37f3c7ced38449cdb6e7d119477978ed7fa8c75afc
SHA512:afcc12a2481ba61f1a1a360a55303e39f12393940184055d47cacfe4ad7e4e87694a5865c3192a545ea498d92f2e45206419a77be804ca088c841cdef4884082
SSDEEP:6144:/cYvuXN+ziKAyHG5rslwLEb06143jbu8AjLRYLXLL7OrXq5wRbeavVr0lOv++6Kp:/ckAN+ziKPHMwlwLEbFWu8nPOPrX5
TLSH:CFA4D02F5B7CC41AE5384DB76D1AAB1824E9877BBC0CF34361753E9069B6BC828D3095
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.....................*........... ... ....@.. ....................................@................................
Icon Hash:cee7ab9b918b33d3
Entrypoint:0x43068e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x63CCF7E0 [Sun Jan 22 08:46:24 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x306400x4b.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x42650.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x760000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x2e6940x2e800754b7c5d5549244f77aa29cab8df4c15False0.9815135668682796data7.989803577691876IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x320000x426500x428006deeda4b12fda84df59930142089f40aFalse0.547098948543233data6.459306233624547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x760000xc0x200e5b59a0405a5b6fa66018fc47e1d5c35False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x324200x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 2834 x 2834 px/m0.5483326922507915
RT_GROUP_ICON0x744480x14data1.2
RT_VERSION0x321300x2ecdata0.4117647058823529
RT_MANIFEST0x744600x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:10:13:15
Start date:01/02/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\SecuriteInfo.com.BackDoor.Orcus.3.31537.20921.exe
Imagebase:0xff0000
File size:463'872 bytes
MD5 hash:403E9B77B7AD2D0ACBFE9D9764492665
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Target ID:2
Start time:10:13:16
Start date:01/02/2024
Path:C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\AppData\Local\Temp\Temp\BOWENGOD.exe"
Imagebase:0xb40000
File size:281'600 bytes
MD5 hash:AC7CBFE3C9275BB46C7A4B2A98BDBFEA
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 3%, ReversingLabs
  • Detection: 7%, Virustotal, Browse
Reputation:low
Has exited:false

Target ID:3
Start time:10:13:16
Start date:01/02/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:24.5%
Dynamic/Decrypted Code Coverage:100%
Signature Coverage:0%
Total number of Nodes:48
Total number of Limit Nodes:3
Show Legend
Hide Nodes/Edges
execution_graph 1245 173a712 1246 173a73e FindCloseChangeNotification 1245->1246 1247 173a77d 1245->1247 1248 173a74c 1246->1248 1247->1246 1277 173a6d0 1279 173a712 FindCloseChangeNotification 1277->1279 1280 173a74c 1279->1280 1253 173a336 1254 173a3a0 1253->1254 1255 173a368 GetLongPathNameW 1253->1255 1254->1255 1256 173a376 1255->1256 1273 173a2f4 1275 173a310 GetLongPathNameW 1273->1275 1276 173a376 1275->1276 1281 173a5d4 1283 173a5fa CreateFileW 1281->1283 1284 173a681 1283->1284 1257 173a5fa 1258 173a632 CreateFileW 1257->1258 1260 173a681 1258->1260 1261 173a53a 1262 173a560 CreateDirectoryW 1261->1262 1264 173a587 1262->1264 1265 173a87e 1266 173a8b3 WriteFile 1265->1266 1268 173a8e5 1266->1268 1297 173a503 1299 173a53a CreateDirectoryW 1297->1299 1300 173a587 1299->1300 1241 173ab42 1242 173ab68 ShellExecuteExW 1241->1242 1244 173ab84 1242->1244 1289 173ab20 1291 173ab42 ShellExecuteExW 1289->1291 1292 173ab84 1291->1292 1249 173a3e6 1250 173a412 SetErrorMode 1249->1250 1252 173a43b 1249->1252 1251 173a427 1250->1251 1252->1250 1301 173a78b 1303 173a7be GetFileType 1301->1303 1304 173a820 1303->1304 1293 173a3ae 1294 173a3e6 SetErrorMode 1293->1294 1296 173a427 1294->1296 1285 173a84c 1286 173a87e WriteFile 1285->1286 1288 173a8e5 1286->1288

Callgraph

Hide Legend
  • Executed
  • Not Executed
  • Opacity -> Relevance
  • Disassembly available
callgraph 0 Function_01A602A6 1 Function_0173A172 2 Function_0173AA70 3 Function_0173A47A 4 Function_0173A078 5 Function_0173A27E 6 Function_0173A87E 7 Function_0173A962 8 Function_01732264 9 Function_01732364 10 Function_01A602BA 11 Function_0173A256 12 Function_01A60783 13 Function_01A6028C 14 Function_01732458 15 Function_0173AB42 16 Function_01AD009B 17 Function_01A60991 18 Function_01732044 19 Function_0173A449 20 Function_01A6079D 20->17 21 Function_01A60998 20->21 27 Function_01AD05E0 20->27 35 Function_01A611F8 20->35 67 Function_01AD0606 20->67 87 Function_01A61171 20->87 22 Function_0173A84C 23 Function_01732430 24 Function_0173A336 25 Function_01A602E0 26 Function_0173A53A 28 Function_0173A23C 29 Function_0173213C 30 Function_0173A120 31 Function_0173AB20 32 Function_0173A927 33 Function_01A602F0 34 Function_0173A02E 36 Function_0173A712 37 Function_01732310 38 Function_01A607CB 39 Function_01AD05C0 40 Function_0173201C 41 Function_0173A503 42 Function_0173AA02 43 Function_0173A005 44 Function_01AD05D0 45 Function_0173AB0D 46 Function_01A60526 47 Function_01A60925 48 Function_017321F0 49 Function_0173ABF6 50 Function_0173A1F4 51 Function_0173A2F4 52 Function_017323F4 53 Function_0173A5FA 54 Function_01A6092D 55 Function_01A60632 56 Function_0173A3E6 57 Function_01A6043B 57->20 57->27 57->67 86 Function_01A60670 57->86 99 Function_01A6065F 57->99 58 Function_01A60539 59 Function_01A60807 60 Function_01AD000C 61 Function_0173A6D0 62 Function_017320D0 63 Function_0173A9D6 64 Function_0173A5D4 65 Function_01A6080E 66 Function_01A6090F 68 Function_01AD0000 69 Function_0173ABC3 70 Function_01A60817 71 Function_01A60514 72 Function_01A60015 72->27 72->67 72->72 85 Function_01A60070 72->85 91 Function_01A60140 72->91 73 Function_01A6061C 74 Function_01A6051D 75 Function_0173A5CE 76 Function_01A60966 77 Function_017322B4 78 Function_01AD066A 79 Function_01A6076D 80 Function_01A6096D 81 Function_0173A7BE 82 Function_017323BC 83 Function_01A60276 84 Function_01AD067F 85->27 85->67 85->72 85->85 85->91 86->70 88 Function_01AD0074 89 Function_0173A3AE 90 Function_01AD0648 90->78 92 Function_01732194 93 Function_0173AA9A 94 Function_0173A09A 95 Function_01A6064C 96 Function_01732098 97 Function_01732584 98 Function_0173A78B 99->70 100 Function_01A6025A 101 Function_01A6095B 102 Function_01A60658

Executed Functions

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: ccf48abbec4720a1066d715d03ceee9f502db18d4fac41045fbdf641bc0e0548
  • Instruction ID: e1777fc75d05ca7ca6cf9d041b13ad3b06858b378adf748b6c9cc0d476b1067c
  • Opcode Fuzzy Hash: ccf48abbec4720a1066d715d03ceee9f502db18d4fac41045fbdf641bc0e0548
  • Instruction Fuzzy Hash: 7652C070E04229CBCB15CB99C8D05BEFBB6EF85304F28856DE556EB246D7349C86CB90
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 173a5d4-173a652 4 173a657-173a663 0->4 5 173a654 0->5 6 173a665 4->6 7 173a668-173a671 4->7 5->4 6->7 8 173a673-173a697 CreateFileW 7->8 9 173a6c2-173a6c7 7->9 12 173a6c9-173a6ce 8->12 13 173a699-173a6bf 8->13 9->8 12->13
APIs
  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0173A679
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: CreateFile
  • String ID:
  • API String ID: 823142352-0
  • Opcode ID: f5ccd95f5da895ea9a8f50f548fec6bc7bb636d1bea2c15a649b8296aba7c528
  • Instruction ID: 2113b660313a9c88b42616a3cbe2911feaca7b8131e9f4b8a97dcc3b79f68140
  • Opcode Fuzzy Hash: f5ccd95f5da895ea9a8f50f548fec6bc7bb636d1bea2c15a649b8296aba7c528
  • Instruction Fuzzy Hash: D03181B1545344AFE722CB25CC45F62FFE8EF45210F0884AEE985CB252D365E809DB72
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 16 173a5fa-173a652 19 173a657-173a663 16->19 20 173a654 16->20 21 173a665 19->21 22 173a668-173a671 19->22 20->19 21->22 23 173a673-173a67b CreateFileW 22->23 24 173a6c2-173a6c7 22->24 25 173a681-173a697 23->25 24->23 27 173a6c9-173a6ce 25->27 28 173a699-173a6bf 25->28 27->28
APIs
  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0173A679
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: CreateFile
  • String ID:
  • API String ID: 823142352-0
  • Opcode ID: 3fcab2c1eb0cf0b16149576dd21045c3521903fb21dbd0daa441c0f60c916626
  • Instruction ID: a4a7aa534baa10e7a3d9f9ef37716b867dd4be22ba3ceddb3b3155f6fb5d6033
  • Opcode Fuzzy Hash: 3fcab2c1eb0cf0b16149576dd21045c3521903fb21dbd0daa441c0f60c916626
  • Instruction Fuzzy Hash: CC219271544244AFEB21CF25CC45F66FBE8EF48314F0488ADEA85CB252D371E414CB62
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 31 173a84c-173a8d5 35 173a8d7-173a8f7 WriteFile 31->35 36 173a919-173a91e 31->36 39 173a920-173a925 35->39 40 173a8f9-173a916 35->40 36->35 39->40
APIs
  • WriteFile.KERNELBASE(?,00000E24,A81662E9,00000000,00000000,00000000,00000000), ref: 0173A8DD
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: FileWrite
  • String ID:
  • API String ID: 3934441357-0
  • Opcode ID: b21f49e58a0eeca1cf8afd482aa1ba7707a9ac42f6027df88782256336c9cf94
  • Instruction ID: 7be9bddc17bbd166e48b3c688028e8402510320bafd9390580ac34f3a79d6096
  • Opcode Fuzzy Hash: b21f49e58a0eeca1cf8afd482aa1ba7707a9ac42f6027df88782256336c9cf94
  • Instruction Fuzzy Hash: 6C21C176409384AFD7228B51DC45F66BFB8EF46314F0984EBE9848B153C224A909CBB2
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 43 173a78b-173a809 47 173a80b-173a81e GetFileType 43->47 48 173a83e-173a843 43->48 49 173a820-173a83d 47->49 50 173a845-173a84a 47->50 48->47 50->49
APIs
  • GetFileType.KERNELBASE(?,00000E24,A81662E9,00000000,00000000,00000000,00000000), ref: 0173A811
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: FileType
  • String ID:
  • API String ID: 3081899298-0
  • Opcode ID: c7b053f41e31044640d28eaf2197e8891193f080cd70ad2e9cc53f7ee4dfdd94
  • Instruction ID: 9c216c8f2adfb859f627889dc9aafe8f4b3316918a5363ee0e9d29e7061128f9
  • Opcode Fuzzy Hash: c7b053f41e31044640d28eaf2197e8891193f080cd70ad2e9cc53f7ee4dfdd94
  • Instruction Fuzzy Hash: FD2127B54483846FE7138B11DC45BA2BFB8DF47324F0980DBE984CB193D264A909C772
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 67 173a6d0-173a73c 69 173a73e-173a746 FindCloseChangeNotification 67->69 70 173a77d-173a782 67->70 72 173a74c-173a75e 69->72 70->69 73 173a760-173a77c 72->73 74 173a784-173a789 72->74 74->73
APIs
  • FindCloseChangeNotification.KERNELBASE(?), ref: 0173A744
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: ChangeCloseFindNotification
  • String ID:
  • API String ID: 2591292051-0
  • Opcode ID: 9baeb71e26190a48fe88fa88db317a5a358e90c3a49ac3b0de813504a79d00ff
  • Instruction ID: d536192a12fc43e9fbbfb38ce1472c756d34f606c7c78e96b5f4e1a315454877
  • Opcode Fuzzy Hash: 9baeb71e26190a48fe88fa88db317a5a358e90c3a49ac3b0de813504a79d00ff
  • Instruction Fuzzy Hash: D321CF755093C05FDB138B25DC95652BFB8AF07220F0984EADC858B2A3D2649808CB62
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 54 173a503-173a55e 56 173a563-173a569 54->56 57 173a560 54->57 58 173a56b 56->58 59 173a56e-173a577 56->59 57->56 58->59 60 173a579-173a599 CreateDirectoryW 59->60 61 173a5b8-173a5bd 59->61 64 173a59b-173a5b7 60->64 65 173a5bf-173a5c4 60->65 61->60 65->64
APIs
  • CreateDirectoryW.KERNELBASE(?,?), ref: 0173A57F
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: CreateDirectory
  • String ID:
  • API String ID: 4241100979-0
  • Opcode ID: 4ba0edeb03861220f2ef5750cb6d32f738034ee9a9740b1cdc9efaed83461949
  • Instruction ID: 29dbbb3cc58dd8fcca2894442b229c9211a6208b031d7d69d0d6e1b3f8b53cd2
  • Opcode Fuzzy Hash: 4ba0edeb03861220f2ef5750cb6d32f738034ee9a9740b1cdc9efaed83461949
  • Instruction Fuzzy Hash: D12195725053809FD712CB25DC45B56BFF8EF46210F0984EAE985CF2A3D324D908CB61
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 76 173a2f4-173a366 79 173a3a0-173a3a5 76->79 80 173a368-173a370 GetLongPathNameW 76->80 79->80 82 173a376-173a388 80->82 83 173a3a7-173a3ac 82->83 84 173a38a-173a39d 82->84 83->84
APIs
  • GetLongPathNameW.KERNELBASE(?,?,?), ref: 0173A36E
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: LongNamePath
  • String ID:
  • API String ID: 82841172-0
  • Opcode ID: 4f02bea60702b087e6b621e3cbedf77382e4d9ae1f539c32fa1166d2f086d8b8
  • Instruction ID: 8c68ad84d6134858020be840297663f1ea8e78634064dd7a76406657559baa55
  • Opcode Fuzzy Hash: 4f02bea60702b087e6b621e3cbedf77382e4d9ae1f539c32fa1166d2f086d8b8
  • Instruction Fuzzy Hash: B221387140D3C09FDB138B64DC55A52BFB4EF47220F0984EBD9848F1A3D2649819CB62
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 94 173a87e-173a8d5 97 173a8d7-173a8df WriteFile 94->97 98 173a919-173a91e 94->98 99 173a8e5-173a8f7 97->99 98->97 101 173a920-173a925 99->101 102 173a8f9-173a916 99->102 101->102
APIs
  • WriteFile.KERNELBASE(?,00000E24,A81662E9,00000000,00000000,00000000,00000000), ref: 0173A8DD
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: FileWrite
  • String ID:
  • API String ID: 3934441357-0
  • Opcode ID: f0bda070117f3530464900299d86949d832c7b03eaa84bcd4761b8493b953ef5
  • Instruction ID: 6ccdf81dc04bccd7963308cfa681f5ac44b688e6e9cbd136c60523236519da47
  • Opcode Fuzzy Hash: f0bda070117f3530464900299d86949d832c7b03eaa84bcd4761b8493b953ef5
  • Instruction Fuzzy Hash: AA110475444204AFEB22CF51DC45F66FBE8EF44324F0484AAEA45DB142C375E414CBB2
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 105 173ab20-173ab66 107 173ab6b-173ab74 105->107 108 173ab68 105->108 109 173ab76-173ab96 ShellExecuteExW 107->109 110 173abb5-173abba 107->110 108->107 113 173ab98-173abb4 109->113 114 173abbc-173abc1 109->114 110->109 114->113
APIs
  • ShellExecuteExW.SHELL32(?), ref: 0173AB7C
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: ExecuteShell
  • String ID:
  • API String ID: 587946157-0
  • Opcode ID: 07ad6e093e575a911d54fe6da4cc209500e61427509f1c820efdfda1f109f3d0
  • Instruction ID: e56d34f60353a19b7afe3c3a026f918329e91d2891ee3a7e3e93486821dd79e5
  • Opcode Fuzzy Hash: 07ad6e093e575a911d54fe6da4cc209500e61427509f1c820efdfda1f109f3d0
  • Instruction Fuzzy Hash: 311160755093809FD712CF25DC95B52FFB89F46220F0884EAED85CB253D264E808CB62
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 86 173a3ae-173a410 88 173a412-173a425 SetErrorMode 86->88 89 173a43b-173a440 86->89 90 173a442-173a447 88->90 91 173a427-173a43a 88->91 89->88 90->91
APIs
  • SetErrorMode.KERNELBASE(?), ref: 0173A418
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: ErrorMode
  • String ID:
  • API String ID: 2340568224-0
  • Opcode ID: 0cae78a9988332820bbb31e0f50ba3708f84c20d74c4a69983f0d8a5cead0be4
  • Instruction ID: dda35eda396c3e447d18383a931fd98c5812c8889efe6766b6b4fba4385095d9
  • Opcode Fuzzy Hash: 0cae78a9988332820bbb31e0f50ba3708f84c20d74c4a69983f0d8a5cead0be4
  • Instruction Fuzzy Hash: 2D118EB14093C45FDB138B25DC54661BFB4EF47224F0980DAEDC58F2A3D2656819DB72
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 116 173a53a-173a55e 117 173a563-173a569 116->117 118 173a560 116->118 119 173a56b 117->119 120 173a56e-173a577 117->120 118->117 119->120 121 173a579-173a581 CreateDirectoryW 120->121 122 173a5b8-173a5bd 120->122 123 173a587-173a599 121->123 122->121 125 173a59b-173a5b7 123->125 126 173a5bf-173a5c4 123->126 126->125
APIs
  • CreateDirectoryW.KERNELBASE(?,?), ref: 0173A57F
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: CreateDirectory
  • String ID:
  • API String ID: 4241100979-0
  • Opcode ID: acb74249a5fd87aac8bdf33df155dc35023de10fae8f3991047d1539c312c6f0
  • Instruction ID: d4c74011a4c0298a49d27aed5744f4a622a33559faf6d8e6e5609924e3d61a87
  • Opcode Fuzzy Hash: acb74249a5fd87aac8bdf33df155dc35023de10fae8f3991047d1539c312c6f0
  • Instruction Fuzzy Hash: 1E11A171A002008FEB11CF19D886B56FBE8EF44220F18C4AAED89CB292D335E404CB61
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 128 173a7be-173a809 131 173a80b-173a81e GetFileType 128->131 132 173a83e-173a843 128->132 133 173a820-173a83d 131->133 134 173a845-173a84a 131->134 132->131 134->133
APIs
  • GetFileType.KERNELBASE(?,00000E24,A81662E9,00000000,00000000,00000000,00000000), ref: 0173A811
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: FileType
  • String ID:
  • API String ID: 3081899298-0
  • Opcode ID: 57435cdc4bf239a54a66fc6514b0e31196add21dc8b314b3ea049cb9dbcfc4e6
  • Instruction ID: 46cf2fef70821f292d83d1144723576ad868100fcb7aad45193593732c30f88d
  • Opcode Fuzzy Hash: 57435cdc4bf239a54a66fc6514b0e31196add21dc8b314b3ea049cb9dbcfc4e6
  • Instruction Fuzzy Hash: FD01D675544204AEE722CF15DC85FB6F7E8DF44724F1480AAEE448B282D374E845CAB6
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 138 173ab42-173ab66 139 173ab6b-173ab74 138->139 140 173ab68 138->140 141 173ab76-173ab7e ShellExecuteExW 139->141 142 173abb5-173abba 139->142 140->139 143 173ab84-173ab96 141->143 142->141 145 173ab98-173abb4 143->145 146 173abbc-173abc1 143->146 146->145
APIs
  • ShellExecuteExW.SHELL32(?), ref: 0173AB7C
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: ExecuteShell
  • String ID:
  • API String ID: 587946157-0
  • Opcode ID: 58a131234e6f4097c84cf828b25f8882b891934b45462aabb54ab53b80f6ce7f
  • Instruction ID: c5a18142521113fbdc70b2ab281796366b477942a01a4302e0459b53b3d8bb50
  • Opcode Fuzzy Hash: 58a131234e6f4097c84cf828b25f8882b891934b45462aabb54ab53b80f6ce7f
  • Instruction Fuzzy Hash: 3C0192756042448FDB11CF59D886B56FBE4DF44220F08C8FADD89CB252D275E444CF61
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 148 173a712-173a73c 149 173a73e-173a746 FindCloseChangeNotification 148->149 150 173a77d-173a782 148->150 152 173a74c-173a75e 149->152 150->149 153 173a760-173a77c 152->153 154 173a784-173a789 152->154 154->153
APIs
  • FindCloseChangeNotification.KERNELBASE(?), ref: 0173A744
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: ChangeCloseFindNotification
  • String ID:
  • API String ID: 2591292051-0
  • Opcode ID: 93962587e52615a81964a9a8fecb360c7219d034b68c660e288ce9d5dd23fba0
  • Instruction ID: 2b2278474a33de0e2417a909c5e8195b0335b27204a3f8dfb5dfcf84dc26c44a
  • Opcode Fuzzy Hash: 93962587e52615a81964a9a8fecb360c7219d034b68c660e288ce9d5dd23fba0
  • Instruction Fuzzy Hash: 8B018F759042449FDB128F19D986766FBE4EF44220F08C4FADD8ACB292D275E458CEA2
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 156 173a336-173a366 157 173a3a0-173a3a5 156->157 158 173a368-173a370 GetLongPathNameW 156->158 157->158 160 173a376-173a388 158->160 161 173a3a7-173a3ac 160->161 162 173a38a-173a39d 160->162 161->162
APIs
  • GetLongPathNameW.KERNELBASE(?,?,?), ref: 0173A36E
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: LongNamePath
  • String ID:
  • API String ID: 82841172-0
  • Opcode ID: 47790a3cef1a5139009f35063563fcd6da82f37458bc616627c625df08726984
  • Instruction ID: a8824d55e8ed9c99a8fedee8cf026500c27cf34ea45a77b36a4c594a003a1b06
  • Opcode Fuzzy Hash: 47790a3cef1a5139009f35063563fcd6da82f37458bc616627c625df08726984
  • Instruction Fuzzy Hash: 710171759042449FDB11CF55D885B55FBE4EF44320F08C4AADD898B252D375A458CFA2
Uniqueness

Uniqueness Score: -1.00%

APIs
  • SetErrorMode.KERNELBASE(?), ref: 0173A418
Memory Dump Source
  • Source File: 00000000.00000002.1206846918.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_173a000_SecuriteInfo.jbxd
Similarity
  • API ID: ErrorMode
  • String ID:
  • API String ID: 2340568224-0
  • Opcode ID: e473e7f8120c8b75c8854d034aa9f90e96e52f8eb5a6fc7bdefb47e82d01438f
  • Instruction ID: 3cde9ff8a464acb2ffca89f3e2bf1ea8d96bf5181b321ea2fe6c47339df39a99
  • Opcode Fuzzy Hash: e473e7f8120c8b75c8854d034aa9f90e96e52f8eb5a6fc7bdefb47e82d01438f
  • Instruction Fuzzy Hash: 6AF0C8748042448FDB11CF09DC8A721FBE4DF44624F08C0EADD498B353D375A454CEA2
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 8578d0163ce618d005ad6c4cb4adcab3f942fe74b36a940d289d76b6e54f7136
  • Instruction ID: 58906532ffb91b570833fef5f481ba4dcd9514089c34cca9b678a86e75a4f5c2
  • Opcode Fuzzy Hash: 8578d0163ce618d005ad6c4cb4adcab3f942fe74b36a940d289d76b6e54f7136
  • Instruction Fuzzy Hash: 6A51EF30B002158FDB259B78C554B7EBAFAAF88214F15806AE605DB795DF71CC81CB92
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 1a00cf5b1f03b6fabf7ffcb7e61136d648c7bfedaa6fb824ad68e58a55d5db30
  • Instruction ID: 8e437debc5c871c41595561f56bb940da4b2dadacfd1388f7341ffd8c588ef69
  • Opcode Fuzzy Hash: 1a00cf5b1f03b6fabf7ffcb7e61136d648c7bfedaa6fb824ad68e58a55d5db30
  • Instruction Fuzzy Hash: AE31473060D3C19FC312D7788960B6ABFF5AF86214F1941ABD449CB293CB359C05C7A2
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 4fb3ff9357668e9208b12c3e72d6a0a8250df365cde23b558f35d4aa776135b5
  • Instruction ID: e3c45c15beb7e4b63afe4a39bfac0f3a7ce4fe8761ac3e300534bc472a63d109
  • Opcode Fuzzy Hash: 4fb3ff9357668e9208b12c3e72d6a0a8250df365cde23b558f35d4aa776135b5
  • Instruction Fuzzy Hash: 47313A34F002189FCB48DB68D554AAEBBF6EF88214F20806AE906E7360DB359C45CF91
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 09dc398d780bdb9a9748219ec8b3d4b2f48cb5a25735ede82ee2bade787c4bc1
  • Instruction ID: d6da5432a5421e69360eb64ddc37d3a58e50ce47666b8c64367d02a0259460a8
  • Opcode Fuzzy Hash: 09dc398d780bdb9a9748219ec8b3d4b2f48cb5a25735ede82ee2bade787c4bc1
  • Instruction Fuzzy Hash: 61216B31B00215CFDB25DF68C1597BE7BF6AB88610F184029E906E7794DF359C45CB92
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 4ed1ffa41680ba258a9aeb578ba3d297da8478e8b7f3804b62a0dc3623a057f1
  • Instruction ID: fd806f3a87a9e3d899f68aebc26b817b4698dcb83fe7373d2baff92f1c613339
  • Opcode Fuzzy Hash: 4ed1ffa41680ba258a9aeb578ba3d297da8478e8b7f3804b62a0dc3623a057f1
  • Instruction Fuzzy Hash: 6F21E530B00345CBDB299B78815867D7EF6AF88224F19806DE601E7791DF71CC86CB91
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 671934c2d696f73abaeba6c2d4588a82f85ee7339089c6e229c1221085be2421
  • Instruction ID: de2e8df2d879afd72bd4eea548d88593f4983037524e1873ddb65a00d57978d7
  • Opcode Fuzzy Hash: 671934c2d696f73abaeba6c2d4588a82f85ee7339089c6e229c1221085be2421
  • Instruction Fuzzy Hash: E121B1747013108B9B6A977991606BE37ABEFE555831586BACD01CB740FF38DC0AC391
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 9b960e2ed529a338333ec98c9e9e9aa54a9564f7ed074216ffe9f1152a91cf26
  • Instruction ID: b5c89f1ef88c7258d1c65bb8ddfa9add587c85eb6abca822c20a22ca29085f30
  • Opcode Fuzzy Hash: 9b960e2ed529a338333ec98c9e9e9aa54a9564f7ed074216ffe9f1152a91cf26
  • Instruction Fuzzy Hash: 5531D234E00618DFDB19CFA9D58499DBBB6FF48304F258865E905AB355D731EC82CB90
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207800660.0000000001AD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1ad0000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: de31742d5c7a990861d8dae36b0c426e2eb21c7e21d6cf9d2053dafd2bb4ed7b
  • Instruction ID: 9087242784c577c706914218d9f91dce9f786b996a40d6acf223e0f6e00f76b0
  • Opcode Fuzzy Hash: de31742d5c7a990861d8dae36b0c426e2eb21c7e21d6cf9d2053dafd2bb4ed7b
  • Instruction Fuzzy Hash: EC01B57650D7806FC7028F15AD41862BFB8DE8626070984EFE949CF653C225A918CBB6
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 0919f2c5d38f3e13a57be5a66905268d038314c1887b771630cb59d7df5200b5
  • Instruction ID: c50d36c02fe56a1aec689718539912402c86a70c960d2a5710b7d8fddc65a3b0
  • Opcode Fuzzy Hash: 0919f2c5d38f3e13a57be5a66905268d038314c1887b771630cb59d7df5200b5
  • Instruction Fuzzy Hash: 35016275E012148FDB49CB78D4551DEBBF6EB99224B10817AD905E3354EB319C028FA1
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207709916.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 7dea6582a6e828bca3db2a99b2ef27257d64dba9d2e13fad9c64e55d2b1cde46
  • Instruction ID: 7708ab646b13382e152db3a9f67eef883a9779d551f17d18bc47418e6253ca16
  • Opcode Fuzzy Hash: 7dea6582a6e828bca3db2a99b2ef27257d64dba9d2e13fad9c64e55d2b1cde46
  • Instruction Fuzzy Hash: 62F06D39B001188B8B15DB74D1608ECB376FFA8228B10812AD916B3780EF359D4ACFA5
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1207800660.0000000001AD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1ad0000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: a499d956a1593e392f29f00e98ac5916b65bb0dd8c4bfa6f0857b193844203dc
  • Instruction ID: 5375a5e57eb44e22134f9166fa63e986b72b77585393c36e1dce5cf97f18aebf
  • Opcode Fuzzy Hash: a499d956a1593e392f29f00e98ac5916b65bb0dd8c4bfa6f0857b193844203dc
  • Instruction Fuzzy Hash: 6AE092B6A046044B9750CF0BEC41452F7E8EB84630B08C07FDD0D8B701D235B914CEA5
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.1206827107.0000000001732000.00000040.00000800.00020000.00000000.sdmp, Offset: 01732000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_1732000_SecuriteInfo.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: cd0540c4af1d5a5b1ac3ab71ed22370e08bd7d70e0ec3fa761d755299f270957
  • Instruction ID: 0ba12565f3bdec9b99352b55c5a56fbc71ac17fa8121ef911883f52928a626c9
  • Opcode Fuzzy Hash: cd0540c4af1d5a5b1ac3ab71ed22370e08bd7d70e0ec3fa761d755299f270957
  • Instruction Fuzzy Hash: 1BD05E352412814BD715DA0CC2D4F59B7D4AB84B14F0644E8AC108B263C7A4D8C0CA00
Uniqueness

Uniqueness Score: -1.00%

Executed Functions

Memory Dump Source
  • Source File: 00000002.00000002.2455105542.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_2df0000_BOWENGOD.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: f6664de14eda922b89f5455e48075124bc1d5959f1b26bdd440b3fa2aa8590c2
  • Instruction ID: 13b8fe2bbac8a97f5e21a866a42408991d1c78da59a2b9a733c3f2fff2ba395d
  • Opcode Fuzzy Hash: f6664de14eda922b89f5455e48075124bc1d5959f1b26bdd440b3fa2aa8590c2
  • Instruction Fuzzy Hash: 42523634A01318CFCB58EF65D894B99B7B2FF4A305F2095A8D6096B369CB31AD81CF54
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000002.00000002.2455105542.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_2df0000_BOWENGOD.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: e40e27fc6a28f189d1d2aa0fb1fd9309d57f23cc3346611ba9fec2a4cf007d6e
  • Instruction ID: 1c5d2c546ab0daeda9b67e48a5cca67ca29db62daad0ac37ac5888fe2041310f
  • Opcode Fuzzy Hash: e40e27fc6a28f189d1d2aa0fb1fd9309d57f23cc3346611ba9fec2a4cf007d6e
  • Instruction Fuzzy Hash: 8F517B70D4121D8BDB14EFBAD458BAEBBB2FF85304F149529C509A7395DB349841CF09
Uniqueness

Uniqueness Score: -1.00%