Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe

Overview

General Information

Sample name:1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
Analysis ID:1391068
MD5:1068f15bcb0132a138ad6496f58ad7d4
SHA1:0035aa784e6f052a384ea044662b5256765aa0fa
SHA256:333f2437106696b8daea10f30724be9b226fb4db1e9f967757fb14f7c8f41511
Tags:base64-decodedexe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"C2 url": ["xwv5group7001.duckdns.org"], "Port": "7001", "Aes key": "<123456789>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
SourceRuleDescriptionAuthorStrings
1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeJoeSecurity_XWormYara detected XWormJoe Security
    1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x70c4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7161:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7276:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6d70:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6ec4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x6f61:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x7076:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x6b70:$cnc4: POST / HTTP/1.1
      00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe PID: 7516JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe.6f0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe.6f0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x70c4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x7161:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x7276:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x6d70:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:163.172.59.233192.168.2.47001497292852870 02/12/24-20:15:13.583849
            SID:2852870
            Source Port:7001
            Destination Port:49729
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.4163.172.59.2334972970012855924 02/12/24-20:15:11.927004
            SID:2855924
            Source Port:49729
            Destination Port:7001
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:163.172.59.233192.168.2.47001497292852874 02/12/24-20:15:13.583849
            SID:2852874
            Source Port:7001
            Destination Port:49729
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeAvira: detected
            Source: 00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["xwv5group7001.duckdns.org"], "Port": "7001", "Aes key": "<123456789>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeReversingLabs: Detection: 76%
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeJoe Sandbox ML: detected
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.4:49729 -> 163.172.59.233:7001
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 163.172.59.233:7001 -> 192.168.2.4:49729
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 163.172.59.233:7001 -> 192.168.2.4:49729
            Source: Malware configuration extractorURLs: xwv5group7001.duckdns.org
            Source: unknownDNS query: name: xwv5group7001.duckdns.org
            Source: global trafficTCP traffic: 192.168.2.4:49729 -> 163.172.59.233:7001
            Source: Joe Sandbox ViewASN Name: OnlineSASFR OnlineSASFR
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownDNS traffic detected: queries for: xwv5group7001.duckdns.org
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, 00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, XLogger.cs.Net Code: KeyboardLayout

            System Summary

            barindex
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe.6f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeCode function: 0_2_00007FFD9B8A63160_2_00007FFD9B8A6316
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeCode function: 0_2_00007FFD9B8A9A8D0_2_00007FFD9B8A9A8D
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeCode function: 0_2_00007FFD9B8A70C20_2_00007FFD9B8A70C2
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNewXClient.exe7001.exe4 vs 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeBinary or memory string: OriginalFilenameNewXClient.exe7001.exe4 vs 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeSection loaded: winmm.dllJump to behavior
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe.6f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeMutant created: NULL
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\mrkh245537gVoEKF
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeReversingLabs: Detection: 76%
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Helper.SB(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeCode function: 0_2_00007FFD9B8A167D push ebx; retf 0_2_00007FFD9B8A16AA
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeMemory allocated: F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeMemory allocated: 1A9F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeWindow / User API: threadDelayed 8710Jump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeWindow / User API: threadDelayed 1136Jump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe TID: 7620Thread sleep time: -21213755684765971s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe TID: 7624Thread sleep count: 8710 > 30Jump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe TID: 7624Thread sleep count: 1136 > 30Jump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, 00000000.00000002.4111143309.000000001BA10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, 00000000.00000002.4109445202.0000000000CBC000.00000004.00000020.00020000.00000000.sdmp, 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, 00000000.00000002.4111143309.000000001BA10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe.6f0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe PID: 7516, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe.6f0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe PID: 7516, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            Input Capture
            21
            Security Software Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture21
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Software Packing
            LSA Secrets13
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe76%ReversingLabsByteCode-MSIL.Trojan.XWorm
            1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe100%AviraTR/Spy.Gen
            1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            xwv5group7001.duckdns.org0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            xwv5group7001.duckdns.org
            163.172.59.233
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              xwv5group7001.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe, 00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                163.172.59.233
                xwv5group7001.duckdns.orgUnited Kingdom
                12876OnlineSASFRtrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1391068
                Start date and time:2024-02-12 20:14:04 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 19s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 98%
                • Number of executed functions: 4
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
                TimeTypeDescription
                20:14:58API Interceptor11941236x Sleep call for process: 1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                163.172.59.233screen_shots.vbsGet hashmaliciousXWormBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  xwv5group7001.duckdns.orgscreen_shots.vbsGet hashmaliciousXWormBrowse
                  • 163.172.59.233
                  IMG-662466100.vbsGet hashmaliciousXWormBrowse
                  • 91.92.251.144
                  IMG5527735001.vbsGet hashmaliciousXWormBrowse
                  • 91.92.251.144
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  OnlineSASFRscreen_shots.vbsGet hashmaliciousXWormBrowse
                  • 163.172.59.233
                  OXnFrFdLpC.elfGet hashmaliciousUnknownBrowse
                  • 51.158.220.13
                  fnKtfdi0P0.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, Stealc, XmrigBrowse
                  • 62.210.123.24
                  ccQGH1mKws.exeGet hashmaliciousGlupteba, SmokeLoader, StealcBrowse
                  • 62.210.105.46
                  IIBXMzS0zN.exeGet hashmaliciousGlupteba, SmokeLoader, Socks5Systemz, Stealc, XmrigBrowse
                  • 163.172.182.26
                  file.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Stealc, XmrigBrowse
                  • 163.172.68.222
                  7abf5ad882fd72332b0b7fb530c8c6505852d4f7ea39edfe444218bdcd9c7f0e_dump.exeGet hashmaliciousGlupteba, SmokeLoader, StealcBrowse
                  • 62.210.83.207
                  file.exeGet hashmaliciousPureLog StealerBrowse
                  • 51.15.150.228
                  S23UhdW5DH.exeGet hashmaliciousLummaC, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                  • 62.210.105.46
                  zbnq9rGNLi.exeGet hashmaliciousLummaC, CryptOne, Glupteba, SmokeLoader, Socks5Systemz, StealcBrowse
                  • 51.15.142.0
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.556242328642917
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
                  File size:34'816 bytes
                  MD5:1068f15bcb0132a138ad6496f58ad7d4
                  SHA1:0035aa784e6f052a384ea044662b5256765aa0fa
                  SHA256:333f2437106696b8daea10f30724be9b226fb4db1e9f967757fb14f7c8f41511
                  SHA512:c8044248cab9af5653f878e553d3d3ff334a013a2510f68b2bd210c6dad429b5b36a4626f1b8df82f3b28bf9dde48e1fa7ff95aa248c65ff2ea702c29da770b4
                  SSDEEP:768:n4fK1pDGkptwyZScCBSUapNgqN5U/kZl+Bcgo5tlTF592SO9hDdRk:XDGkptwyZScCkU4r3UsZcB5o5HF592S/
                  TLSH:CAF24B087FE4832ACAFE2BF529F2651512B4D503EA13D75E18D845AA6F37BC08D013E6
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.e.................~............... ........@.. ....................................@................................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x409bfe
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x65CA3C9F [Mon Feb 12 15:43:27 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9bb00x4b.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x508.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x7c040x7e00e6c45a06631ee230f1ba31853c59127cFalse0.49618675595238093data5.6954176144457405IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xa0000x5080x60051c4dbf4c7e061764d23c0c993d67624False0.3815104166666667data3.8012642701241415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xc0000xc0x200064217dac52cd36d16d6abd04b448fd6False0.041015625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xa0a00x274data0.45222929936305734
                  RT_MANIFEST0xa3180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  163.172.59.233192.168.2.47001497292852870 02/12/24-20:15:13.583849TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes700149729163.172.59.233192.168.2.4
                  192.168.2.4163.172.59.2334972970012855924 02/12/24-20:15:11.927004TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497297001192.168.2.4163.172.59.233
                  163.172.59.233192.168.2.47001497292852874 02/12/24-20:15:13.583849TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2700149729163.172.59.233192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Feb 12, 2024 20:14:59.398528099 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:14:59.593719959 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:14:59.594021082 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:14:59.831568003 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:00.082015991 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:11.927004099 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:12.175095081 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:13.583848953 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:13.632057905 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:23.476512909 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:23.721527100 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:35.039427996 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:35.283682108 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:43.580962896 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:43.632056952 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:47.202920914 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:47.455503941 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:15:58.773153067 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:15:59.017877102 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:08.851119995 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:09.111768007 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:13.605781078 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:13.647845030 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:16.981030941 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:17.236157894 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:17.236531019 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:17.486686945 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:19.627095938 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:19.870927095 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:19.872292042 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:20.117151022 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:31.226370096 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:31.470310926 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:32.245064020 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:32.489065886 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:32.715352058 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:32.970344067 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:34.916084051 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:35.173094988 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:35.317951918 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:35.563738108 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:39.726634979 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:39.970236063 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:40.335484028 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:40.579404116 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:43.264750957 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:43.517007113 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:43.550774097 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:43.757249117 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:44.197125912 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:44.440828085 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:48.002635002 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:48.250797033 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:48.250874043 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:48.501280069 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:48.501528978 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:48.744636059 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:16:49.352322102 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:16:49.610830069 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:00.913755894 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:01.157757044 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:01.158009052 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:01.407311916 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:02.759793043 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:03.009749889 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:04.111289024 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:04.355923891 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:04.609102964 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:04.853872061 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:05.211179018 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:05.469875097 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:05.742007971 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:05.985985041 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:06.089765072 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:06.342925072 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:08.083559036 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:08.327713966 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:08.875215054 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:09.125741005 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:13.581769943 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:13.614607096 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:13.826932907 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:13.827069044 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:14.072165012 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:14.274796963 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:14.519398928 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:15.415687084 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:15.672426939 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:15.672648907 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:15.922257900 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:17.116836071 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:17.359702110 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:19.075427055 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:19.328888893 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:19.445154905 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:19.688477039 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:19.688688040 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:19.933079958 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:21.921469927 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:22.172533989 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:23.354917049 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:23.609405041 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:23.719242096 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:23.968950987 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:27.172976017 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:27.415915012 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:28.076307058 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:28.328609943 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:39.632548094 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:39.876692057 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:41.026793003 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:41.265499115 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:41.265610933 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:41.515711069 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:42.182226896 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:42.437721014 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:42.774013042 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:43.016206026 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:43.578141928 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:43.647851944 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:53.335553885 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:53.576642036 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:53.576738119 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:53.828351021 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:54.208157063 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:54.446793079 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:54.446860075 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:54.690542936 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:54.690618038 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:54.937048912 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:54.937138081 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:55.186963081 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:55.187135935 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:55.431056976 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:55.431159019 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:55.681109905 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:55.681165934 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:55.925081015 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:56.217324018 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:56.461718082 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:17:57.663657904 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:17:57.905941010 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:00.899684906 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:01.155641079 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:01.155720949 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:01.406059980 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:01.504266024 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:01.748342037 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:03.737623930 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:03.983798981 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:03.983961105 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:04.233964920 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:05.241780996 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:05.499340057 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:05.515141964 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:05.764919996 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:05.765000105 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:06.016283035 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:09.666337013 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:09.921463013 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:09.921523094 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:10.169147968 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:12.081464052 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:12.327929974 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:13.132510900 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:13.389523983 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:13.577632904 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:13.741533041 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:17.413856030 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:17.655471087 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:18.417850018 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:18.671123028 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:18.987684965 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:19.233388901 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:21.271927118 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:21.518860102 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:21.518969059 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:21.780193090 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:22.362823963 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:22.608805895 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:23.517971992 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:23.780823946 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:25.781450033 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:26.025492907 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:26.358563900 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:26.602850914 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:30.899945974 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:31.155565023 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:31.675088882 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:31.919181108 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:36.749094963 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:36.997440100 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:37.982665062 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:38.227806091 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:38.227991104 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:38.482291937 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:38.920722961 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:39.164184093 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:39.675082922 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:39.920417070 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:39.920592070 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:40.164241076 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:40.164401054 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:40.404691935 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:40.404802084 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:40.654690981 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:41.698575020 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:41.952285051 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:42.840876102 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:43.092520952 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:43.549913883 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:43.741751909 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:45.108381033 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:45.358043909 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:46.862541914 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:47.108242989 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:48.419641018 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:48.670068026 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:49.750547886 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:49.991770029 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:51.519524097 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:51.763278961 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:52.057960033 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:52.310497999 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:52.310585022 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:52.560535908 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:52.960608959 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:53.217109919 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:53.217195988 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:53.467617035 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:53.467731953 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:53.716921091 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:54.539704084 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:54.789221048 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:56.750377893 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:56.992077112 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:57.287123919 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:57.545614004 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:18:59.694678068 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:18:59.935575962 CET700149729163.172.59.233192.168.2.4
                  Feb 12, 2024 20:19:00.714211941 CET497297001192.168.2.4163.172.59.233
                  Feb 12, 2024 20:19:00.967175961 CET700149729163.172.59.233192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Feb 12, 2024 20:14:59.238491058 CET5068253192.168.2.41.1.1.1
                  Feb 12, 2024 20:14:59.389633894 CET53506821.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Feb 12, 2024 20:14:59.238491058 CET192.168.2.41.1.1.10xdb8bStandard query (0)xwv5group7001.duckdns.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Feb 12, 2024 20:14:59.389633894 CET1.1.1.1192.168.2.40xdb8bNo error (0)xwv5group7001.duckdns.org163.172.59.233A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:20:14:54
                  Start date:12/02/2024
                  Path:C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\Desktop\1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a90478611.dat-decoded.exe
                  Imagebase:0x6f0000
                  File size:34'816 bytes
                  MD5 hash:1068F15BCB0132A138AD6496F58AD7D4
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1660588345.00000000006F2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4109891436.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:21%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:3
                    Total number of Limit Nodes:0
                    execution_graph 3995 7ffd9b8a1bb8 3996 7ffd9b8a1bc1 SetWindowsHookExW 3995->3996 3998 7ffd9b8a1c91 3996->3998

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 45 7ffd9b8a9a8d-7ffd9b8a9a99 46 7ffd9b8a9a9b-7ffd9b8a9ab5 45->46 47 7ffd9b8a9a2d-7ffd9b8a9a37 45->47 49 7ffd9b8a9ab7-7ffd9b8a9ac2 call 7ffd9b8a05c8 46->49 50 7ffd9b8a9aff-7ffd9b8a9b12 46->50 54 7ffd9b8a9ac7-7ffd9b8a9afc 49->54 51 7ffd9b8a9b4a 50->51 52 7ffd9b8a9b14-7ffd9b8a9b31 50->52 55 7ffd9b8a9b4f-7ffd9b8a9b64 51->55 52->55 57 7ffd9b8a9b33-7ffd9b8a9b45 call 7ffd9b8a05d8 52->57 54->50 62 7ffd9b8a9b97-7ffd9b8a9bac 55->62 63 7ffd9b8a9b66-7ffd9b8a9b92 55->63 57->51 74 7ffd9b8aa55e-7ffd9b8aa56e 57->74 69 7ffd9b8a9bbf-7ffd9b8a9bd4 62->69 70 7ffd9b8a9bae-7ffd9b8a9bba call 7ffd9b8a7e10 62->70 63->74 77 7ffd9b8a9bd6-7ffd9b8a9bd9 69->77 78 7ffd9b8a9c2a-7ffd9b8a9c3f 69->78 70->74 77->51 80 7ffd9b8a9bdf-7ffd9b8a9bea 77->80 83 7ffd9b8a9c90-7ffd9b8a9ca5 78->83 84 7ffd9b8a9c41-7ffd9b8a9c44 78->84 80->51 81 7ffd9b8a9bf0-7ffd9b8a9c25 call 7ffd9b8a05b0 call 7ffd9b8a7e10 80->81 81->74 90 7ffd9b8a9ca7-7ffd9b8a9caa 83->90 91 7ffd9b8a9ce2-7ffd9b8a9cf7 83->91 84->51 85 7ffd9b8a9c4a-7ffd9b8a9c55 84->85 85->51 87 7ffd9b8a9c5b-7ffd9b8a9c8b call 7ffd9b8a05b0 call 7ffd9b8a2928 85->87 87->74 90->51 94 7ffd9b8a9cb0-7ffd9b8a9cdd call 7ffd9b8a05b0 call 7ffd9b8a2930 90->94 100 7ffd9b8a9d9b-7ffd9b8a9db0 91->100 101 7ffd9b8a9cfd-7ffd9b8a9d15 call 7ffd9b8a0538 91->101 94->74 110 7ffd9b8a9dcf-7ffd9b8a9de4 100->110 111 7ffd9b8a9db2-7ffd9b8a9db5 100->111 101->51 117 7ffd9b8a9d1b-7ffd9b8a9d96 101->117 122 7ffd9b8a9e06-7ffd9b8a9e1b 110->122 123 7ffd9b8a9de6-7ffd9b8a9de9 110->123 111->51 115 7ffd9b8a9dbb-7ffd9b8a9dca call 7ffd9b8a2908 111->115 115->74 117->74 131 7ffd9b8a9e3b-7ffd9b8a9e50 122->131 132 7ffd9b8a9e1d-7ffd9b8a9e36 122->132 123->51 126 7ffd9b8a9def-7ffd9b8a9e01 call 7ffd9b8a2908 123->126 126->74 137 7ffd9b8a9e70-7ffd9b8a9e85 131->137 138 7ffd9b8a9e52-7ffd9b8a9e6b 131->138 132->74 143 7ffd9b8a9e87-7ffd9b8a9ea0 137->143 144 7ffd9b8a9ea5-7ffd9b8a9eba 137->144 138->74 143->74 147 7ffd9b8a9f5a-7ffd9b8a9f6f 144->147 148 7ffd9b8a9ec0-7ffd9b8a9f38 144->148 152 7ffd9b8a9f87-7ffd9b8a9f9c 147->152 153 7ffd9b8a9f71-7ffd9b8a9f82 147->153 148->51 171 7ffd9b8a9f3e-7ffd9b8a9f55 148->171 158 7ffd9b8aa03c-7ffd9b8aa051 152->158 159 7ffd9b8a9fa2-7ffd9b8aa01a 152->159 153->74 164 7ffd9b8aa069-7ffd9b8aa07e 158->164 165 7ffd9b8aa053-7ffd9b8aa064 158->165 159->51 190 7ffd9b8aa020-7ffd9b8aa037 159->190 173 7ffd9b8aa0bf-7ffd9b8aa0d4 164->173 174 7ffd9b8aa080-7ffd9b8aa0ba call 7ffd9b8a0e80 call 7ffd9b8a8870 164->174 165->74 171->74 180 7ffd9b8aa0e8-7ffd9b8aa0fd 173->180 181 7ffd9b8aa0d6-7ffd9b8aa0e3 call 7ffd9b8a8870 173->181 174->74 188 7ffd9b8aa0ff-7ffd9b8aa139 call 7ffd9b8a0e80 call 7ffd9b8a8870 180->188 189 7ffd9b8aa13e-7ffd9b8aa153 180->189 181->74 188->74 198 7ffd9b8aa159-7ffd9b8aa16a 189->198 199 7ffd9b8aa1e0-7ffd9b8aa1f5 189->199 190->74 198->51 204 7ffd9b8aa170-7ffd9b8aa180 call 7ffd9b8a05a8 198->204 206 7ffd9b8aa1f7-7ffd9b8aa1fa 199->206 207 7ffd9b8aa245-7ffd9b8aa25a 199->207 213 7ffd9b8aa1be-7ffd9b8aa1db call 7ffd9b8a05a8 call 7ffd9b8a05b0 call 7ffd9b8a28e0 204->213 214 7ffd9b8aa182-7ffd9b8aa1b9 call 7ffd9b8a8870 204->214 206->51 209 7ffd9b8aa200-7ffd9b8aa240 call 7ffd9b8a05a0 call 7ffd9b8a05b0 call 7ffd9b8a28e0 206->209 215 7ffd9b8aa2c8-7ffd9b8aa2dd 207->215 216 7ffd9b8aa25c-7ffd9b8aa2c3 call 7ffd9b8a0e80 call 7ffd9b8a8870 207->216 209->74 213->74 214->74 228 7ffd9b8aa50b-7ffd9b8aa520 215->228 229 7ffd9b8aa2e3-7ffd9b8aa31f 215->229 216->74 228->74 241 7ffd9b8aa522-7ffd9b8aa525 228->241 241->51 245 7ffd9b8aa52b-7ffd9b8aa55d 241->245 245->74
                    Memory Dump Source
                    • Source File: 00000000.00000002.4111659705.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a9.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: acb0ff278ca1519aaa8ada4a53ae40c66bc88e2f27a6b0903dc55878750df6fc
                    • Instruction ID: 5c8b2bc842b6cf2cc6e2fa2c14234f815396a9c35712db188e2c52339429dc40
                    • Opcode Fuzzy Hash: acb0ff278ca1519aaa8ada4a53ae40c66bc88e2f27a6b0903dc55878750df6fc
                    • Instruction Fuzzy Hash: 3F42A130B1C90E8FEBA4EB788469A7977D2EF98310B514579D01DD32E6DE39ED428740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 258 7ffd9b8a6316-7ffd9b8a6323 259 7ffd9b8a6325-7ffd9b8a632d 258->259 260 7ffd9b8a632e-7ffd9b8a63f7 258->260 259->260 264 7ffd9b8a63f9-7ffd9b8a6402 260->264 265 7ffd9b8a6463 260->265 264->265 266 7ffd9b8a6404-7ffd9b8a6410 264->266 267 7ffd9b8a6465-7ffd9b8a648a 265->267 268 7ffd9b8a6449-7ffd9b8a6461 266->268 269 7ffd9b8a6412-7ffd9b8a6424 266->269 274 7ffd9b8a64f6 267->274 275 7ffd9b8a648c-7ffd9b8a6495 267->275 268->267 270 7ffd9b8a6426 269->270 271 7ffd9b8a6428-7ffd9b8a643b 269->271 270->271 271->271 273 7ffd9b8a643d-7ffd9b8a6445 271->273 273->268 276 7ffd9b8a64f8-7ffd9b8a65a0 274->276 275->274 277 7ffd9b8a6497-7ffd9b8a64a3 275->277 288 7ffd9b8a660e 276->288 289 7ffd9b8a65a2-7ffd9b8a65ac 276->289 278 7ffd9b8a64a5-7ffd9b8a64b7 277->278 279 7ffd9b8a64dc-7ffd9b8a64f4 277->279 281 7ffd9b8a64b9 278->281 282 7ffd9b8a64bb-7ffd9b8a64ce 278->282 279->276 281->282 282->282 283 7ffd9b8a64d0-7ffd9b8a64d8 282->283 283->279 290 7ffd9b8a6610-7ffd9b8a6639 288->290 289->288 291 7ffd9b8a65ae-7ffd9b8a65bb 289->291 298 7ffd9b8a663b-7ffd9b8a6646 290->298 299 7ffd9b8a66a3 290->299 292 7ffd9b8a65bd-7ffd9b8a65cf 291->292 293 7ffd9b8a65f4-7ffd9b8a660c 291->293 295 7ffd9b8a65d1 292->295 296 7ffd9b8a65d3-7ffd9b8a65e6 292->296 293->290 295->296 296->296 297 7ffd9b8a65e8-7ffd9b8a65f0 296->297 297->293 298->299 300 7ffd9b8a6648-7ffd9b8a6656 298->300 301 7ffd9b8a66a5-7ffd9b8a6736 299->301 302 7ffd9b8a6658-7ffd9b8a666a 300->302 303 7ffd9b8a668f-7ffd9b8a66a1 300->303 309 7ffd9b8a673c-7ffd9b8a674b 301->309 305 7ffd9b8a666c 302->305 306 7ffd9b8a666e-7ffd9b8a6681 302->306 303->301 305->306 306->306 307 7ffd9b8a6683-7ffd9b8a668b 306->307 307->303 310 7ffd9b8a674d 309->310 311 7ffd9b8a6753-7ffd9b8a67b8 call 7ffd9b8a67d4 309->311 310->311 318 7ffd9b8a67ba 311->318 319 7ffd9b8a67bf-7ffd9b8a67d3 311->319 318->319
                    Memory Dump Source
                    • Source File: 00000000.00000002.4111659705.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a9.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5f6cbd706efaa35e1e304f6b89a564abc368fbd4dea22a90096dc5cc3d62034b
                    • Instruction ID: 89493306ef7b117bf7b5077fb2569afaeeab3694fc6fa584b9b37e243a070c4f
                    • Opcode Fuzzy Hash: 5f6cbd706efaa35e1e304f6b89a564abc368fbd4dea22a90096dc5cc3d62034b
                    • Instruction Fuzzy Hash: 07F1A570A09A8D8FEBA8DF28C855BE937E1FF59310F04426EE84DC7295DF3499458B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 320 7ffd9b8a70c2-7ffd9b8a70cf 321 7ffd9b8a70da-7ffd9b8a71a7 320->321 322 7ffd9b8a70d1-7ffd9b8a70d9 320->322 326 7ffd9b8a71a9-7ffd9b8a71b2 321->326 327 7ffd9b8a7213 321->327 322->321 326->327 329 7ffd9b8a71b4-7ffd9b8a71c0 326->329 328 7ffd9b8a7215-7ffd9b8a723a 327->328 335 7ffd9b8a72a6 328->335 336 7ffd9b8a723c-7ffd9b8a7245 328->336 330 7ffd9b8a71f9-7ffd9b8a7211 329->330 331 7ffd9b8a71c2-7ffd9b8a71d4 329->331 330->328 333 7ffd9b8a71d6 331->333 334 7ffd9b8a71d8-7ffd9b8a71eb 331->334 333->334 334->334 337 7ffd9b8a71ed-7ffd9b8a71f5 334->337 339 7ffd9b8a72a8-7ffd9b8a72cd 335->339 336->335 338 7ffd9b8a7247-7ffd9b8a7253 336->338 337->330 340 7ffd9b8a7255-7ffd9b8a7267 338->340 341 7ffd9b8a728c-7ffd9b8a72a4 338->341 346 7ffd9b8a733b 339->346 347 7ffd9b8a72cf-7ffd9b8a72d9 339->347 342 7ffd9b8a7269 340->342 343 7ffd9b8a726b-7ffd9b8a727e 340->343 341->339 342->343 343->343 345 7ffd9b8a7280-7ffd9b8a7288 343->345 345->341 348 7ffd9b8a733d-7ffd9b8a736b 346->348 347->346 349 7ffd9b8a72db-7ffd9b8a72e8 347->349 356 7ffd9b8a73db 348->356 357 7ffd9b8a736d-7ffd9b8a7378 348->357 350 7ffd9b8a72ea-7ffd9b8a72fc 349->350 351 7ffd9b8a7321-7ffd9b8a7339 349->351 352 7ffd9b8a72fe 350->352 353 7ffd9b8a7300-7ffd9b8a7313 350->353 351->348 352->353 353->353 355 7ffd9b8a7315-7ffd9b8a731d 353->355 355->351 358 7ffd9b8a73dd-7ffd9b8a74b5 356->358 357->356 359 7ffd9b8a737a-7ffd9b8a7388 357->359 369 7ffd9b8a74bb-7ffd9b8a74ca 358->369 360 7ffd9b8a738a-7ffd9b8a739c 359->360 361 7ffd9b8a73c1-7ffd9b8a73d9 359->361 363 7ffd9b8a739e 360->363 364 7ffd9b8a73a0-7ffd9b8a73b3 360->364 361->358 363->364 364->364 366 7ffd9b8a73b5-7ffd9b8a73bd 364->366 366->361 370 7ffd9b8a74cc 369->370 371 7ffd9b8a74d2-7ffd9b8a7534 call 7ffd9b8a7550 369->371 370->371 378 7ffd9b8a7536 371->378 379 7ffd9b8a753b-7ffd9b8a754f 371->379 378->379
                    Memory Dump Source
                    • Source File: 00000000.00000002.4111659705.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a9.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ee201a93a3bf6004ee5b4edfb716a3392b905dee23cfd8ca64c6e91de97b59f0
                    • Instruction ID: 3b29e5abba2618f8dfe85b61ce9927616881aba31fb4be7df05af464b208e268
                    • Opcode Fuzzy Hash: ee201a93a3bf6004ee5b4edfb716a3392b905dee23cfd8ca64c6e91de97b59f0
                    • Instruction Fuzzy Hash: 21E1E530A09A4E8FEBA8DF68C8657E937D1FF58310F05426EE84DC72A1DF7499418B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.4111659705.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_1707765188292b82159fb496a7b8faef3eed8405341a5e1f23597583777c553dcec1a9.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: 8b3dfe776df88cc81e2dc160a3a101f8d35fd1fe3fed2bfacf3c5c9446a91da9
                    • Instruction ID: b08b59d40f4ac0ee992b4e3bebaea6aadd0221c564167ce28c014efce15d131d
                    • Opcode Fuzzy Hash: 8b3dfe776df88cc81e2dc160a3a101f8d35fd1fe3fed2bfacf3c5c9446a91da9
                    • Instruction Fuzzy Hash: 8441F630A1CA5D8FDB18EF6898166F97BE1EB5A321F10027ED059C3292DE64A852C791
                    Uniqueness

                    Uniqueness Score: -1.00%