Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hot.exe

Overview

General Information

Sample name:hot.exe
Analysis ID:1447001
MD5:de9ffcf77572e26f4baa2095dfa7fb87
SHA1:210ae1175ab66311068ee5f8bcfd498ad2d04d18
SHA256:194e405f98dadc88a7041b0724e31db7a92537f200c380b0e89674177ae0a963
Tags:exemetasploitrozena
Infos:

Detection

Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Sigma detected: Potentially Suspicious Malware Callback Communication
Detected TCP or UDP traffic on non-standard ports
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hot.exe (PID: 768 cmdline: "C:\Users\user\Desktop\hot.exe" MD5: DE9FFCF77572E26F4BAA2095DFA7FB87)
  • cleanup
{"Type": "Metasploit Connect", "IP": "185.228.139.123", "Port": 4444}
SourceRuleDescriptionAuthorStrings
hot.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    hot.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      hot.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x2004:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0x1004:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
          • 0xd8:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
          00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.hot.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.2.hot.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                0.0.hot.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                  0.2.hot.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
                  • 0x2004:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
                  0.0.hot.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                    Click to see the 1 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 185.228.139.123, DestinationIsIpv6: false, DestinationPort: 4444, EventID: 3, Image: C:\Users\user\Desktop\hot.exe, Initiated: true, ProcessId: 768, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: hot.exeAvira: detected
                    Source: hot.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "185.228.139.123", "Port": 4444}
                    Source: hot.exeReversingLabs: Detection: 86%
                    Source: hot.exeVirustotal: Detection: 86%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
                    Source: hot.exeJoe Sandbox ML: detected
                    Source: hot.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: hot.exe
                    Source: C:\Users\user\Desktop\hot.exeCode function: 4x nop then outsb 0_2_004048F3
                    Source: C:\Users\user\Desktop\hot.exeCode function: 4x nop then push ebp0_2_004055CB
                    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 185.228.139.123:4444
                    Source: Joe Sandbox ViewASN Name: NETCUP-ASnetcupGmbHDE NETCUP-ASnetcupGmbHDE
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_006A0095 WSASocketA,connect,recv,closesocket,0_2_006A0095
                    Source: hot.exeString found in binary or memory: http://www.apache.org/
                    Source: hot.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: hot.exeString found in binary or memory: http://www.zeustech.net/

                    System Summary

                    barindex
                    Source: hot.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.2.hot.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.0.hot.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: hot.exe, 00000000.00000000.1966682312.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs hot.exe
                    Source: hot.exeBinary or memory string: OriginalFilenameab.exeF vs hot.exe
                    Source: hot.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: hot.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.2.hot.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.0.hot.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: hot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.winEXE@1/0@0/1
                    Source: hot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\hot.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: hot.exeReversingLabs: Detection: 86%
                    Source: hot.exeVirustotal: Detection: 86%
                    Source: C:\Users\user\Desktop\hot.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\hot.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\hot.exeSection loaded: mswsock.dllJump to behavior
                    Source: hot.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: hot.exe
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_00403865 push es; retf 0_2_00403883
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_00407467 pushfd ; ret 0_2_0040748F
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_004096C0 push 46E58B07h; ret 0_2_004096F1
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_004096D0 push 46E58B07h; ret 0_2_004096F1
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_00406770 push esp; ret 0_2_00406775
                    Source: C:\Users\user\Desktop\hot.exeCode function: 0_2_004075B9 pushfd ; iretd 0_2_004075E6
                    Source: hot.exeStatic PE information: section name: .text entropy: 7.018049873082076
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: hot.exe, 00000000.00000002.2142966468.00000000006DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: hot.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.hot.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.hot.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    2
                    Software Packing
                    OS Credential Dumping1
                    Security Software Discovery
                    Remote ServicesData from Local System1
                    Non-Standard Port
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    LSASS Memory1
                    System Information Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    hot.exe87%ReversingLabsWin32.Trojan.Swrort
                    hot.exe86%VirustotalBrowse
                    hot.exe100%AviraTR/Patched.Gen2
                    hot.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.apache.org/0%URL Reputationsafe
                    http://www.zeustech.net/0%Avira URL Cloudsafe
                    http://www.zeustech.net/0%VirustotalBrowse
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0hot.exefalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/hot.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.zeustech.net/hot.exefalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.228.139.123
                    unknownGermany
                    197540NETCUP-ASnetcupGmbHDEtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1447001
                    Start date and time:2024-05-24 08:08:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 3m 48s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:hot.exe
                    Detection:MAL
                    Classification:mal100.troj.winEXE@1/0@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 86%
                    • Number of executed functions: 7
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.228.139.123cracked.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                      ranger.exeGet hashmaliciousMetasploitBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        NETCUP-ASnetcupGmbHDEcracked.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                        • 185.228.139.123
                        ranger.exeGet hashmaliciousMetasploitBrowse
                        • 185.228.139.123
                        file.exeGet hashmaliciousCMSBruteBrowse
                        • 37.120.171.230
                        gtKVgxrJ22.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
                        • 195.128.101.64
                        jXBjxhHQgR.exeGet hashmaliciousCMSBruteBrowse
                        • 5.45.98.188
                        INVOICE087667899.exeGet hashmaliciousUnknownBrowse
                        • 93.177.67.178
                        z8s945rPmZ.exeGet hashmaliciousSystemBCBrowse
                        • 185.243.11.41
                        does virginia have a no chase law for motorcycles 62848.jsGet hashmaliciousUnknownBrowse
                        • 46.38.249.148
                        http://92.60.39.76:9993/wr.exeGet hashmaliciousXmrigBrowse
                        • 92.60.39.76
                        http://92.60.39.76:9993/wr.exeGet hashmaliciousUnknownBrowse
                        • 92.60.39.76
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.326903804700931
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:hot.exe
                        File size:73'802 bytes
                        MD5:de9ffcf77572e26f4baa2095dfa7fb87
                        SHA1:210ae1175ab66311068ee5f8bcfd498ad2d04d18
                        SHA256:194e405f98dadc88a7041b0724e31db7a92537f200c380b0e89674177ae0a963
                        SHA512:1e7f29dd2c52f593ef2b23b3d19c70366bbe87126e3565fedf802c516908b4121daf3e91465f18e114dcdaa3b5bf72d52f737e9c3be952931a9f066edf9b2662
                        SSDEEP:1536:I1cCF7Zrxh8HXfrs04gVjdhBrMb+KR0Nc8QsJq39:EF7d8vzJhdhle0Nc8QsC9
                        TLSH:A473A042E9C41475D196117E637136B6E970F4FD2702C1DA7A8CCDFAEBC18A0927A3CA
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...~3.J...........
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x40132b
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x4AB0337E [Wed Sep 16 00:38:22 2009 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:481f47bbb2c9c21e108d65f52b04c448
                        Instruction
                        lahf
                        dec ebx
                        std
                        aas
                        clc
                        aaa
                        dec ebx
                        xchg eax, ebx
                        xchg eax, ebx
                        inc ecx
                        dec ecx
                        cmc
                        daa
                        inc eax
                        salc
                        das
                        clc
                        clc
                        cld
                        wait
                        lahf
                        clc
                        inc eax
                        cmc
                        dec eax
                        cwde
                        inc ebx
                        dec edx
                        salc
                        dec eax
                        dec edx
                        aas
                        inc eax
                        inc edx
                        dec eax
                        xchg eax, ecx
                        das
                        dec edx
                        xchg eax, ecx
                        cwde
                        nop
                        xchg eax, ebx
                        cdq
                        inc edx
                        xchg eax, edx
                        cwde
                        dec ecx
                        std
                        salc
                        nop
                        cwde
                        inc eax
                        dec ecx
                        xchg eax, ecx
                        std
                        inc eax
                        dec eax
                        cwde
                        wait
                        aaa
                        clc
                        inc ecx
                        inc edx
                        lahf
                        lahf
                        dec eax
                        std
                        das
                        daa
                        lahf
                        xchg eax, ecx
                        dec eax
                        inc edx
                        inc ecx
                        xchg eax, edx
                        dec ecx
                        dec edx
                        dec ecx
                        salc
                        dec ebx
                        clc
                        stc
                        inc ebx
                        dec edx
                        dec eax
                        salc
                        dec eax
                        cmc
                        std
                        inc ebx
                        std
                        cwde
                        xchg eax, ecx
                        das
                        xchg eax, edx
                        das
                        inc ebx
                        daa
                        dec eax
                        das
                        dec ecx
                        dec ebx
                        xchg eax, edx
                        daa
                        cwde
                        salc
                        lahf
                        wait
                        xchg eax, ecx
                        wait
                        wait
                        salc
                        inc edx
                        dec ecx
                        std
                        inc ecx
                        dec ecx
                        clc
                        aas
                        std
                        inc edx
                        aas
                        dec eax
                        stc
                        dec ecx
                        cwde
                        stc
                        cmc
                        std
                        inc eax
                        dec edx
                        dec ecx
                        inc ebx
                        daa
                        cld
                        nop
                        daa
                        xchg eax, ecx
                        inc ebx
                        cld
                        wait
                        das
                        aas
                        wait
                        dec edx
                        wait
                        dec ebx
                        std
                        inc eax
                        inc ebx
                        inc ecx
                        stc
                        cmc
                        inc eax
                        daa
                        std
                        aas
                        inc edx
                        daa
                        aaa
                        cwde
                        dec ecx
                        dec ebx
                        das
                        dec ecx
                        cdq
                        dec ebx
                        dec ecx
                        lahf
                        salc
                        xchg eax, ecx
                        xchg eax, edx
                        cld
                        inc ecx
                        inc eax
                        xchg eax, ebx
                        wait
                        aas
                        std
                        xchg eax, ecx
                        cdq
                        inc ecx
                        stc
                        xchg eax, edx
                        lahf
                        das
                        salc
                        inc ecx
                        xchg eax, ebx
                        daa
                        nop
                        inc eax
                        std
                        inc ebx
                        inc ebx
                        nop
                        dec edx
                        aaa
                        xchg eax, ebx
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xa9660xb0001f89a98da7f97af425bf189ac89a4565False0.8161399147727273data7.018049873082076IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                        DLLImport
                        MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                        KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                        ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                        WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                        WS2_32.dllWSARecv, WSASend
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        May 24, 2024 08:08:52.687985897 CEST497044444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:52.693135977 CEST444449704185.228.139.123192.168.2.5
                        May 24, 2024 08:08:52.693404913 CEST497044444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:54.321208000 CEST444449704185.228.139.123192.168.2.5
                        May 24, 2024 08:08:54.321433067 CEST497044444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:54.339118958 CEST497044444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:54.344189882 CEST444449704185.228.139.123192.168.2.5
                        May 24, 2024 08:08:54.345601082 CEST497054444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:54.350632906 CEST444449705185.228.139.123192.168.2.5
                        May 24, 2024 08:08:54.350857973 CEST497054444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:55.977478981 CEST444449705185.228.139.123192.168.2.5
                        May 24, 2024 08:08:55.977679014 CEST497054444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:55.978159904 CEST497054444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:55.978903055 CEST497064444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:55.988204002 CEST444449705185.228.139.123192.168.2.5
                        May 24, 2024 08:08:56.035355091 CEST444449706185.228.139.123192.168.2.5
                        May 24, 2024 08:08:56.035615921 CEST497064444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:57.686635017 CEST444449706185.228.139.123192.168.2.5
                        May 24, 2024 08:08:57.686984062 CEST497064444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:57.687218904 CEST497064444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:57.688033104 CEST497074444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:57.697010994 CEST444449706185.228.139.123192.168.2.5
                        May 24, 2024 08:08:57.747438908 CEST444449707185.228.139.123192.168.2.5
                        May 24, 2024 08:08:57.747828960 CEST497074444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:59.387412071 CEST444449707185.228.139.123192.168.2.5
                        May 24, 2024 08:08:59.387655020 CEST497074444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:59.387916088 CEST497074444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:59.388694048 CEST497084444192.168.2.5185.228.139.123
                        May 24, 2024 08:08:59.397516012 CEST444449707185.228.139.123192.168.2.5
                        May 24, 2024 08:08:59.447325945 CEST444449708185.228.139.123192.168.2.5
                        May 24, 2024 08:08:59.447582960 CEST497084444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:01.098376989 CEST444449708185.228.139.123192.168.2.5
                        May 24, 2024 08:09:01.098715067 CEST497084444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:01.099091053 CEST497084444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:01.100259066 CEST497094444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:01.108510971 CEST444449708185.228.139.123192.168.2.5
                        May 24, 2024 08:09:01.155294895 CEST444449709185.228.139.123192.168.2.5
                        May 24, 2024 08:09:01.155400991 CEST497094444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:02.809432983 CEST444449709185.228.139.123192.168.2.5
                        May 24, 2024 08:09:02.809509993 CEST497094444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:02.809917927 CEST497094444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:02.810687065 CEST497104444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:02.819360018 CEST444449709185.228.139.123192.168.2.5
                        May 24, 2024 08:09:02.867394924 CEST444449710185.228.139.123192.168.2.5
                        May 24, 2024 08:09:02.867594957 CEST497104444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:04.531936884 CEST444449710185.228.139.123192.168.2.5
                        May 24, 2024 08:09:04.532150984 CEST497104444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:04.532602072 CEST497104444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:04.533309937 CEST497114444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:04.542104006 CEST444449710185.228.139.123192.168.2.5
                        May 24, 2024 08:09:04.591320038 CEST444449711185.228.139.123192.168.2.5
                        May 24, 2024 08:09:04.591527939 CEST497114444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:06.250333071 CEST444449711185.228.139.123192.168.2.5
                        May 24, 2024 08:09:06.250418901 CEST497114444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:06.250844002 CEST497114444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:06.251750946 CEST497124444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:06.263322115 CEST444449711185.228.139.123192.168.2.5
                        May 24, 2024 08:09:06.315428972 CEST444449712185.228.139.123192.168.2.5
                        May 24, 2024 08:09:06.315656900 CEST497124444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:07.984026909 CEST444449712185.228.139.123192.168.2.5
                        May 24, 2024 08:09:07.984281063 CEST497124444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:08.556834936 CEST497124444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:08.557610035 CEST497134444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:08.561845064 CEST444449712185.228.139.123192.168.2.5
                        May 24, 2024 08:09:08.607424974 CEST444449713185.228.139.123192.168.2.5
                        May 24, 2024 08:09:08.607628107 CEST497134444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:10.247121096 CEST444449713185.228.139.123192.168.2.5
                        May 24, 2024 08:09:10.247333050 CEST497134444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:10.247683048 CEST497134444192.168.2.5185.228.139.123
                        May 24, 2024 08:09:10.257178068 CEST444449713185.228.139.123192.168.2.5
                        TimestampSource PortDest PortSource IPDest IP
                        May 24, 2024 08:09:14.324721098 CEST53508151.1.1.1192.168.2.5

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:02:08:51
                        Start date:24/05/2024
                        Path:C:\Users\user\Desktop\hot.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\hot.exe"
                        Imagebase:0x400000
                        File size:73'802 bytes
                        MD5 hash:DE9FFCF77572E26F4BAA2095DFA7FB87
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.1966597061.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:0.7%
                          Dynamic/Decrypted Code Coverage:17%
                          Signature Coverage:15.1%
                          Total number of Nodes:53
                          Total number of Limit Nodes:3
                          execution_graph 2924 408a80 strerror 2925 408a94 2924->2925 2901 402863 qsort 2902 40289d 2901->2902 2904 4028ce 2901->2904 2903 40287e qsort 2902->2903 2902->2904 2903->2902 2903->2904 2926 4080a6 2929 4080ae 2926->2929 2927 408066 modf 2928 40807b 2927->2928 2929->2927 2929->2928 2879 401da7 2880 401d8c VirtualAlloc 2879->2880 2882 401dcf 2880->2882 2883 6a0000 2886 6a0095 2883->2886 2887 6a00aa 2886->2887 2888 6a00bc WSASocketA 2887->2888 2889 6a00d8 connect 2888->2889 2890 6a00f1 recv 2889->2890 2892 6a00e7 2889->2892 2891 6a0139 closesocket 2890->2891 2890->2892 2891->2888 2891->2892 2892->2889 2892->2890 2892->2891 2893 6a0006 2892->2893 2907 401a0c 2908 401a1e 2907->2908 2911 401d58 2908->2911 2912 401d74 VirtualAlloc 2911->2912 2914 401dcf 2912->2914 2905 407070 gethostbyname 2906 40708b 2905->2906 2935 401d50 2936 401d54 VirtualAlloc 2935->2936 2938 401dcf 2936->2938 2894 408052 2895 40805a modf 2894->2895 2896 40807b 2894->2896 2895->2896 2915 4012da 2916 4012e6 2915->2916 2917 401d58 VirtualAlloc 2916->2917 2918 401a23 2917->2918 2897 40285e 2898 40287e qsort 2897->2898 2899 40289d 2898->2899 2900 4028ce 2898->2900 2899->2898 2899->2900 2919 4080fe 2920 4080cd 2919->2920 2921 4080db 2920->2921 2922 408066 modf 2920->2922 2921->2921 2923 40807b 2922->2923 2930 4080be 2931 4080cd 2930->2931 2932 408066 modf 2931->2932 2933 4080db 2931->2933 2934 40807b 2932->2934

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 6a0095-6a00ba 3 6a00bc-6a00d7 WSASocketA 0->3 4 6a00d8-6a00e5 connect 3->4 5 6a00f1-6a0101 recv 4->5 6 6a00e7-6a00ea 4->6 8 6a0139-6a0146 closesocket 5->8 9 6a0103-6a0117 5->9 6->4 7 6a00ec call 6a0158 6->7 7->5 8->3 10 6a014c 8->10 13 6a0118-6a0127 9->13 10->7 15 6a0129-6a0132 13->15 16 6a0151-6a0155 13->16 15->8 16->13 17 6a0157 16->17
                          APIs
                          • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,5C110002,7B8BE4B9,0000000A,?,?,5F327377,00003233), ref: 006A00D5
                          • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 006A00E1
                          • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 006A00FC
                          • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 006A013F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142942895.00000000006A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_6a0000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: Socketclosesocketconnectrecv
                          • String ID:
                          • API String ID: 2083937939-0
                          • Opcode ID: d30f026dcc911f5eaead0688b332088694eea6a20b7db6d9e727deff9f5c20be
                          • Instruction ID: fd4dc147a49e0e7fdb80f22de79ec8bd063cae56c0931d05ecc7db2b7efa11ad
                          • Opcode Fuzzy Hash: d30f026dcc911f5eaead0688b332088694eea6a20b7db6d9e727deff9f5c20be
                          • Instruction Fuzzy Hash: BC11CCB07802983EF53032A69C07FFB791CCF43BA8F110029BB45EA1C1C992AC4085FA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 18 401da7-401daa 19 401d8c-401da2 18->19 20 401dac-401db2 18->20 22 401db4-401dbd VirtualAlloc 19->22 20->22 23 401dcf-401df4 call 401f27 22->23 28 401df5 23->28 28->28
                          APIs
                          • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00401DBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: a12c6e8e49a27229ae3c5f5d7822d255dd41ce9c567fa7223cf449aa573d7ea4
                          • Instruction ID: 8b591fcd1d859c176b2dd51a48897bebbe986a8da73b03974c745c0b4ecf3b5f
                          • Opcode Fuzzy Hash: a12c6e8e49a27229ae3c5f5d7822d255dd41ce9c567fa7223cf449aa573d7ea4
                          • Instruction Fuzzy Hash: B1E0D861399246DBD6003E5088D21F537C99F1E3417201A36D44BAB2F3DA747502A65A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 29 401d50-401d52 30 401d54-401d55 29->30 31 401d76-401d8b 29->31 32 401d95-401d9a 30->32 33 401d57 30->33 35 401d9f-401df4 VirtualAlloc call 401f27 31->35 32->35 33->31 42 401df5 35->42 42->42
                          APIs
                          • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00401DBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 4132f128bd94e0b2698c861ebd9a2b8994c23292d83194215efec6fbf47b17a6
                          • Instruction ID: 22a4f9e1f32fc30316f368b1a9c9e23bb3f451528baa5ee74c3eca02dbef07b2
                          • Opcode Fuzzy Hash: 4132f128bd94e0b2698c861ebd9a2b8994c23292d83194215efec6fbf47b17a6
                          • Instruction Fuzzy Hash: 0DE0262034D1D9DBD6037A6084816F87A875F0F781B201533E847B91F2D9BC3403622F

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 43 401d66-401df4 VirtualAlloc call 401f27 54 401df5 43->54 54->54
                          APIs
                          • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00401DBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 43e3a67009e2cc4d1d91f7a271febd32e2399b90eb2e7145ae2165e4c3bce837
                          • Instruction ID: a0204d764836d8f7f35964fc2906d9d58722ab20df33c151f6dcd9f8761b621a
                          • Opcode Fuzzy Hash: 43e3a67009e2cc4d1d91f7a271febd32e2399b90eb2e7145ae2165e4c3bce837
                          • Instruction Fuzzy Hash: 43E08C2028D286DBC000666148867F9218A1F4E781F301936A64BBA1F1CAB86102629E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 55 401d58-401df4 VirtualAlloc call 401f27 66 401df5 55->66 66->66
                          APIs
                          • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00401DBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 7310f6efe4296d7f310ff911644af03a18dc7cc8b46f202bfadc91a9b7e1d6ff
                          • Instruction ID: 9fca57e173d7bb98229512d7d39bc469c4e8e309763de5c351a4003721aa425c
                          • Opcode Fuzzy Hash: 7310f6efe4296d7f310ff911644af03a18dc7cc8b46f202bfadc91a9b7e1d6ff
                          • Instruction Fuzzy Hash: 88D017243DE189E6D00121608882BFA518A1F0E782F202933AA0F761E299BC2402219F

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 67 401d90-401df4 VirtualAlloc call 401f27 75 401df5 67->75 75->75
                          APIs
                          • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00401DBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 3351bbbf68dcf42d826247a8ab76b95cceade298e78028f01dcaae6b52c363e2
                          • Instruction ID: cda3b2a9287f4f52490d00a6b5f25d3d9bcb041b0ee8fabb75a650617eb15363
                          • Opcode Fuzzy Hash: 3351bbbf68dcf42d826247a8ab76b95cceade298e78028f01dcaae6b52c363e2
                          • Instruction Fuzzy Hash: 05D05E3025D189DFD600BE6084812F576CB5F1E381B701A3AD80BBA1E2DEBC7802A65E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 76 401d89-401df4 VirtualAlloc call 401f27 84 401df5 76->84 84->84
                          APIs
                          • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00401DBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: e44746c50d74001ec86b992fb59fb66a24ec1cdf003cef781942761cabcafca6
                          • Instruction ID: b3947d0234e853e5bd8ff974dfe031b16c7c977ed0ce794371792439aa4c2cb6
                          • Opcode Fuzzy Hash: e44746c50d74001ec86b992fb59fb66a24ec1cdf003cef781942761cabcafca6
                          • Instruction Fuzzy Hash: DAC0121438D149D7C04076A088817F8108B0F0E741F702937940FB51F2DDBC2403715F
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 039f0455b507013a8700257e8658f9af6edcc47e10fcdf47ecdca07238aa146e
                          • Instruction ID: b069a52e15f88f0bd75ee13d2957d68d11c92b80273ee7489bad17d7e43b9375
                          • Opcode Fuzzy Hash: 039f0455b507013a8700257e8658f9af6edcc47e10fcdf47ecdca07238aa146e
                          • Instruction Fuzzy Hash: 060149705087819EC715CF689880AD9BFB4EF42330F2447AED464CF692C320D485CB95
                          Memory Dump Source
                          • Source File: 00000000.00000002.2142783851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.2142763833.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142805745.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142825736.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.2142846184.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_hot.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 438b1b789be0b818d9efc19669a70cd2367cad539b25d9c57029a0814946adf3
                          • Instruction ID: a1c1d65d24bf94b08b84d029928238538ea049b644b0cec1f46a363bbf89d601
                          • Opcode Fuzzy Hash: 438b1b789be0b818d9efc19669a70cd2367cad539b25d9c57029a0814946adf3
                          • Instruction Fuzzy Hash: 75C02B2850D2040B4702EC8C98D06F6F7FB2BA7740F047001C2057B303C511F04E87D8