Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
venom.exe

Overview

General Information

Sample name:venom.exe
Analysis ID:1447007
MD5:195032debcdcfbd4e56986070144a475
SHA1:ae0dc7a77bbbbb868f58d7fadf744201c62a580c
SHA256:18efb574f87cff4df096736e24266656d17108ce4c0f183d97c5c6629f8da1e7
Tags:exemetasploitrozena
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • venom.exe (PID: 572 cmdline: "C:\Users\user\Desktop\venom.exe" MD5: 195032DEBCDCFBD4E56986070144A475)
  • cleanup
{"Type": "Metasploit Connect", "IP": "47.120.44.103", "Port": 8899}
SourceRuleDescriptionAuthorStrings
venom.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    venom.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      venom.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x2264:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0xd8:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
          • 0x1264:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
          00000000.00000000.1970340270.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.0.venom.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.0.venom.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                0.0.venom.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
                • 0x2264:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
                0.2.venom.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                  0.2.venom.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: venom.exeAvira: detected
                    Source: venom.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "47.120.44.103", "Port": 8899}
                    Source: venom.exeReversingLabs: Detection: 89%
                    Source: venom.exeVirustotal: Detection: 86%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                    Source: venom.exeJoe Sandbox ML: detected
                    Source: venom.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: venom.exe
                    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 47.120.44.103:8899
                    Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: unknownTCP traffic detected without corresponding DNS query: 47.120.44.103
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_004B0095 WSASocketA,connect,recv,closesocket,0_2_004B0095
                    Source: venom.exeString found in binary or memory: http://www.apache.org/
                    Source: venom.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: venom.exeString found in binary or memory: http://www.zeustech.net/

                    System Summary

                    barindex
                    Source: venom.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.0.venom.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.2.venom.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000000.1970340270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: venom.exe, 00000000.00000000.1970447522.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs venom.exe
                    Source: venom.exeBinary or memory string: OriginalFilenameab.exeF vs venom.exe
                    Source: venom.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: venom.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.0.venom.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.2.venom.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000000.1970340270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: venom.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal96.troj.winEXE@1/0@0/1
                    Source: venom.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\venom.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: venom.exeReversingLabs: Detection: 89%
                    Source: venom.exeVirustotal: Detection: 86%
                    Source: C:\Users\user\Desktop\venom.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\venom.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\venom.exeSection loaded: mswsock.dllJump to behavior
                    Source: venom.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: venom.exe
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_0040124D push eax; ret 0_2_00401253
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_00405AC0 push ebx; ret 0_2_00405AC4
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_00401750 push ebp; ret 0_2_00401751
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_0040176F push eax; ret 0_2_00401894
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_00407921 push edx; ret 0_2_00407925
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_00404382 push dword ptr [ebx+ecx*4]; retf 0_2_004043FB
                    Source: venom.exeStatic PE information: section name: .text entropy: 7.011882615215062
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: venom.exe, 00000000.00000002.2635059706.000000000067E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\venom.exeCode function: 0_2_00406A00 GetSystemTimeAsFileTime,0_2_00406A00

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: venom.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.venom.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.venom.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1970340270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    2
                    Software Packing
                    OS Credential Dumping1
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Non-Standard Port
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    LSASS Memory1
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    Security Account Manager2
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    venom.exe89%ReversingLabsWin32.Trojan.Swrort
                    venom.exe86%VirustotalBrowse
                    venom.exe100%AviraTR/Patched.Gen2
                    venom.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.apache.org/0%URL Reputationsafe
                    http://www.zeustech.net/0%Avira URL Cloudsafe
                    http://www.zeustech.net/0%VirustotalBrowse
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0venom.exefalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/venom.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.zeustech.net/venom.exefalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    47.120.44.103
                    unknownChina
                    37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1447007
                    Start date and time:2024-05-24 08:23:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 3m 46s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:venom.exe
                    Detection:MAL
                    Classification:mal96.troj.winEXE@1/0@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 86%
                    • Number of executed functions: 6
                    • Number of non-executed functions: 3
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    No simulations
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdhttp://toenpocket.pro/Get hashmaliciousHTMLPhisherBrowse
                    • 203.107.62.140
                    http://02.jie888.link/Get hashmaliciousUnknownBrowse
                    • 39.107.0.245
                    http://port01-2i9.pages.dev/Get hashmaliciousUnknownBrowse
                    • 39.107.0.245
                    http://iykdkk.pages.dev/Get hashmaliciousUnknownBrowse
                    • 59.110.133.46
                    http://cfg3xe.pages.dev/Get hashmaliciousUnknownBrowse
                    • 39.107.0.244
                    https://new.aj848310310.workers.dev/Get hashmaliciousUnknownBrowse
                    • 39.107.0.244
                    AsrP4dFOgM.elfGet hashmaliciousMirai, MoobotBrowse
                    • 8.153.4.33
                    dLW2bzO9c1.elfGet hashmaliciousMirai, MoobotBrowse
                    • 139.243.198.196
                    Xi102MnZby.elfGet hashmaliciousMiraiBrowse
                    • 8.148.142.107
                    wz5CHr5oLF.elfGet hashmaliciousMiraiBrowse
                    • 116.62.52.245
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.320499021831116
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:venom.exe
                    File size:73'802 bytes
                    MD5:195032debcdcfbd4e56986070144a475
                    SHA1:ae0dc7a77bbbbb868f58d7fadf744201c62a580c
                    SHA256:18efb574f87cff4df096736e24266656d17108ce4c0f183d97c5c6629f8da1e7
                    SHA512:bad30342d35192cb44483ce0a5f03a90f50b896db9b350531d157c3ec4867e60b7c3f6cdf2f347a2e4d0fbc865c9caf433c5cd91170037c72ea434f44b50c4c1
                    SSDEEP:1536:ImxqrezYqPXYZzkEJB1SXWH1qOvFMb+KR0Nc8QsJq39:xM4EzzJnSXWHUQe0Nc8QsC9
                    TLSH:3F73B042D9C01466C265123D57763AF5AA71F4F63312D28A3A8CC9E5EFD0CF063663C6
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L......I...........
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x403d4e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x49C1B2C9 [Thu Mar 19 02:49:45 2009 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:481f47bbb2c9c21e108d65f52b04c448
                    Instruction
                    inc ecx
                    xchg eax, ebx
                    dec eax
                    nop
                    inc ecx
                    stc
                    lahf
                    lahf
                    cld
                    lahf
                    cld
                    dec edx
                    clc
                    cdq
                    dec eax
                    dec eax
                    xchg eax, ebx
                    das
                    inc ebx
                    wait
                    xchg eax, ecx
                    inc ebx
                    das
                    xchg eax, ecx
                    inc ebx
                    cld
                    cdq
                    cmc
                    xchg eax, ecx
                    xchg eax, ebx
                    cmc
                    inc eax
                    xchg eax, ecx
                    lahf
                    wait
                    clc
                    cdq
                    lahf
                    salc
                    nop
                    aas
                    dec edx
                    stc
                    cmc
                    dec ecx
                    inc eax
                    das
                    aaa
                    cmc
                    salc
                    daa
                    salc
                    dec ebx
                    xchg eax, ecx
                    nop
                    das
                    nop
                    nop
                    inc ebx
                    nop
                    wait
                    nop
                    aaa
                    inc ecx
                    dec ebx
                    cmc
                    daa
                    inc edx
                    daa
                    cmc
                    dec ecx
                    daa
                    dec ecx
                    salc
                    xchg eax, ebx
                    salc
                    cld
                    inc ecx
                    dec eax
                    lahf
                    dec edx
                    cmc
                    das
                    dec eax
                    cwde
                    inc eax
                    xchg eax, edx
                    cld
                    dec edx
                    aaa
                    xchg eax, ebx
                    stc
                    std
                    dec edx
                    aaa
                    daa
                    aas
                    salc
                    salc
                    inc eax
                    xchg eax, ecx
                    cdq
                    xchg eax, edx
                    jmp 00007FE771248759h
                    or byte ptr [eax], al
                    add byte ptr [ecx+63084C93h], cl
                    add byte ptr [ebx-1D74F3ADh], cl
                    sub bh, cl
                    add byte ptr [ebx-1Fh], dl
                    sar dword ptr [ebx], 1
                    loopne 00007FE77124A83Bh
                    push ebx
                    or al, 0Fh
                    test eax, eax
                    add al, byte ptr [eax]
                    add byte ptr [ebx+360820B3h], cl
                    add byte ptr [eax+353F07FFh], bh
                    sub esp, dword ptr [04F045C7h]
                    add byte ptr [eax], al
                    add byte ptr [ebx], bh
                    ror dword ptr [ecx+0372FC8Dh], 63h
                    dec ebp
                    hlt
                    mov ecx, dword ptr [eax]
                    or byte ptr [eax], al
                    add byte ptr [ebx+1816BE1Ah], cl
                    in eax, 00h
                    scasb
                    xor byte ptr [ebx], dl
                    and byte ptr [ebx+02E9C198h], cl
                    sbb eax, 558BCA8Bh
                    hlt
                    and ecx, 00000000h
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xa9660xb000458edf2700c7e8a3c43f6de5fbd694dfFalse0.8162952769886364data7.011882615215062IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                    DLLImport
                    MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                    KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                    ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                    WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                    WS2_32.dllWSARecv, WSASend
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    May 24, 2024 08:23:54.136584044 CEST497048899192.168.2.547.120.44.103
                    May 24, 2024 08:23:54.141987085 CEST88994970447.120.44.103192.168.2.5
                    May 24, 2024 08:23:54.142103910 CEST497048899192.168.2.547.120.44.103
                    May 24, 2024 08:23:56.448055029 CEST88994970447.120.44.103192.168.2.5
                    May 24, 2024 08:23:56.448421955 CEST497048899192.168.2.547.120.44.103
                    May 24, 2024 08:23:56.448625088 CEST497048899192.168.2.547.120.44.103
                    May 24, 2024 08:23:56.450134039 CEST497058899192.168.2.547.120.44.103
                    May 24, 2024 08:23:56.458547115 CEST88994970447.120.44.103192.168.2.5
                    May 24, 2024 08:23:56.504487991 CEST88994970547.120.44.103192.168.2.5
                    May 24, 2024 08:23:56.504627943 CEST497058899192.168.2.547.120.44.103
                    May 24, 2024 08:23:58.716638088 CEST88994970547.120.44.103192.168.2.5
                    May 24, 2024 08:23:58.716841936 CEST497058899192.168.2.547.120.44.103
                    May 24, 2024 08:23:58.717247009 CEST497058899192.168.2.547.120.44.103
                    May 24, 2024 08:23:58.718005896 CEST497068899192.168.2.547.120.44.103
                    May 24, 2024 08:23:58.726767063 CEST88994970547.120.44.103192.168.2.5
                    May 24, 2024 08:23:58.775598049 CEST88994970647.120.44.103192.168.2.5
                    May 24, 2024 08:23:58.775830030 CEST497068899192.168.2.547.120.44.103
                    May 24, 2024 08:24:12.694739103 CEST88994970647.120.44.103192.168.2.5
                    May 24, 2024 08:24:12.694874048 CEST497068899192.168.2.547.120.44.103
                    May 24, 2024 08:24:12.695208073 CEST497068899192.168.2.547.120.44.103
                    May 24, 2024 08:24:12.696053028 CEST497088899192.168.2.547.120.44.103
                    May 24, 2024 08:24:12.748482943 CEST88994970647.120.44.103192.168.2.5
                    May 24, 2024 08:24:12.803575039 CEST88994970847.120.44.103192.168.2.5
                    May 24, 2024 08:24:12.803785086 CEST497088899192.168.2.547.120.44.103
                    May 24, 2024 08:24:20.303848028 CEST88994970847.120.44.103192.168.2.5
                    May 24, 2024 08:24:20.304188967 CEST497088899192.168.2.547.120.44.103
                    May 24, 2024 08:24:20.304518938 CEST497088899192.168.2.547.120.44.103
                    May 24, 2024 08:24:20.305342913 CEST497138899192.168.2.547.120.44.103
                    May 24, 2024 08:24:20.314065933 CEST88994970847.120.44.103192.168.2.5
                    May 24, 2024 08:24:20.363573074 CEST88994971347.120.44.103192.168.2.5
                    May 24, 2024 08:24:20.364025116 CEST497138899192.168.2.547.120.44.103
                    May 24, 2024 08:24:36.511450052 CEST88994971347.120.44.103192.168.2.5
                    May 24, 2024 08:24:36.511699915 CEST497138899192.168.2.547.120.44.103
                    May 24, 2024 08:24:36.512007952 CEST497138899192.168.2.547.120.44.103
                    May 24, 2024 08:24:36.512857914 CEST497148899192.168.2.547.120.44.103
                    May 24, 2024 08:24:36.564270020 CEST88994971347.120.44.103192.168.2.5
                    May 24, 2024 08:24:36.615423918 CEST88994971447.120.44.103192.168.2.5
                    May 24, 2024 08:24:36.615740061 CEST497148899192.168.2.547.120.44.103
                    May 24, 2024 08:24:41.175522089 CEST88994971447.120.44.103192.168.2.5
                    May 24, 2024 08:24:41.175743103 CEST497148899192.168.2.547.120.44.103
                    May 24, 2024 08:24:41.176039934 CEST497148899192.168.2.547.120.44.103
                    May 24, 2024 08:24:41.176810026 CEST497158899192.168.2.547.120.44.103
                    May 24, 2024 08:24:41.232569933 CEST88994971447.120.44.103192.168.2.5
                    May 24, 2024 08:24:41.281723022 CEST88994971547.120.44.103192.168.2.5
                    May 24, 2024 08:24:41.281939983 CEST497158899192.168.2.547.120.44.103
                    May 24, 2024 08:24:43.632529020 CEST88994971547.120.44.103192.168.2.5
                    May 24, 2024 08:24:43.632848978 CEST497158899192.168.2.547.120.44.103
                    May 24, 2024 08:24:43.643055916 CEST497158899192.168.2.547.120.44.103
                    May 24, 2024 08:24:43.643861055 CEST497168899192.168.2.547.120.44.103
                    May 24, 2024 08:24:43.691144943 CEST88994971547.120.44.103192.168.2.5
                    May 24, 2024 08:24:43.744631052 CEST88994971647.120.44.103192.168.2.5
                    May 24, 2024 08:24:43.744858980 CEST497168899192.168.2.547.120.44.103
                    May 24, 2024 08:24:48.301815987 CEST88994971647.120.44.103192.168.2.5
                    May 24, 2024 08:24:48.302174091 CEST497168899192.168.2.547.120.44.103
                    May 24, 2024 08:24:48.302476883 CEST497168899192.168.2.547.120.44.103
                    May 24, 2024 08:24:48.303329945 CEST497178899192.168.2.547.120.44.103
                    May 24, 2024 08:24:48.360560894 CEST88994971647.120.44.103192.168.2.5
                    May 24, 2024 08:24:48.407505989 CEST88994971747.120.44.103192.168.2.5
                    May 24, 2024 08:24:48.407788038 CEST497178899192.168.2.547.120.44.103
                    May 24, 2024 08:24:52.982243061 CEST88994971747.120.44.103192.168.2.5
                    May 24, 2024 08:24:52.982501984 CEST497178899192.168.2.547.120.44.103
                    May 24, 2024 08:24:52.982883930 CEST497178899192.168.2.547.120.44.103
                    May 24, 2024 08:24:52.983561039 CEST497188899192.168.2.547.120.44.103
                    May 24, 2024 08:24:53.036540985 CEST88994971747.120.44.103192.168.2.5
                    May 24, 2024 08:24:53.058612108 CEST88994971847.120.44.103192.168.2.5
                    May 24, 2024 08:24:53.058845997 CEST497188899192.168.2.547.120.44.103
                    May 24, 2024 08:25:00.543817997 CEST88994971847.120.44.103192.168.2.5
                    May 24, 2024 08:25:00.544014931 CEST497188899192.168.2.547.120.44.103
                    May 24, 2024 08:25:00.544390917 CEST497188899192.168.2.547.120.44.103
                    May 24, 2024 08:25:00.559535027 CEST88994971847.120.44.103192.168.2.5

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:02:23:53
                    Start date:24/05/2024
                    Path:C:\Users\user\Desktop\venom.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\venom.exe"
                    Imagebase:0x400000
                    File size:73'802 bytes
                    MD5 hash:195032DEBCDCFBD4E56986070144A475
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1970340270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.1970340270.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:1.6%
                      Dynamic/Decrypted Code Coverage:16.7%
                      Signature Coverage:18.5%
                      Total number of Nodes:54
                      Total number of Limit Nodes:3
                      execution_graph 1086 404540 1087 404550 exit 1086->1087 1088 404576 1087->1088 1075 406cc1 1077 406cc7 1075->1077 1076 406cfb 1077->1076 1077->1077 1078 406d1c PeekNamedPipe 1077->1078 1061 402002 1062 401fdc 1061->1062 1064 402065 1061->1064 1062->1061 1063 402052 VirtualAlloc 1062->1063 1063->1064 1081 40a2a3 1082 40a2ce 1081->1082 1083 40a285 1081->1083 1083->1081 1084 40a28d DeleteCriticalSection 1083->1084 1085 40a2bd 1083->1085 1084->1083 1079 4010e9 atoi 1080 401431 1079->1080 1089 406d09 1090 406d1c PeekNamedPipe 1089->1090 1091 406d0e 1089->1091 1091->1090 1091->1091 1042 4b0000 1045 4b0095 1042->1045 1046 4b00aa 1045->1046 1047 4b00bc WSASocketA 1046->1047 1048 4b00d8 connect 1047->1048 1049 4b00f1 recv 1048->1049 1051 4b00e7 1048->1051 1050 4b0139 closesocket 1049->1050 1049->1051 1050->1047 1050->1051 1051->1048 1051->1049 1051->1050 1052 4b0006 1051->1052 1069 40422b 1070 404237 1069->1070 1071 40425a 1070->1071 1073 406a00 GetSystemTimeAsFileTime 1070->1073 1074 406a29 1073->1074 1074->1071 1053 40202d 1054 40203b VirtualAlloc 1053->1054 1056 402065 1054->1056 1056->1056 1106 4045ad 1107 4045ae 1106->1107 1108 40468c exit 1107->1108 1109 4046ce 1108->1109 1057 409250 1058 40926e 1057->1058 1059 4092f7 1058->1059 1060 409374 SetStdHandle 1058->1060 1060->1059 1100 401ff4 1101 401ffb VirtualAlloc 1100->1101 1103 402065 1100->1103 1101->1103 1092 401fd6 1093 401ffa VirtualAlloc 1092->1093 1095 402065 1093->1095 1095->1095 1104 4069f6 GetSystemTimeAsFileTime 1105 406a29 1104->1105

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 4b0095-4b00ba 3 4b00bc-4b00d7 WSASocketA 0->3 4 4b00d8-4b00e5 connect 3->4 5 4b00f1-4b0101 recv 4->5 6 4b00e7-4b00ea 4->6 7 4b0139-4b0146 closesocket 5->7 8 4b0103-4b0117 5->8 6->4 9 4b00ec call 4b0158 6->9 7->3 10 4b014c 7->10 13 4b0118-4b0127 8->13 9->5 10->9 15 4b0129-4b0132 13->15 16 4b0151-4b0155 13->16 15->7 16->13 17 4b0157 16->17
                      APIs
                      • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,C3220002,672C782F,0000000A,?,?,5F327377,00003233), ref: 004B00D5
                      • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 004B00E1
                      • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 004B00FC
                      • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 004B013F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634986439.00000000004B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4b0000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: Socketclosesocketconnectrecv
                      • String ID:
                      • API String ID: 2083937939-0
                      • Opcode ID: 482af383b13c4c0e104c3053ad9f56fd2477f981a9c06d828a89ca4cf63330c5
                      • Instruction ID: 2f5d1bad11456c6cd825bb87e7144f7371071785d44ab3db0b8afa067fac488f
                      • Opcode Fuzzy Hash: 482af383b13c4c0e104c3053ad9f56fd2477f981a9c06d828a89ca4cf63330c5
                      • Instruction Fuzzy Hash: 4611C0B068025C3EF5302266AC47FFB391CCF46BAAF104026BB45EA1C1C896DC4081FE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 18 401fd6-4020d0 VirtualAlloc call 402187 call 40212f 35 402105-40211c 18->35 36 4020d6-4020eb 18->36 41 40211f 35->41 36->35 39 4020f1-402100 36->39 39->35 41->41
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00402052
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: d2450ed2e761e93cb5d463a8b3ec3d16820939109223f92e23f1bb2ae94d6556
                      • Instruction ID: 935a0c7cd9a06731ad29390d191a803abd0205ef99149267f751957085bf1e07
                      • Opcode Fuzzy Hash: d2450ed2e761e93cb5d463a8b3ec3d16820939109223f92e23f1bb2ae94d6556
                      • Instruction Fuzzy Hash: 1DF08C3828E31AEAD52561200F9DBB65249572F359F602977AB477A2C3C8FD4807A12F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 42 401fe2-4020d0 VirtualAlloc call 402187 call 40212f 59 402105-40211c 42->59 60 4020d6-4020eb 42->60 65 40211f 59->65 60->59 63 4020f1-402100 60->63 63->59 65->65
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00402052
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: b7eaeb86af557898a570fce6ad4d08f73422b374583695bdd0fcc8c6172500fb
                      • Instruction ID: 3866cf3f94fcb62333267f97f04659c0a42c813fc61fb05e42c75d42e33a260c
                      • Opcode Fuzzy Hash: b7eaeb86af557898a570fce6ad4d08f73422b374583695bdd0fcc8c6172500fb
                      • Instruction Fuzzy Hash: B5F0903839E31AE6D42461200F9DBB74149572F359E702937AB0B7E1C288FD4807A11F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 90 402002-402004 91 402006-402009 90->91 92 402079-4020d0 90->92 93 40200b-402074 VirtualAlloc call 402187 call 40212f 91->93 94 401fdc 91->94 108 402105-40211c 92->108 109 4020d6-4020eb 92->109 93->92 94->90 114 40211f 108->114 109->108 112 4020f1-402100 109->112 112->108 114->114
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00402052
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 5698aa8966a4cb60b74428b1a7779a7c9278a31fc1ad2fe51be008f7229ad1b4
                      • Instruction ID: 65d83d7b21cef55854d6699ff49844e648447f6de3f8e1dc34a7c393997d0c4f
                      • Opcode Fuzzy Hash: 5698aa8966a4cb60b74428b1a7779a7c9278a31fc1ad2fe51be008f7229ad1b4
                      • Instruction Fuzzy Hash: 38F0C23439E31A9AC52561200F9EAB74149435F345E602937AB02BE1C3C8FC4847A21F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 66 401ff4-401ff9 67 402065-4020d0 call 402187 call 40212f 66->67 68 401ffb-402057 VirtualAlloc 66->68 83 402105-40211c 67->83 84 4020d6-4020eb 67->84 68->67 89 40211f 83->89 84->83 87 4020f1-402100 84->87 87->83 89->89
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00402052
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: c385ee10f9141d27dc99a239d42fa34698236f01f27627297d90e45d24aae597
                      • Instruction ID: 6e268b73353f1a4b91b9352a4147eaee2705d1405a5e3a64df6f2ed6cad510d5
                      • Opcode Fuzzy Hash: c385ee10f9141d27dc99a239d42fa34698236f01f27627297d90e45d24aae597
                      • Instruction Fuzzy Hash: C3F06D3829E319E6C92464600F9DBB74149532F349E6039376B57BA1C2C8FC0807A11F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 115 40202d-402057 VirtualAlloc 118 402065-4020d0 call 402187 call 40212f 115->118 129 402105-40211c 118->129 130 4020d6-4020eb 118->130 135 40211f 129->135 130->129 133 4020f1-402100 130->133 133->129 135->135
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00402052
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 91314a2dddd47f023b9b416d08995c7b3cd91b7032c0db8d97d6a452a6c68ef2
                      • Instruction ID: ef1992b55d9fd1632257e07ac17eac2084c5898d930a4de0c4ea620d73db68d1
                      • Opcode Fuzzy Hash: 91314a2dddd47f023b9b416d08995c7b3cd91b7032c0db8d97d6a452a6c68ef2
                      • Instruction Fuzzy Hash: 75F0E23835A319DBC42066200FCDAB642986B5E305B30293BAB577E5C2CCFC4407A20F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 194 406a00-406a38 GetSystemTimeAsFileTime
                      APIs
                      • GetSystemTimeAsFileTime.KERNEL32(00000000,?,0040425A), ref: 00406A0B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$FileSystem
                      • String ID: V
                      • API String ID: 2086374402-1342839628
                      • Opcode ID: 23e5b76169e75a26fab1cfa49e4c0dcf1ddb64ed52c521840fc3a304f750b79c
                      • Instruction ID: 0d278dc440edcf23c25f7b9ac8c87d763d2aa6fc8a37668d90d2e86899c70629
                      • Opcode Fuzzy Hash: 23e5b76169e75a26fab1cfa49e4c0dcf1ddb64ed52c521840fc3a304f750b79c
                      • Instruction Fuzzy Hash: 71E0C271E4020DEBEB24CFA4ED88CAE73A9DF81718F544399AC186A984DA309D4546A8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 136 4045ad 137 4045ae-4045c7 136->137 138 404615-404637 137->138 139 4045c9-4045ff call 404a60 137->139 141 404638-40464a 138->141 143 404600-40460e 139->143 141->143 144 40464c-40467c 141->144 143->141 144->137 145 404682-4046cc exit 144->145 147 4046ea-404716 145->147 148 4046ce-4046e8 145->148 148->147
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: exit
                      • String ID: :%d$SSL not compiled in; no https support$[%s]$https://
                      • API String ID: 2483651598-1832414089
                      • Opcode ID: fa6913bd8daa727e1dee769448bab5d891c17aceac54ece15ae0475a09b3deb6
                      • Instruction ID: 512bba00d627a54dae838093dafd1538f3e31a372089db1aac8bacfc9586c63f
                      • Opcode Fuzzy Hash: fa6913bd8daa727e1dee769448bab5d891c17aceac54ece15ae0475a09b3deb6
                      • Instruction Fuzzy Hash: 4F4189705093815FC715CF789C81AD73FA0EF82314B0882AEE5599F6D3E3B99419C799

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 150 404611-40464a 151 404600-40460e 150->151 152 40464c-40467c 150->152 155 404638-40464a 151->155 153 404682-4046cc exit 152->153 154 4045ae-4045c7 152->154 161 4046ea-404716 153->161 162 4046ce-4046e8 153->162 156 404615-404637 154->156 157 4045c9-4045ff call 404a60 154->157 155->151 155->152 156->155 157->151 162->161
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2634914642.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2634891073.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634928869.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634942446.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2634958027.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_venom.jbxd
                      Yara matches
                      Similarity
                      • API ID: exit
                      • String ID: :%d$SSL not compiled in; no https support$[%s]$https://
                      • API String ID: 2483651598-1832414089
                      • Opcode ID: 5c0b412d3dd5e9c71b457840e1819e6d9ddbe773ab9575dab4fafc7752577085
                      • Instruction ID: bae4de35b8ec0d743d8cadfb50f4119ae35e3e8f35df077aad9ec7836c207830
                      • Opcode Fuzzy Hash: 5c0b412d3dd5e9c71b457840e1819e6d9ddbe773ab9575dab4fafc7752577085
                      • Instruction Fuzzy Hash: B53145741493819FC715DB64AC41AD63FB0FF42314B0482AFE189AB6D3D3B95419CB58