Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LH27WS7BVJ.exe

Overview

General Information

Sample name:LH27WS7BVJ.exe
renamed because original name is a hash value
Original sample name:367c8f95ea1174ed018dcb362bd5e61d.exe
Analysis ID:1447093
MD5:367c8f95ea1174ed018dcb362bd5e61d
SHA1:d8228f30aff54f959bc5f6b172d4c2c97875f5b7
SHA256:778df7488b659a15b38e07eb9ce521f48df15258eed4512b762adcf2173402f8
Tags:32exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LH27WS7BVJ.exe (PID: 7028 cmdline: "C:\Users\user\Desktop\LH27WS7BVJ.exe" MD5: 367C8F95EA1174ED018DCB362BD5E61D)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • wtftrbr (PID: 2004 cmdline: C:\Users\user\AppData\Roaming\wtftrbr MD5: 367C8F95EA1174ED018DCB362BD5E61D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["https://airwide-land.com/calcroom.php", "https://summerwaterhall.com/calcroom.php"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.1941515606.00000000048C0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x5e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x5e4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wtftrbr, CommandLine: C:\Users\user\AppData\Roaming\wtftrbr, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wtftrbr, NewProcessName: C:\Users\user\AppData\Roaming\wtftrbr, OriginalFileName: C:\Users\user\AppData\Roaming\wtftrbr, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\wtftrbr, ProcessId: 2004, ProcessName: wtftrbr
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: LH27WS7BVJ.exeAvira: detected
      Source: https://summerwaterhall.com/calcroom.phpAvira URL Cloud: Label: malware
      Source: https://airwide-land.com/calcroom.phpAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Roaming\wtftrbrAvira: detection malicious, Label: HEUR/AGEN.1311176
      Source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["https://airwide-land.com/calcroom.php", "https://summerwaterhall.com/calcroom.php"]}
      Source: summerwaterhall.comVirustotal: Detection: 15%Perma Link
      Source: airwide-land.comVirustotal: Detection: 17%Perma Link
      Source: C:\Users\user\AppData\Roaming\wtftrbrReversingLabs: Detection: 34%
      Source: C:\Users\user\AppData\Roaming\wtftrbrVirustotal: Detection: 42%Perma Link
      Source: LH27WS7BVJ.exeReversingLabs: Detection: 34%
      Source: LH27WS7BVJ.exeVirustotal: Detection: 42%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\wtftrbrJoe Sandbox ML: detected
      Source: LH27WS7BVJ.exeJoe Sandbox ML: detected
      Source: LH27WS7BVJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: C:\Windows\explorer.exeNetwork Connect: 23.227.203.30 443Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 146.70.41.146 443Jump to behavior
      Source: Malware configuration extractorURLs: https://airwide-land.com/calcroom.php
      Source: Malware configuration extractorURLs: https://summerwaterhall.com/calcroom.php
      Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
      Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: airwide-land.com
      Source: global trafficDNS traffic detected: DNS query: summerwaterhall.com
      Source: explorer.exe, 00000001.00000000.1682612462.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000001.00000000.1682612462.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000001.00000000.1682612462.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000001.00000000.1682612462.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000001.00000000.1681678254.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1683344877.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1682067799.0000000008720000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
      Source: explorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
      Source: explorer.exe, 00000001.00000000.1679822770.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680269665.0000000003700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000001.00000000.1682612462.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000001.00000000.1682612462.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
      Source: explorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000003.00000002.1941515606.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1694439425.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000003.00000002.1941400771.0000000002CDB000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004015A5 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,GlobalAlloc,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015A5
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00402446 NtQueryInformationProcess,0_2_00402446
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00402464 NtQuerySystemInformation,0_2_00402464
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00402421 NtQuerySystemInformation,0_2_00402421
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004015CD NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,GlobalAlloc,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015CD
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004015D1 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,GlobalAlloc,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015D1
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004015D4 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,GlobalAlloc,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015D4
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004015BB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,GlobalAlloc,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015BB
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004015BF NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,GlobalAlloc,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015BF
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004021410_2_00402141
      Source: LH27WS7BVJ.exe, 00000000.00000000.1624078836.0000000002C8C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesFilezera2 vs LH27WS7BVJ.exe
      Source: LH27WS7BVJ.exeBinary or memory string: OriginalFilenamesFilezera2 vs LH27WS7BVJ.exe
      Source: LH27WS7BVJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000003.00000002.1941515606.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1694439425.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000003.00000002.1941400771.0000000002CDB000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/2@2/2
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E621B1 CreateToolhelp32Snapshot,Module32First,0_2_02E621B1
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wtftrbrJump to behavior
      Source: LH27WS7BVJ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: LH27WS7BVJ.exeReversingLabs: Detection: 34%
      Source: LH27WS7BVJ.exeVirustotal: Detection: 42%
      Source: unknownProcess created: C:\Users\user\Desktop\LH27WS7BVJ.exe "C:\Users\user\Desktop\LH27WS7BVJ.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wtftrbr C:\Users\user\AppData\Roaming\wtftrbr
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: LH27WS7BVJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeUnpacked PE file: 0.2.LH27WS7BVJ.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\wtftrbrUnpacked PE file: 3.2.wtftrbr.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_0040284F push eax; ret 0_2_00402883
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00403353 push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_0040330C push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00403313 push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00403320 push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_0040322D push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00403338 push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_004032C3 push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_00403388 push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_0040328F push eax; ret 0_2_0040336A
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E22FA5 push esp; iretd 0_2_02E22FC0
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E228B6 push eax; ret 0_2_02E228EA
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E22F9D push esp; ret 0_2_02E22FA4
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E23000 push esp; iretd 0_2_02E22FC0
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E697CA pushfd ; retf 0_2_02E697CB
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E64AC8 push eax; ret 0_2_02E64AE9
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E64132 push eax; ret 0_2_02E64166
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E6381F push ebp; ret 0_2_02E63829
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E6471B pushad ; iretd 0_2_02E6472F
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_02CE3B8A push eax; ret 3_2_02CE3BBE
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_02CE3277 push ebp; ret 3_2_02CE3281
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_02CE4173 pushad ; iretd 3_2_02CE4187
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_02CE9222 pushfd ; retf 3_2_02CE9223
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_02CE4520 push eax; ret 3_2_02CE4541
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_048C2F9D push esp; ret 3_2_048C2FA4
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_048C2FA5 push esp; iretd 3_2_048C2FC0
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_048C28B6 push eax; ret 3_2_048C28EA
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_048C3000 push esp; iretd 3_2_048C2FC0
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wtftrbrJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wtftrbrJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\lh27ws7bvj.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wtftrbr:Zone.Identifier read attributes | deleteJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: LH27WS7BVJ.exe, 00000000.00000002.1694316140.0000000002E4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 409Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1183Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 808Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 372Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 389Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3712Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 876Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 871Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6264Thread sleep count: 409 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6232Thread sleep count: 1183 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6232Thread sleep time: -118300s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6284Thread sleep count: 808 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6284Thread sleep time: -80800s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 1508Thread sleep count: 281 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5900Thread sleep count: 372 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5900Thread sleep time: -37200s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 1740Thread sleep count: 389 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 1740Thread sleep time: -38900s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 6232Thread sleep count: 3712 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6232Thread sleep time: -371200s >= -30000sJump to behavior
      Source: explorer.exe, 00000001.00000000.1683181405.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1682612462.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
      Source: explorer.exe, 00000001.00000000.1683181405.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000001.00000000.1679822770.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
      Source: explorer.exe, 00000001.00000000.1683181405.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
      Source: explorer.exe, 00000001.00000000.1682612462.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
      Source: explorer.exe, 00000001.00000000.1682612462.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000001.00000000.1683181405.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000001.00000000.1680935365.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
      Source: explorer.exe, 00000001.00000000.1682612462.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
      Source: explorer.exe, 00000001.00000000.1679822770.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000001.00000000.1679822770.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E20D90 mov eax, dword ptr fs:[00000030h]0_2_02E20D90
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E2092B mov eax, dword ptr fs:[00000030h]0_2_02E2092B
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeCode function: 0_2_02E61A8E push dword ptr fs:[00000030h]0_2_02E61A8E
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_02CE14E6 push dword ptr fs:[00000030h]3_2_02CE14E6
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_048C0D90 mov eax, dword ptr fs:[00000030h]3_2_048C0D90
      Source: C:\Users\user\AppData\Roaming\wtftrbrCode function: 3_2_048C092B mov eax, dword ptr fs:[00000030h]3_2_048C092B

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: wtftrbr.1.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 23.227.203.30 443Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 146.70.41.146 443Jump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeThread created: C:\Windows\explorer.exe EIP: 3401970Jump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrThread created: unknown EIP: 3421970Jump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\LH27WS7BVJ.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\wtftrbrSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000001.00000000.1680806640.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1682612462.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680005074.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000001.00000000.1680005074.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000001.00000000.1679822770.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
      Source: explorer.exe, 00000001.00000000.1680005074.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000001.00000000.1680005074.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping411
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      12
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive12
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain Credentials2
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1447093 Sample: LH27WS7BVJ.exe Startdate: 24/05/2024 Architecture: WINDOWS Score: 100 21 summerwaterhall.com 2->21 23 airwide-land.com 2->23 29 Multi AV Scanner detection for domain / URL 2->29 31 Found malware configuration 2->31 33 Malicious sample detected (through community Yara rule) 2->33 35 7 other signatures 2->35 7 LH27WS7BVJ.exe 2->7         started        10 wtftrbr 2->10         started        signatures3 process4 signatures5 37 Detected unpacking (changes PE section rights) 7->37 39 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->39 41 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->41 49 3 other signatures 7->49 12 explorer.exe 62 3 7->12 injected 43 Antivirus detection for dropped file 10->43 45 Multi AV Scanner detection for dropped file 10->45 47 Machine Learning detection for dropped file 10->47 process6 dnsIp7 25 summerwaterhall.com 146.70.41.146, 443, 49737, 49742 TENET-1ZA United Kingdom 12->25 27 airwide-land.com 23.227.203.30, 443, 49736, 49739 HVC-ASUS United States 12->27 17 C:\Users\user\AppData\Roaming\wtftrbr, PE32 12->17 dropped 19 C:\Users\user\...\wtftrbr:Zone.Identifier, ASCII 12->19 dropped 51 System process connects to network (likely due to code injection or exploit) 12->51 53 Benign windows process drops PE files 12->53 55 Deletes itself after installation 12->55 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->57 file8 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      LH27WS7BVJ.exe34%ReversingLabs
      LH27WS7BVJ.exe42%VirustotalBrowse
      LH27WS7BVJ.exe100%AviraHEUR/AGEN.1311176
      LH27WS7BVJ.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\wtftrbr100%AviraHEUR/AGEN.1311176
      C:\Users\user\AppData\Roaming\wtftrbr100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\wtftrbr34%ReversingLabs
      C:\Users\user\AppData\Roaming\wtftrbr42%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      summerwaterhall.com16%VirustotalBrowse
      airwide-land.com18%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://aka.ms/odirmr0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we0%URL Reputationsafe
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%URL Reputationsafe
      https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi0%URL Reputationsafe
      https://api.msn.com/q0%URL Reputationsafe
      https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-10%URL Reputationsafe
      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-10%URL Reputationsafe
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
      https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
      https://wns.windows.com/L0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%URL Reputationsafe
      https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent0%URL Reputationsafe
      https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-0%URL Reputationsafe
      https://aka.ms/Vh5j3k0%URL Reputationsafe
      https://aka.ms/Vh5j3k0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
      https://api.msn.com/v1/news/Feed/Windows?&0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%URL Reputationsafe
      https://www.rd.com/list/polite-habits-campers-dislike/0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar0%URL Reputationsafe
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%URL Reputationsafe
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d0%URL Reputationsafe
      https://outlook.com_0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      https://www.msn.com:443/en-us/feed0%URL Reputationsafe
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%URL Reputationsafe
      https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at0%URL Reputationsafe
      https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of0%URL Reputationsafe
      https://summerwaterhall.com/calcroom.php100%Avira URL Cloudmalware
      https://airwide-land.com/calcroom.php100%Avira URL Cloudmalware
      http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
      https://summerwaterhall.com/calcroom.php4%VirustotalBrowse
      https://airwide-land.com/calcroom.php4%VirustotalBrowse
      http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      summerwaterhall.com
      146.70.41.146
      truetrueunknown
      airwide-land.com
      23.227.203.30
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      https://summerwaterhall.com/calcroom.phptrue
      • 4%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://airwide-land.com/calcroom.phptrue
      • 4%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://excel.office.comexplorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.microexplorer.exe, 00000001.00000000.1681678254.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1683344877.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1682067799.0000000008720000.00000002.00000001.00040000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.msn.com/qexplorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1684715130.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1684715130.000000000C964000.00000004.00000001.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1684715130.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://word.office.comexplorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1680935365.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1682612462.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1680935365.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://api.msn.com/explorer.exe, 00000001.00000000.1682612462.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://outlook.com_explorer.exe, 00000001.00000000.1684715130.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1680935365.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      146.70.41.146
      summerwaterhall.comUnited Kingdom
      2018TENET-1ZAtrue
      23.227.203.30
      airwide-land.comUnited States
      29802HVC-ASUStrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1447093
      Start date and time:2024-05-24 11:22:09 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 8m 3s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:1
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:LH27WS7BVJ.exe
      renamed because original name is a hash value
      Original Sample Name:367c8f95ea1174ed018dcb362bd5e61d.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@2/2@2/2
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 22
      • Number of non-executed functions: 7
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtEnumerateKey calls found.
      • Report size getting too big, too many NtOpenKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      05:23:21API Interceptor442922x Sleep call for process: explorer.exe modified
      10:23:21Task SchedulerRun new task: Firefox Default Browser Agent 2D5C42E0D0495C8A path: C:\Users\user\AppData\Roaming\wtftrbr
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      146.70.41.146I4xf8XRF2Y.exeGet hashmaliciousSmokeLoaderBrowse
        ym9ms0ZhCr.exeGet hashmaliciousSmokeLoaderBrowse
          23.227.203.30I4xf8XRF2Y.exeGet hashmaliciousSmokeLoaderBrowse
            ym9ms0ZhCr.exeGet hashmaliciousSmokeLoaderBrowse
              5ded80193e96c1d11f9694fa793bd7005864abd8668e3c997617b8e10e9ecb04_payload.exeGet hashmaliciousSmokeLoaderBrowse
                eQZQYR38eg.exeGet hashmaliciousSmokeLoaderBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  airwide-land.comI4xf8XRF2Y.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  ym9ms0ZhCr.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  5ded80193e96c1d11f9694fa793bd7005864abd8668e3c997617b8e10e9ecb04_payload.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  eQZQYR38eg.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  summerwaterhall.comI4xf8XRF2Y.exeGet hashmaliciousSmokeLoaderBrowse
                  • 146.70.41.146
                  ym9ms0ZhCr.exeGet hashmaliciousSmokeLoaderBrowse
                  • 146.70.41.146
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  HVC-ASUSdoc-r25-210341853.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 45.74.19.43
                  RFQ#120-C-Link-EE-PRODUCTION-V1110FIL001-G03230-1005-INQ.com.exeGet hashmaliciousGuLoaderBrowse
                  • 23.227.202.187
                  I4xf8XRF2Y.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  ym9ms0ZhCr.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  http://marketplace.marcelasejas.com/Get hashmaliciousUnknownBrowse
                  • 69.46.6.202
                  51 Electronic Invoicing .pdf.exeGet hashmaliciousAgentTeslaBrowse
                  • 66.232.107.36
                  5ded80193e96c1d11f9694fa793bd7005864abd8668e3c997617b8e10e9ecb04_payload.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  eQZQYR38eg.exeGet hashmaliciousSmokeLoaderBrowse
                  • 23.227.203.30
                  S6hCRsyPaN.elfGet hashmaliciousMiraiBrowse
                  • 107.155.88.187
                  fKfXkNYfLY.elfGet hashmaliciousMiraiBrowse
                  • 107.155.88.148
                  TENET-1ZABI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  • 146.70.56.165
                  SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                  • 146.70.56.165
                  http://alladvcdn.comGet hashmaliciousUnknownBrowse
                  • 146.70.118.226
                  I4xf8XRF2Y.exeGet hashmaliciousSmokeLoaderBrowse
                  • 146.70.41.146
                  ym9ms0ZhCr.exeGet hashmaliciousSmokeLoaderBrowse
                  • 146.70.41.146
                  qwmLv2FcgD.elfGet hashmaliciousUnknownBrowse
                  • 155.238.0.64
                  dn7MMSZM9O.elfGet hashmaliciousUnknownBrowse
                  • 152.112.206.126
                  e2V8h6PN2L.elfGet hashmaliciousUnknownBrowse
                  • 163.200.166.95
                  h1lOPck8Jr.elfGet hashmaliciousMiraiBrowse
                  • 152.116.148.50
                  zsIELy6nuP.elfGet hashmaliciousMiraiBrowse
                  • 168.172.107.8
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):224768
                  Entropy (8bit):6.958402674103171
                  Encrypted:false
                  SSDEEP:3072:luzCfm7An+c1jkFgRRdrcv+eEl+XkaatVPTAbxSHsSBPn5Rv94uy:BfmcnNj6gRLry4rSIN5R
                  MD5:367C8F95EA1174ED018DCB362BD5E61D
                  SHA1:D8228F30AFF54F959BC5F6B172D4C2C97875F5B7
                  SHA-256:778DF7488B659A15B38E07EB9CE521F48DF15258EED4512B762ADCF2173402F8
                  SHA-512:A903C19A0C68F4DAF00A63CC90F13841D9199E0B774C9DC70D9239D4F3608359BDFB1F4AC4517CB36D2F3605A337804FC049EC2A193A034A411B85465C9CA7C3
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 34%
                  • Antivirus: Virustotal, Detection: 42%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n...............................................N.............N......Rich............................PE..L.....Md.....................T.......>............@..........................`...............................................i..P...................................i..............................@_..@...............d............................text.../........................... ..`.rdata...q.......r..................@..@.data....7.......|...\..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.958402674103171
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:LH27WS7BVJ.exe
                  File size:224'768 bytes
                  MD5:367c8f95ea1174ed018dcb362bd5e61d
                  SHA1:d8228f30aff54f959bc5f6b172d4c2c97875f5b7
                  SHA256:778df7488b659a15b38e07eb9ce521f48df15258eed4512b762adcf2173402f8
                  SHA512:a903c19a0c68f4daf00a63cc90f13841d9199e0b774c9dc70d9239d4f3608359bdfb1f4ac4517cb36d2f3605a337804fc049ec2a193a034a411b85465c9ca7c3
                  SSDEEP:3072:luzCfm7An+c1jkFgRRdrcv+eEl+XkaatVPTAbxSHsSBPn5Rv94uy:BfmcnNj6gRLry4rSIN5R
                  TLSH:6224AF4176D3CCB5F9A3C63248349AB05B3EFCA2CE65899B3348374F28751835A66772
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........n.....................................................N...............N.......Rich............................PE..L.....Md...
                  Icon Hash:754541095342404b
                  Entrypoint:0x403e87
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x644DE691 [Sun Apr 30 03:54:57 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:33f81c7ff4ccf89214031bfba22b6609
                  Instruction
                  call 00007F82ECF935CBh
                  jmp 00007F82ECF8E054h
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  push esi
                  mov esi, ecx
                  and dword ptr [esi+04h], 00000000h
                  mov dword ptr [esi], 00411258h
                  mov byte ptr [esi+08h], 00000000h
                  push dword ptr [eax]
                  call 00007F82ECF8E27Dh
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  mov dword ptr [ecx], 00411258h
                  mov eax, dword ptr [eax]
                  mov dword ptr [ecx+04h], eax
                  mov eax, ecx
                  mov byte ptr [ecx+08h], 00000000h
                  pop ebp
                  retn 0008h
                  push ebp
                  mov ebp, esp
                  push esi
                  push dword ptr [ebp+08h]
                  mov esi, ecx
                  and dword ptr [esi+04h], 00000000h
                  mov dword ptr [esi], 00411258h
                  mov byte ptr [esi+08h], 00000000h
                  call 00007F82ECF8E1E7h
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  mov dword ptr [ecx], 00411258h
                  jmp 00007F82ECF8E26Bh
                  push ebp
                  mov ebp, esp
                  push esi
                  push edi
                  mov edi, dword ptr [ebp+08h]
                  mov esi, ecx
                  cmp esi, edi
                  je 00007F82ECF8E1EFh
                  call 00007F82ECF8E258h
                  cmp byte ptr [edi+08h], 00000000h
                  je 00007F82ECF8E1DEh
                  push dword ptr [edi+04h]
                  mov ecx, esi
                  call 00007F82ECF8E20Ah
                  jmp 00007F82ECF8E1D8h
                  mov eax, dword ptr [edi+04h]
                  mov dword ptr [esi+04h], eax
                  pop edi
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  push ebp
                  mov ebp, esp
                  push esi
                  mov esi, ecx
                  mov dword ptr [esi], 00411258h
                  call 00007F82ECF8E227h
                  test byte ptr [ebp+08h], 00000001h
                  je 00007F82ECF8E1D9h
                  push esi
                  call 00007F82ECF8C563h
                  Programming Language:
                  • [ASM] VS2013 build 21005
                  • [ C ] VS2013 build 21005
                  • [C++] VS2013 build 21005
                  • [IMP] VS2008 SP1 build 30729
                  • [C++] VS2013 UPD5 build 40629
                  • [RES] VS2013 build 21005
                  • [LNK] VS2013 UPD5 build 40629
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1699c0x50.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x288c0000x94f0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x169ec0x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x15f400x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x100000x164.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xe52f0xe60033e433034c8651ad9509a244c1f41176False0.6064877717391305data6.742836347368745IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x100000x71a00x7200583fa24f9b3b372fc554a39d40b7805dFalse0.3847313596491228data4.873553410459634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x180000x28737000x17c0077f55324c5b5820fbd2335e52a0bdc4aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x288c0000x94f00x96003707dfcb8a84c8e868f1857e2f36f856False0.4317708333333333data4.769251172338811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  AFX_DIALOG_LAYOUT0x28923900x2data5.0
                  RT_CURSOR0x28923980x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                  RT_CURSOR0x28926c80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                  RT_CURSOR0x28928200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                  RT_CURSOR0x28936c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                  RT_CURSOR0x2893f700x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                  RT_ICON0x288c4f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0JapaneseJapan0.43576759061833686
                  RT_ICON0x288d3980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0JapaneseJapan0.5505415162454874
                  RT_ICON0x288dc400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0JapaneseJapan0.5887096774193549
                  RT_ICON0x288e3080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0JapaneseJapan0.6040462427745664
                  RT_ICON0x288e8700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0JapaneseJapan0.4450207468879668
                  RT_ICON0x2890e180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0JapaneseJapan0.49577861163227016
                  RT_ICON0x2891ec00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0JapaneseJapan0.5221631205673759
                  RT_DIALOG0x28947980x5adata0.8666666666666667
                  RT_STRING0x28947f80x3dcdataJapaneseJapan0.4676113360323887
                  RT_STRING0x2894bd80x686dataJapaneseJapan0.4347305389221557
                  RT_STRING0x28952600x28adataJapaneseJapan0.4846153846153846
                  RT_GROUP_CURSOR0x28927f80x22data1.0294117647058822
                  RT_GROUP_CURSOR0x28944d80x30data0.9375
                  RT_GROUP_ICON0x28923280x68dataJapaneseJapan0.6826923076923077
                  RT_VERSION0x28945080x28cPGP symmetric key encrypted data - Plaintext or unencrypted data0.5138036809815951
                  DLLImport
                  KERNEL32.dllVirtualProtect, GetLastError, SetLastError, GetThreadContext, GetCommTimeouts, GetTickCount, CreateEventW, LoadLibraryA, LoadLibraryExA, GetModuleFileNameA, GetSystemDirectoryW, RemoveDirectoryA, GlobalAlloc, CopyFileExW, GetVolumeInformationW, IsBadStringPtrW, BuildCommDCBW, SetComputerNameExW, GetLocaleInfoW, GetNumberFormatW, WriteConsoleA, WriteConsoleW, AddConsoleAliasW, GetStringTypeW, OutputDebugStringW, SetFilePointerEx, SetFileAttributesW, GetProcAddress, EncodePointer, DecodePointer, IsProcessorFeaturePresent, RaiseException, RtlUnwind, GetCommandLineW, HeapAlloc, HeapFree, ExitProcess, GetModuleHandleExW, MultiByteToWideChar, WideCharToMultiByte, HeapSize, IsDebuggerPresent, EnterCriticalSection, LeaveCriticalSection, CloseHandle, ReadFile, GetConsoleMode, ReadConsoleW, GetCurrentThreadId, GetProcessHeap, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, GetModuleFileNameW, WriteFile, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, LCMapStringW, LoadLibraryExW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, HeapReAlloc, SetStdHandle, FlushFileBuffers, GetConsoleCP, CreateFileW
                  USER32.dllGetSysColorBrush, DdeFreeStringHandle
                  GDI32.dllGetCharWidthA
                  Language of compilation systemCountry where language is spokenMap
                  JapaneseJapan
                  TimestampSource PortDest PortSource IPDest IP
                  May 24, 2024 11:23:21.245887995 CEST49736443192.168.2.423.227.203.30
                  May 24, 2024 11:23:21.245920897 CEST4434973623.227.203.30192.168.2.4
                  May 24, 2024 11:23:21.245990992 CEST49736443192.168.2.423.227.203.30
                  May 24, 2024 11:23:21.246306896 CEST49736443192.168.2.423.227.203.30
                  May 24, 2024 11:23:21.246315956 CEST4434973623.227.203.30192.168.2.4
                  May 24, 2024 11:23:49.701447964 CEST49736443192.168.2.423.227.203.30
                  May 24, 2024 11:23:50.188666105 CEST49737443192.168.2.4146.70.41.146
                  May 24, 2024 11:23:50.188724041 CEST44349737146.70.41.146192.168.2.4
                  May 24, 2024 11:23:50.188790083 CEST49737443192.168.2.4146.70.41.146
                  May 24, 2024 11:23:50.189070940 CEST49737443192.168.2.4146.70.41.146
                  May 24, 2024 11:23:50.189078093 CEST44349737146.70.41.146192.168.2.4
                  May 24, 2024 11:23:54.693851948 CEST49737443192.168.2.4146.70.41.146
                  May 24, 2024 11:25:04.952814102 CEST49739443192.168.2.423.227.203.30
                  May 24, 2024 11:25:04.952861071 CEST4434973923.227.203.30192.168.2.4
                  May 24, 2024 11:25:04.952938080 CEST49739443192.168.2.423.227.203.30
                  May 24, 2024 11:25:04.953557968 CEST49739443192.168.2.423.227.203.30
                  May 24, 2024 11:25:04.953573942 CEST4434973923.227.203.30192.168.2.4
                  May 24, 2024 11:25:47.840656996 CEST4434973923.227.203.30192.168.2.4
                  May 24, 2024 11:25:47.840851068 CEST49739443192.168.2.423.227.203.30
                  May 24, 2024 11:25:47.841240883 CEST49739443192.168.2.423.227.203.30
                  May 24, 2024 11:25:47.841275930 CEST4434973923.227.203.30192.168.2.4
                  May 24, 2024 11:25:47.841444016 CEST49740443192.168.2.423.227.203.30
                  May 24, 2024 11:25:47.841530085 CEST4434974023.227.203.30192.168.2.4
                  May 24, 2024 11:25:47.841614962 CEST49740443192.168.2.423.227.203.30
                  May 24, 2024 11:25:47.842005968 CEST49740443192.168.2.423.227.203.30
                  May 24, 2024 11:25:47.842044115 CEST4434974023.227.203.30192.168.2.4
                  May 24, 2024 11:26:30.765202045 CEST4434974023.227.203.30192.168.2.4
                  May 24, 2024 11:26:30.765571117 CEST49740443192.168.2.423.227.203.30
                  May 24, 2024 11:26:30.765571117 CEST49740443192.168.2.423.227.203.30
                  May 24, 2024 11:26:30.766427040 CEST49741443192.168.2.423.227.203.30
                  May 24, 2024 11:26:30.766514063 CEST4434974123.227.203.30192.168.2.4
                  May 24, 2024 11:26:30.766618967 CEST49741443192.168.2.423.227.203.30
                  May 24, 2024 11:26:30.768019915 CEST49741443192.168.2.423.227.203.30
                  May 24, 2024 11:26:30.768086910 CEST4434974123.227.203.30192.168.2.4
                  May 24, 2024 11:26:30.768165112 CEST49741443192.168.2.423.227.203.30
                  May 24, 2024 11:26:30.781303883 CEST49742443192.168.2.4146.70.41.146
                  May 24, 2024 11:26:30.781341076 CEST44349742146.70.41.146192.168.2.4
                  May 24, 2024 11:26:30.781435013 CEST49742443192.168.2.4146.70.41.146
                  May 24, 2024 11:26:30.781743050 CEST49742443192.168.2.4146.70.41.146
                  May 24, 2024 11:26:30.781755924 CEST44349742146.70.41.146192.168.2.4
                  May 24, 2024 11:26:31.070147038 CEST49740443192.168.2.423.227.203.30
                  May 24, 2024 11:26:31.070211887 CEST4434974023.227.203.30192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  May 24, 2024 11:23:21.178940058 CEST4955153192.168.2.41.1.1.1
                  May 24, 2024 11:23:21.245054960 CEST53495511.1.1.1192.168.2.4
                  May 24, 2024 11:23:49.935079098 CEST5070753192.168.2.41.1.1.1
                  May 24, 2024 11:23:50.052978992 CEST53507071.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  May 24, 2024 11:23:21.178940058 CEST192.168.2.41.1.1.10x6512Standard query (0)airwide-land.comA (IP address)IN (0x0001)false
                  May 24, 2024 11:23:49.935079098 CEST192.168.2.41.1.1.10x306dStandard query (0)summerwaterhall.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  May 24, 2024 11:23:21.245054960 CEST1.1.1.1192.168.2.40x6512No error (0)airwide-land.com23.227.203.30A (IP address)IN (0x0001)false
                  May 24, 2024 11:23:50.052978992 CEST1.1.1.1192.168.2.40x306dNo error (0)summerwaterhall.com146.70.41.146A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:05:22:55
                  Start date:24/05/2024
                  Path:C:\Users\user\Desktop\LH27WS7BVJ.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\LH27WS7BVJ.exe"
                  Imagebase:0x400000
                  File size:224'768 bytes
                  MD5 hash:367C8F95EA1174ED018DCB362BD5E61D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1694254550.0000000002E30000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1694439425.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1694736825.00000000048F1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:05:23:01
                  Start date:24/05/2024
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff72b770000
                  File size:5'141'208 bytes
                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:3
                  Start time:05:23:21
                  Start date:24/05/2024
                  Path:C:\Users\user\AppData\Roaming\wtftrbr
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\wtftrbr
                  Imagebase:0x400000
                  File size:224'768 bytes
                  MD5 hash:367C8F95EA1174ED018DCB362BD5E61D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000003.00000002.1941515606.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000003.00000002.1941531392.00000000048D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000003.00000002.1941400771.0000000002CDB000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000003.00000002.1941606919.0000000004A11000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 34%, ReversingLabs
                  • Detection: 42%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:7.4%
                    Dynamic/Decrypted Code Coverage:53.3%
                    Signature Coverage:40%
                    Total number of Nodes:90
                    Total number of Limit Nodes:3
                    execution_graph 3674 2e2003c 3675 2e20049 3674->3675 3687 2e20e0f SetErrorMode SetErrorMode 3675->3687 3680 2e20265 3681 2e202ce VirtualProtect 3680->3681 3683 2e2030b 3681->3683 3682 2e20439 VirtualFree 3686 2e204be LoadLibraryA 3682->3686 3683->3682 3685 2e208c7 3686->3685 3688 2e20223 3687->3688 3689 2e20d90 3688->3689 3690 2e20dad 3689->3690 3691 2e20238 VirtualAlloc 3690->3691 3692 2e20dbb GetPEB 3690->3692 3691->3680 3692->3691 3721 2e20001 3722 2e20005 3721->3722 3727 2e2092b GetPEB 3722->3727 3724 2e20030 3729 2e2003c 3724->3729 3728 2e20972 3727->3728 3728->3724 3730 2e20049 3729->3730 3731 2e20e0f 2 API calls 3730->3731 3732 2e20223 3731->3732 3733 2e20d90 GetPEB 3732->3733 3734 2e20238 VirtualAlloc 3733->3734 3735 2e20265 3734->3735 3736 2e202ce VirtualProtect 3735->3736 3738 2e2030b 3736->3738 3737 2e20439 VirtualFree 3741 2e204be LoadLibraryA 3737->3741 3738->3737 3740 2e208c7 3741->3740 3637 402f24 3638 402f25 3637->3638 3640 402fb1 3638->3640 3641 401971 3638->3641 3642 401981 3641->3642 3643 4019bd Sleep 3642->3643 3644 4019d8 3643->3644 3646 4019e9 3644->3646 3647 4015a5 3644->3647 3646->3640 3648 4015b4 3647->3648 3649 40164f NtDuplicateObject 3648->3649 3658 40176b 3648->3658 3650 40166c NtCreateSection 3649->3650 3649->3658 3651 401692 NtMapViewOfSection 3650->3651 3652 4016ec NtCreateSection 3650->3652 3651->3652 3653 4016b5 NtMapViewOfSection 3651->3653 3654 401718 3652->3654 3652->3658 3653->3652 3655 4016d3 3653->3655 3656 401722 NtMapViewOfSection 3654->3656 3654->3658 3655->3652 3657 401749 NtMapViewOfSection 3656->3657 3656->3658 3657->3658 3658->3646 3742 2e20005 3743 2e2092b GetPEB 3742->3743 3744 2e20030 3743->3744 3745 2e2003c 7 API calls 3744->3745 3746 2e20038 3745->3746 3659 2e61a11 3660 2e61a20 3659->3660 3663 2e621b1 3660->3663 3664 2e621cc 3663->3664 3665 2e621d5 CreateToolhelp32Snapshot 3664->3665 3666 2e621f1 Module32First 3664->3666 3665->3664 3665->3666 3667 2e61a29 3666->3667 3668 2e62200 3666->3668 3670 2e61e70 3668->3670 3671 2e61e9b 3670->3671 3672 2e61eac VirtualAlloc 3671->3672 3673 2e61ee4 3671->3673 3672->3673 3673->3673 3833 4015bb 3834 4015b4 3833->3834 3835 40164f NtDuplicateObject 3834->3835 3844 40176b 3834->3844 3836 40166c NtCreateSection 3835->3836 3835->3844 3837 401692 NtMapViewOfSection 3836->3837 3838 4016ec NtCreateSection 3836->3838 3837->3838 3839 4016b5 NtMapViewOfSection 3837->3839 3840 401718 3838->3840 3838->3844 3839->3838 3841 4016d3 3839->3841 3842 401722 NtMapViewOfSection 3840->3842 3840->3844 3841->3838 3843 401749 NtMapViewOfSection 3842->3843 3842->3844 3843->3844 3747 40197c 3748 401993 3747->3748 3749 4019bd Sleep 3748->3749 3750 4019d8 3749->3750 3751 4015a5 7 API calls 3750->3751 3752 4019e9 3750->3752 3751->3752 3845 402dbc 3846 402df0 3845->3846 3847 401971 8 API calls 3846->3847 3848 402fb1 3846->3848 3847->3848

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 85 4015a5-4015c0 89 4015c6-4015f9 call 401230 85->89 90 4015cf 85->90 97 4015fb 89->97 98 4015fe-401603 89->98 90->89 97->98 100 401922-40192a 98->100 101 401609-40161a 98->101 100->98 106 40192f-40196e call 401230 100->106 104 401920 101->104 105 401620-401649 101->105 104->106 105->104 113 40164f-401666 NtDuplicateObject 105->113 113->104 116 40166c-401690 NtCreateSection 113->116 118 401692-4016b3 NtMapViewOfSection 116->118 119 4016ec-401712 NtCreateSection 116->119 118->119 120 4016b5-4016d1 NtMapViewOfSection 118->120 119->104 122 401718-40171c 119->122 120->119 124 4016d3-4016e9 120->124 122->104 125 401722-401743 NtMapViewOfSection 122->125 124->119 125->104 126 401749-401765 NtMapViewOfSection 125->126 126->104 128 40176b call 401770 126->128
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016CC
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040170D
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040173E
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 6e5378c6e07f8f1cfc11ef4e8baac81da528770591f7bb82d03212312d780794
                    • Instruction ID: 41bad0b44a30b648fd10ec653759f3e2d4f26d0064c4360c6bd1617af4920333
                    • Opcode Fuzzy Hash: 6e5378c6e07f8f1cfc11ef4e8baac81da528770591f7bb82d03212312d780794
                    • Instruction Fuzzy Hash: 99614EB4A04205FBEB209F91CC48FAF7BB8EF85750F10012AF912BA2E5D6749901DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 132 4015bb-4015c0 136 4015c6-4015f9 call 401230 132->136 137 4015cf 132->137 144 4015fb 136->144 145 4015fe-401603 136->145 137->136 144->145 147 401922-40192a 145->147 148 401609-40161a 145->148 147->145 153 40192f-40196e call 401230 147->153 151 401920 148->151 152 401620-401649 148->152 151->153 152->151 160 40164f-401666 NtDuplicateObject 152->160 160->151 163 40166c-401690 NtCreateSection 160->163 165 401692-4016b3 NtMapViewOfSection 163->165 166 4016ec-401712 NtCreateSection 163->166 165->166 167 4016b5-4016d1 NtMapViewOfSection 165->167 166->151 169 401718-40171c 166->169 167->166 171 4016d3-4016e9 167->171 169->151 172 401722-401743 NtMapViewOfSection 169->172 171->166 172->151 173 401749-401765 NtMapViewOfSection 172->173 173->151 175 40176b call 401770 173->175
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016CC
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040170D
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040173E
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 712a80f5aae2f7d8a46131d98638aea49a70ef3eb832348ca5647a83a678c73c
                    • Instruction ID: fb9b55fee49d42ff48ca3b7d0c17e272d11f9292fbe7058d838162974b4c5ad2
                    • Opcode Fuzzy Hash: 712a80f5aae2f7d8a46131d98638aea49a70ef3eb832348ca5647a83a678c73c
                    • Instruction Fuzzy Hash: 1951F9B5900245BFEB208F91CC48FEFBBB8EF85750F14016AF912BA2E5D6749941CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 222 4015cd-4015f9 call 401230 231 4015fb 222->231 232 4015fe-401603 222->232 231->232 234 401922-40192a 232->234 235 401609-40161a 232->235 234->232 240 40192f-40196e call 401230 234->240 238 401920 235->238 239 401620-401649 235->239 238->240 239->238 247 40164f-401666 NtDuplicateObject 239->247 247->238 250 40166c-401690 NtCreateSection 247->250 252 401692-4016b3 NtMapViewOfSection 250->252 253 4016ec-401712 NtCreateSection 250->253 252->253 254 4016b5-4016d1 NtMapViewOfSection 252->254 253->238 256 401718-40171c 253->256 254->253 258 4016d3-4016e9 254->258 256->238 259 401722-401743 NtMapViewOfSection 256->259 258->253 259->238 260 401749-401765 NtMapViewOfSection 259->260 260->238 262 40176b call 401770 260->262
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016CC
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040170D
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040173E
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 2194d91dc2ac066401799d55ae4b1dd12daa1b3840c623e6e516d835a0887258
                    • Instruction ID: 42c8c2fc3c6054e0d1c1d833daf51e3b22f51847d611e1bc0fff35a5321be168
                    • Opcode Fuzzy Hash: 2194d91dc2ac066401799d55ae4b1dd12daa1b3840c623e6e516d835a0887258
                    • Instruction Fuzzy Hash: 6251F9B5900245BBEB208F91CC48FEFBBB8FF85750F140169F911BA2E5D6749941CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 179 4015bf-4015f9 call 401230 187 4015fb 179->187 188 4015fe-401603 179->188 187->188 190 401922-40192a 188->190 191 401609-40161a 188->191 190->188 196 40192f-40196e call 401230 190->196 194 401920 191->194 195 401620-401649 191->195 194->196 195->194 203 40164f-401666 NtDuplicateObject 195->203 203->194 206 40166c-401690 NtCreateSection 203->206 208 401692-4016b3 NtMapViewOfSection 206->208 209 4016ec-401712 NtCreateSection 206->209 208->209 210 4016b5-4016d1 NtMapViewOfSection 208->210 209->194 212 401718-40171c 209->212 210->209 214 4016d3-4016e9 210->214 212->194 215 401722-401743 NtMapViewOfSection 212->215 214->209 215->194 216 401749-401765 NtMapViewOfSection 215->216 216->194 218 40176b call 401770 216->218
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016CC
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040170D
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040173E
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 49cbe3f764e7595b40ecd91b6a7c17dc4f7c8351402c6df9df78a0938f6c63f8
                    • Instruction ID: bfc0d8d868b6e02101869f07f4f74d86685854826d872acaeea2d8960c9d924e
                    • Opcode Fuzzy Hash: 49cbe3f764e7595b40ecd91b6a7c17dc4f7c8351402c6df9df78a0938f6c63f8
                    • Instruction Fuzzy Hash: 9351F9B5900249BBEB208F91CC48FEFBBB8EF85B50F140169F911BA2A5D6749941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 266 4015d1-4015f9 call 401230 273 4015fb 266->273 274 4015fe-401603 266->274 273->274 276 401922-40192a 274->276 277 401609-40161a 274->277 276->274 282 40192f-40196e call 401230 276->282 280 401920 277->280 281 401620-401649 277->281 280->282 281->280 289 40164f-401666 NtDuplicateObject 281->289 289->280 292 40166c-401690 NtCreateSection 289->292 294 401692-4016b3 NtMapViewOfSection 292->294 295 4016ec-401712 NtCreateSection 292->295 294->295 296 4016b5-4016d1 NtMapViewOfSection 294->296 295->280 298 401718-40171c 295->298 296->295 300 4016d3-4016e9 296->300 298->280 301 401722-401743 NtMapViewOfSection 298->301 300->295 301->280 302 401749-401765 NtMapViewOfSection 301->302 302->280 304 40176b call 401770 302->304
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016CC
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040170D
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040173E
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 9d300ef8bd84aee41b4e0b1ff288b8da3af8c63dbcddcc92868984b9c9f960c5
                    • Instruction ID: f30c3e3a6cc1f72b44209514c820a6db446ed36b75355faf060f16350dcf6eca
                    • Opcode Fuzzy Hash: 9d300ef8bd84aee41b4e0b1ff288b8da3af8c63dbcddcc92868984b9c9f960c5
                    • Instruction Fuzzy Hash: AF51F8B5900249BBEB208F91CC48FEFBBB8EF85B50F140159F911BA2A5D6749941CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 308 4015d4-4015f9 call 401230 313 4015fb 308->313 314 4015fe-401603 308->314 313->314 316 401922-40192a 314->316 317 401609-40161a 314->317 316->314 322 40192f-40196e call 401230 316->322 320 401920 317->320 321 401620-401649 317->321 320->322 321->320 329 40164f-401666 NtDuplicateObject 321->329 329->320 332 40166c-401690 NtCreateSection 329->332 334 401692-4016b3 NtMapViewOfSection 332->334 335 4016ec-401712 NtCreateSection 332->335 334->335 336 4016b5-4016d1 NtMapViewOfSection 334->336 335->320 338 401718-40171c 335->338 336->335 340 4016d3-4016e9 336->340 338->320 341 401722-401743 NtMapViewOfSection 338->341 340->335 341->320 342 401749-401765 NtMapViewOfSection 341->342 342->320 344 40176b call 401770 342->344
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016CC
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 0040170D
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040173E
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 2d7fdb25284bcc8ab5e3784c4571b5c01e63ed33f79af924ad018a85a7239317
                    • Instruction ID: 56582155fd1d66f70974beedeeaed2f840c918c3938996436a0ad6123946e001
                    • Opcode Fuzzy Hash: 2d7fdb25284bcc8ab5e3784c4571b5c01e63ed33f79af924ad018a85a7239317
                    • Instruction Fuzzy Hash: 395108B5900249BBEB208F91CC88FEFBBB8EF85B50F140159F911AA2A5D7709945CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 348 2e621b1-2e621ca 349 2e621cc-2e621ce 348->349 350 2e621d5-2e621e1 CreateToolhelp32Snapshot 349->350 351 2e621d0 349->351 352 2e621e3-2e621e9 350->352 353 2e621f1-2e621fe Module32First 350->353 351->350 352->353 358 2e621eb-2e621ef 352->358 354 2e62207-2e6220f 353->354 355 2e62200-2e62201 call 2e61e70 353->355 359 2e62206 355->359 358->349 358->353 359->354
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02E621D9
                    • Module32First.KERNEL32(00000000,00000224), ref: 02E621F9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694439425.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E5B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e5b000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 80774046262e657044a0c5bbe61224384e19d5ab18c60cf7e272e4aefee07cbc
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 81F0F6312807106BD7203BF8A88CB7E76ECAF493A8F106528FB56D50C0DBB0E8454A71

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 2e2003c-2e20047 1 2e20049 0->1 2 2e2004c-2e20263 call 2e20a3f call 2e20e0f call 2e20d90 VirtualAlloc 0->2 1->2 17 2e20265-2e20289 call 2e20a69 2->17 18 2e2028b-2e20292 2->18 23 2e202ce-2e203c2 VirtualProtect call 2e20cce call 2e20ce7 17->23 20 2e202a1-2e202b0 18->20 22 2e202b2-2e202cc 20->22 20->23 22->20 29 2e203d1-2e203e0 23->29 30 2e203e2-2e20437 call 2e20ce7 29->30 31 2e20439-2e204b8 VirtualFree 29->31 30->29 33 2e205f4-2e205fe 31->33 34 2e204be-2e204cd 31->34 37 2e20604-2e2060d 33->37 38 2e2077f-2e20789 33->38 36 2e204d3-2e204dd 34->36 36->33 40 2e204e3-2e20505 36->40 37->38 43 2e20613-2e20637 37->43 41 2e207a6-2e207b0 38->41 42 2e2078b-2e207a3 38->42 51 2e20517-2e20520 40->51 52 2e20507-2e20515 40->52 44 2e207b6-2e207cb 41->44 45 2e2086e-2e208be LoadLibraryA 41->45 42->41 46 2e2063e-2e20648 43->46 48 2e207d2-2e207d5 44->48 50 2e208c7-2e208f9 45->50 46->38 49 2e2064e-2e2065a 46->49 53 2e207d7-2e207e0 48->53 54 2e20824-2e20833 48->54 49->38 55 2e20660-2e2066a 49->55 56 2e20902-2e2091d 50->56 57 2e208fb-2e20901 50->57 58 2e20526-2e20547 51->58 52->58 59 2e207e2 53->59 60 2e207e4-2e20822 53->60 62 2e20839-2e2083c 54->62 61 2e2067a-2e20689 55->61 57->56 63 2e2054d-2e20550 58->63 59->54 60->48 64 2e20750-2e2077a 61->64 65 2e2068f-2e206b2 61->65 62->45 66 2e2083e-2e20847 62->66 72 2e205e0-2e205ef 63->72 73 2e20556-2e2056b 63->73 64->46 67 2e206b4-2e206ed 65->67 68 2e206ef-2e206fc 65->68 69 2e2084b-2e2086c 66->69 70 2e20849 66->70 67->68 74 2e2074b 68->74 75 2e206fe-2e20748 68->75 69->62 70->45 72->36 76 2e2056f-2e2057a 73->76 77 2e2056d 73->77 74->61 75->74 80 2e2059b-2e205bb 76->80 81 2e2057c-2e20599 76->81 77->72 84 2e205bd-2e205db 80->84 81->84 84->63
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 02E2024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e20000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: bf7558aa261c7e9f0bf3ab8e2195609813a6ede93c7c4eb9cfb164d9dfac32cf
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 13526B75A41229DFDB64CF58C984BACBBB1BF09314F1480D9E54DAB391DB30AA89CF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 361 2e20e0f-2e20e24 SetErrorMode * 2 362 2e20e26 361->362 363 2e20e2b-2e20e2c 361->363 362->363
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,02E20223,?,?), ref: 02E20E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,02E20223,?,?), ref: 02E20E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e20000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: 00dfb41ce48c535117d73a9952129246be58987ed129c26202745da8aced8991
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: D5D0123114512877DB002A94DC09BCD7B1CDF05B66F008011FB0DD9080C770954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 364 401971-4019da call 401230 Sleep call 4014b4 378 4019e9-4019ef 364->378 379 4019dc-4019e4 call 4015a5 364->379 382 401a04 378->382 383 4019f5-401a38 call 401230 378->383 379->378 382->383
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 2e95684dc8b5410d2eca61f9e064cce7de645e321735a1764ac2a390b7614860
                    • Instruction ID: 7dcee170f8aadddd500080ebcf8028d664774791e86c047af75ed4c3a1e846e4
                    • Opcode Fuzzy Hash: 2e95684dc8b5410d2eca61f9e064cce7de645e321735a1764ac2a390b7614860
                    • Instruction Fuzzy Hash: 481108B170C204E7E7009A949D52E7A32689B41314F300137B643791F1D67D9913FBAF

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 394 40197c-4019da call 401230 Sleep call 4014b4 406 4019e9-4019ef 394->406 407 4019dc-4019e4 call 4015a5 394->407 410 401a04 406->410 411 4019f5-401a38 call 401230 406->411 407->406 410->411
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: f35fbf5d9835a8e1d59ca2ec59d9971422495a2d1a1711f92afe40ee99f95285
                    • Instruction ID: 1a6437e2a7af3611ac2357d91b17f6bbe402c23fd9b2aff2567646cef7d18b24
                    • Opcode Fuzzy Hash: f35fbf5d9835a8e1d59ca2ec59d9971422495a2d1a1711f92afe40ee99f95285
                    • Instruction Fuzzy Hash: CD11ED7170D204EBEB009A90CD82EAA3364AB41310F30017BF243791F2D63D9813AB6B

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 422 40199f-4019da call 401230 Sleep call 4014b4 433 4019e9-4019ef 422->433 434 4019dc-4019e4 call 4015a5 422->434 437 401a04 433->437 438 4019f5-401a38 call 401230 433->438 434->433 437->438
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: d49bf211624a183c5aff3b88ff5f11e2d7e095bfb9322cb2fab4da2a0e61e233
                    • Instruction ID: ff0b4a9e70c304bd1845563b614ead501f8dd9594f44597b8e492f65dbeff281
                    • Opcode Fuzzy Hash: d49bf211624a183c5aff3b88ff5f11e2d7e095bfb9322cb2fab4da2a0e61e233
                    • Instruction Fuzzy Hash: 90017C71709204EBEB009A94DD81EAA32249B45314F300277B653791F2D67D9912AB6F

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 449 401996-4019da call 401230 Sleep call 4014b4 459 4019e9-4019ef 449->459 460 4019dc-4019e4 call 4015a5 449->460 463 401a04 459->463 464 4019f5-401a38 call 401230 459->464 460->459 463->464
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 4de80b9f47e4ae29d6088a074243e7a574dd56949fbda982d12fbc508f47ad66
                    • Instruction ID: eda55832a2cd0e161a97d7c97da9d7ff7d7a6918e5766964519d6ff9cad9236d
                    • Opcode Fuzzy Hash: 4de80b9f47e4ae29d6088a074243e7a574dd56949fbda982d12fbc508f47ad66
                    • Instruction Fuzzy Hash: B6018F71709204EBEB009A94DD82EAA32659B45314F300177F613791F2D67D9913BBAF
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02E61EC1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694439425.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E5B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e5b000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: dc3e70a462c0b423b17dafe4a3346388c83f7926ccf958271e520d8b78cb7e7a
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: C6112B79A40208EFDB01DF98C989E99BBF5AF08351F058094FA489B361D771EA50DF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 475 4019a3-4019da call 401230 Sleep call 4014b4 484 4019e9-4019ef 475->484 485 4019dc-4019e4 call 4015a5 475->485 488 401a04 484->488 489 4019f5-401a38 call 401230 484->489 485->484 488->489
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 1a364d6effcc40ac0042f1280a119f868f134fd00aec2be3b257fd846209b8b3
                    • Instruction ID: a8714c2cc8ba5922cfbb26050d9e99a74f1c083600e6ebc9bd06535745241c55
                    • Opcode Fuzzy Hash: 1a364d6effcc40ac0042f1280a119f868f134fd00aec2be3b257fd846209b8b3
                    • Instruction Fuzzy Hash: FD01AD71309204EBEB00AA94DD82EAE3224AB44314F300177B613781F2D67D9913AB6B

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 500 4019a6-4019da call 401230 Sleep call 4014b4 506 4019e9-4019ef 500->506 507 4019dc-4019e4 call 4015a5 500->507 510 401a04 506->510 511 4019f5-401a38 call 401230 506->511 507->506 510->511
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 375e26b3f1008080540ece03d3bea115b2c347d3cb02d6489650221769795c4a
                    • Instruction ID: c6fc76c5dd42ca33e043e4988469126da4fcf1a5840464efe1596a2944423f63
                    • Opcode Fuzzy Hash: 375e26b3f1008080540ece03d3bea115b2c347d3cb02d6489650221769795c4a
                    • Instruction Fuzzy Hash: C601A271309204EBDB00AA94DD82EAE3364AB44314F200577B603791F2D77D9912BB6B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 2565b0cbe1ac7d43ab51b008bab1316dfb5d716e876b8911521e383b75e23e13
                    • Instruction ID: 6c880233279e19fad1767462897a4b434f8fa4fb9d4e96048f9b74d24772d314
                    • Opcode Fuzzy Hash: 2565b0cbe1ac7d43ab51b008bab1316dfb5d716e876b8911521e383b75e23e13
                    • Instruction Fuzzy Hash: E701AD71309204EBDB00AA94DC82EAA3324AB44324F300177F613780F2D73D9912AB6B
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 004019C5
                      • Part of subcall function 004015A5: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040165E
                      • Part of subcall function 004015A5: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 0040168B
                      • Part of subcall function 004015A5: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 9249e6c347c39a1a4aad0e95f3c462ef6fd912f79b1e24989119bbd061585ab0
                    • Instruction ID: 75a91e03726f7b8b34843d6799eba71702c3b088b969b1c3ca419d2ba2141a13
                    • Opcode Fuzzy Hash: 9249e6c347c39a1a4aad0e95f3c462ef6fd912f79b1e24989119bbd061585ab0
                    • Instruction Fuzzy Hash: 1AF0A431309204FBDB00ABD4DC42DAE3364AB44314F200177B613781F2D67D9912AF6B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e20000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: 0622ab01cf25bf12907810ddac50a8e0dcdeee675db74ab547301bf2114fc0e0
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 583149B6901619DFDB10CF99C880AAEBBF5FF58328F14904AD442B7250D771EA49CFA4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID:
                    • String ID: ^;^p
                    • API String ID: 0-1452649498
                    • Opcode ID: 2f11579ed6ecaccfbb963cba8e838083dd8515e3939fbe8604e56738683dcb24
                    • Instruction ID: f02c42c73d2da16e4c2a2424d711713793af7c30c079d87c28513edff295cc0b
                    • Opcode Fuzzy Hash: 2f11579ed6ecaccfbb963cba8e838083dd8515e3939fbe8604e56738683dcb24
                    • Instruction Fuzzy Hash: 4E71B532149760DBC761FF7CE6C55C6BBA0FE0972431449AFD1C69A982C2B6A042CBD5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694439425.0000000002E5B000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E5B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e5b000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: e1dd99d247e8577da62bf735995334762f612eb0d38ac0965925a9a2d5e92a1a
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: 82118E72780100AFDB54DF59DC94FA673EAFB89264B19C169ED08CF315E676E802CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1694037919.0000000002E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E20000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2e20000_LH27WS7BVJ.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: d2a9083595d6ee6a256dc2e8d6a0012d07527aa321de95ca19ac6d920076e272
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: B701F7766516108FDF21CF20C804BAA33F5EB96309F0590A4D507972C1E370A9458B80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4924d4d24f223221fdbb9a0ec2e4b6b2bb59ca9faec4bc60e2856aeda0837f4c
                    • Instruction ID: 02225ea202e809a45205119e8d6d068647febcbf8a73176ef8c7a49ae2e2926a
                    • Opcode Fuzzy Hash: 4924d4d24f223221fdbb9a0ec2e4b6b2bb59ca9faec4bc60e2856aeda0837f4c
                    • Instruction Fuzzy Hash: 53F0A35B60004589C60057D846C54C9EF7052AB7343381BFFC1B35B6C2E1F44207AE70
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1315f76aedc072e882277cb11b63ec4cabce7e3242d6b99178868fe1690cb992
                    • Instruction ID: fd08cc4acbec9d724d170e495cae0b8411d18b9e730c60b94546074d743e6c2e
                    • Opcode Fuzzy Hash: 1315f76aedc072e882277cb11b63ec4cabce7e3242d6b99178868fe1690cb992
                    • Instruction Fuzzy Hash: BEE0D8378851404AEA628B98878B984BF72F1874307380A68C14669A67C1F6430BB331
                    Memory Dump Source
                    • Source File: 00000000.00000002.1691388070.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_LH27WS7BVJ.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 168fb599194ead4b33809b34bb7bb54dc03455e6f8294ee412123f88df47309e
                    • Instruction ID: 34cabaf976a25a87465afe27a04e1e539af209cd9adb84c7ab4f63964ef161c7
                    • Opcode Fuzzy Hash: 168fb599194ead4b33809b34bb7bb54dc03455e6f8294ee412123f88df47309e
                    • Instruction Fuzzy Hash: 96C08075C4500489E956C6988DC77C57F37F0178307741F1DD5455AD37C27341179275

                    Execution Graph

                    Execution Coverage:9.7%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:48
                    Total number of Limit Nodes:2
                    execution_graph 1209 48c003c 1210 48c0049 1209->1210 1222 48c0e0f SetErrorMode SetErrorMode 1210->1222 1215 48c0265 1216 48c02ce VirtualProtect 1215->1216 1218 48c030b 1216->1218 1217 48c0439 VirtualFree 1220 48c04be LoadLibraryA 1217->1220 1218->1217 1221 48c08c7 1220->1221 1223 48c0223 1222->1223 1224 48c0d90 1223->1224 1225 48c0dad 1224->1225 1226 48c0dbb GetPEB 1225->1226 1227 48c0238 VirtualAlloc 1225->1227 1226->1227 1227->1215 1228 2ce1469 1229 2ce1478 1228->1229 1232 2ce1c09 1229->1232 1234 2ce1c24 1232->1234 1233 2ce1c2d CreateToolhelp32Snapshot 1233->1234 1235 2ce1c49 Module32First 1233->1235 1234->1233 1234->1235 1236 2ce1c58 1235->1236 1238 2ce1481 1235->1238 1239 2ce18c8 1236->1239 1240 2ce18f3 1239->1240 1241 2ce1904 VirtualAlloc 1240->1241 1242 2ce193c 1240->1242 1241->1242 1242->1242 1243 48c0005 1248 48c092b GetPEB 1243->1248 1245 48c0030 1250 48c003c 1245->1250 1249 48c0972 1248->1249 1249->1245 1251 48c0049 1250->1251 1252 48c0e0f 2 API calls 1251->1252 1253 48c0223 1252->1253 1254 48c0d90 GetPEB 1253->1254 1255 48c0238 VirtualAlloc 1254->1255 1256 48c0265 1255->1256 1257 48c02ce VirtualProtect 1256->1257 1259 48c030b 1257->1259 1258 48c0439 VirtualFree 1261 48c04be LoadLibraryA 1258->1261 1259->1258 1262 48c08c7 1261->1262 1263 48c0001 1264 48c0005 1263->1264 1265 48c092b GetPEB 1264->1265 1266 48c0030 1265->1266 1267 48c003c 7 API calls 1266->1267 1268 48c0038 1267->1268

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 48c003c-48c0047 1 48c004c-48c0263 call 48c0a3f call 48c0e0f call 48c0d90 VirtualAlloc 0->1 2 48c0049 0->2 17 48c028b-48c0292 1->17 18 48c0265-48c0289 call 48c0a69 1->18 2->1 20 48c02a1-48c02b0 17->20 22 48c02ce-48c03c2 VirtualProtect call 48c0cce call 48c0ce7 18->22 20->22 23 48c02b2-48c02cc 20->23 29 48c03d1-48c03e0 22->29 23->20 30 48c0439-48c04b8 VirtualFree 29->30 31 48c03e2-48c0437 call 48c0ce7 29->31 33 48c04be-48c04cd 30->33 34 48c05f4-48c05fe 30->34 31->29 36 48c04d3-48c04dd 33->36 37 48c077f-48c0789 34->37 38 48c0604-48c060d 34->38 36->34 40 48c04e3-48c0505 36->40 41 48c078b-48c07a3 37->41 42 48c07a6-48c07b0 37->42 38->37 43 48c0613-48c0637 38->43 54 48c0517-48c0520 40->54 55 48c0507-48c0515 40->55 41->42 45 48c086e-48c08be LoadLibraryA 42->45 46 48c07b6-48c07cb 42->46 44 48c063e-48c0648 43->44 44->37 47 48c064e-48c065a 44->47 53 48c08c7-48c08f9 45->53 49 48c07d2-48c07d5 46->49 47->37 52 48c0660-48c066a 47->52 50 48c0824-48c0833 49->50 51 48c07d7-48c07e0 49->51 60 48c0839-48c083c 50->60 57 48c07e4-48c0822 51->57 58 48c07e2 51->58 59 48c067a-48c0689 52->59 61 48c08fb-48c0901 53->61 62 48c0902-48c091d 53->62 56 48c0526-48c0547 54->56 55->56 63 48c054d-48c0550 56->63 57->49 58->50 64 48c068f-48c06b2 59->64 65 48c0750-48c077a 59->65 60->45 66 48c083e-48c0847 60->66 61->62 67 48c0556-48c056b 63->67 68 48c05e0-48c05ef 63->68 69 48c06ef-48c06fc 64->69 70 48c06b4-48c06ed 64->70 65->44 71 48c0849 66->71 72 48c084b-48c086c 66->72 74 48c056d 67->74 75 48c056f-48c057a 67->75 68->36 76 48c06fe-48c0748 69->76 77 48c074b 69->77 70->69 71->45 72->60 74->68 78 48c057c-48c0599 75->78 79 48c059b-48c05bb 75->79 76->77 77->59 84 48c05bd-48c05db 78->84 79->84 84->63
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 048C024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.1941515606.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_48c0000_wtftrbr.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: bd9e77228a92fd0b16ef38f927e9806ca237c2a912bb725c33ce2dfc6e2dd51a
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 9F527A74A01229DFDB64CF98C984BACBBB1BF09304F1485D9E50DAB351DB30AA85DF15

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 85 2ce1c09-2ce1c22 86 2ce1c24-2ce1c26 85->86 87 2ce1c2d-2ce1c39 CreateToolhelp32Snapshot 86->87 88 2ce1c28 86->88 89 2ce1c3b-2ce1c41 87->89 90 2ce1c49-2ce1c56 Module32First 87->90 88->87 89->90 96 2ce1c43-2ce1c47 89->96 91 2ce1c5f-2ce1c67 90->91 92 2ce1c58-2ce1c59 call 2ce18c8 90->92 97 2ce1c5e 92->97 96->86 96->90 97->91
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02CE1C31
                    • Module32First.KERNEL32(00000000,00000224), ref: 02CE1C51
                    Memory Dump Source
                    • Source File: 00000003.00000002.1941400771.0000000002CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CDB000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_2cdb000_wtftrbr.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 1dc61f7da6a2de731c5d7a1c4be0a16e26167ff17dab60d6adcccf8c71839250
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: B7F09631100B146BDB303BF5A88DBAE76ECEF89624F180528E65BD10C0DBB0ED559A61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 98 48c0e0f-48c0e24 SetErrorMode * 2 99 48c0e2b-48c0e2c 98->99 100 48c0e26 98->100 100->99
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,048C0223,?,?), ref: 048C0E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,048C0223,?,?), ref: 048C0E1E
                    Memory Dump Source
                    • Source File: 00000003.00000002.1941515606.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_48c0000_wtftrbr.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: 974fbefe494e3660b2d81de3df00582b3900c2d20be45972480681e4c8a0c2b8
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 2DD01231545128B7D7003AD4DC09BCD7B1CDF05BA2F008411FB0DD9080C770954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 101 2ce18c8-2ce1902 call 2ce1bdb 104 2ce1904-2ce1937 VirtualAlloc call 2ce1955 101->104 105 2ce1950 101->105 107 2ce193c-2ce194e 104->107 105->105 107->105
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02CE1919
                    Memory Dump Source
                    • Source File: 00000003.00000002.1941400771.0000000002CDB000.00000040.00000020.00020000.00000000.sdmp, Offset: 02CDB000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_2cdb000_wtftrbr.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 7b8f5b1e44f867d4736735c799f733ea44a91e76f0184c5c31db9b90b020b538
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: F5113F79A00208EFDB01DF98C985E98BBF5AF08351F098094F948AB361D371EA50DF90