Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LG3adrtYi2.exe

Overview

General Information

Sample name:LG3adrtYi2.exe
renamed because original name is a hash value
Original sample name:de36bc2bfc3c67820ebd75c912fadc3d.exe
Analysis ID:1448262
MD5:de36bc2bfc3c67820ebd75c912fadc3d
SHA1:38bd51e1052ae5bede5293827e87d6f494b204c8
SHA256:2a5083d6e55f5cb56764fc4ed7ad082a0ef75a908ed03132178cc80f802c3d16
Tags:32exetrojan
Infos:

Detection

Phorpiex
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
AI detected suspicious sample
Found evasive API chain (may stop execution after checking mutex)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for dropped file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LG3adrtYi2.exe (PID: 2708 cmdline: "C:\Users\user\Desktop\LG3adrtYi2.exe" MD5: DE36BC2BFC3C67820EBD75C912FADC3D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
LG3adrtYi2.exeJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.LG3adrtYi2.exe.f00000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
      0.2.LG3adrtYi2.exe.f00000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: LG3adrtYi2.exeAvira: detected
        Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeReversingLabs: Detection: 79%
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeVirustotal: Detection: 71%Perma Link
        Source: LG3adrtYi2.exeReversingLabs: Detection: 68%
        Source: LG3adrtYi2.exeVirustotal: Detection: 72%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.7% probability
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: LG3adrtYi2.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.LG3adrtYi2.exe.f00000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.LG3adrtYi2.exe.f00000.0.unpack, type: UNPACKEDPE
        Source: LG3adrtYi2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: LG3adrtYi2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F028F0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathCombineW,Sleep,Sleep,FindNextFileW,FindCloseChangeNotification,0_2_00F028F0
        Source: integrator.exe.0.drString found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
        Source: VC_redist.x64.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
        Source: integrator.exe.0.drString found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com
        Source: integrator.exe.0.drString found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed
        Source: integrator.exe.0.drBinary or memory string: RegisterRawInputDevicesmemstr_0978e8bc-c

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: Yara matchFile source: LG3adrtYi2.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.LG3adrtYi2.exe.f00000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.LG3adrtYi2.exe.f00000.0.unpack, type: UNPACKEDPE
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 334EB73AFEC7E581BC3D755494F1BF1C4164D4DB7671F2581EA0A1E48E94CCBA
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe F6B6E8A5ECEABC8B6D2F96B1999E16034E32AB6A2FDE2254110A61A27817F956
        Source: LG3adrtYi2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal96.troj.evad.winEXE@1/4@0/0
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeMutant created: \Sessions\1\BaseNamedObjects\ 959979
        Source: LG3adrtYi2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: integrator.exe.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: integrator.exe.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: LG3adrtYi2.exeReversingLabs: Detection: 68%
        Source: LG3adrtYi2.exeVirustotal: Detection: 72%
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: Compile Script to .exe (x64).lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe
        Source: Compile Script to .exe (x86).lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: LG3adrtYi2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: LG3adrtYi2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: LG3adrtYi2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: LG3adrtYi2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: LG3adrtYi2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: LG3adrtYi2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: initial sampleStatic PE information: section where entry point is pointing to: .zero
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .wixburn
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .zero
        Source: integrator.exe.0.drStatic PE information: section name: .zero
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F03221 push ecx; ret 0_2_00F03234
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-544
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-544
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeThread delayed: delay time: 3600000Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeThread delayed: delay time: 3600000Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeWindow / User API: threadDelayed 1175Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeWindow / User API: threadDelayed 7389Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeDropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeDropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\LG3adrtYi2.exe TID: 1816Thread sleep count: 1175 > 30Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exe TID: 1816Thread sleep time: -4230000000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exe TID: 1816Thread sleep count: 7389 > 30Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exe TID: 1816Thread sleep time: -26600400000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F028F0 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathCombineW,Sleep,Sleep,FindNextFileW,FindCloseChangeNotification,0_2_00F028F0
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeThread delayed: delay time: 3600000Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeThread delayed: delay time: 3600000Jump to behavior
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeAPI call chain: ExitProcess graph end nodegraph_0-546

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F03358 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00F03358
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F01D30 mov eax, dword ptr fs:[00000030h]0_2_00F01D30
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F03358 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_00F03358
        Source: C:\Users\user\Desktop\LG3adrtYi2.exeCode function: 0_2_00F03288 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00F03288

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: LG3adrtYi2.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.LG3adrtYi2.exe.f00000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.LG3adrtYi2.exe.f00000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        122
        Virtualization/Sandbox Evasion
        11
        Input Capture
        1
        System Time Discovery
        Remote Services11
        Input Capture
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        DLL Side-Loading
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager122
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        LG3adrtYi2.exe68%ReversingLabsWin32.Ransomware.GandCrab
        LG3adrtYi2.exe73%VirustotalBrowse
        LG3adrtYi2.exe100%AviraTR/AD.Phorpiex.zicsf
        SourceDetectionScannerLabelLink
        C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%Joe Sandbox ML
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe79%ReversingLabsWin32.Ransomware.GandCrab
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe71%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor0%URL Reputationsafe
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte0%Avira URL Cloudsafe
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte0%VirustotalBrowse
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporteintegrator.exe.0.drfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgorVC_redist.x64.exe.0.drfalse
        • URL Reputation: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1448262
        Start date and time:2024-05-28 07:12:05 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 40s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:LG3adrtYi2.exe
        renamed because original name is a hash value
        Original Sample Name:de36bc2bfc3c67820ebd75c912fadc3d.exe
        Detection:MAL
        Classification:mal96.troj.evad.winEXE@1/4@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 7
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenFile calls found.
        TimeTypeDescription
        01:12:54API Interceptor11517806x Sleep call for process: LG3adrtYi2.exe modified
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exej3K4xUSpAP.exeGet hashmaliciousPhorpiexBrowse
          7Za8LyDkT3.exeGet hashmaliciousPhorpiexBrowse
            C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exej3K4xUSpAP.exeGet hashmaliciousPhorpiexBrowse
              7Za8LyDkT3.exeGet hashmaliciousPhorpiexBrowse
                Process:C:\Users\user\Desktop\LG3adrtYi2.exe
                File Type:PE32 executable (console) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):4436200
                Entropy (8bit):6.56749584340829
                Encrypted:false
                SSDEEP:98304:XlkkCqyDEY7+o3OBvfGVY+40yajyS+9s/pL:1kkCqaE68eV+0y8E6L
                MD5:3628A0C7F2AE1396600281E7EF409232
                SHA1:FF26E243C3CEAB3BA70D02663A9DF109F118504F
                SHA-256:334EB73AFEC7E581BC3D755494F1BF1C4164D4DB7671F2581EA0A1E48E94CCBA
                SHA-512:23D3CE5D3B49ECCBEB2E41C97E011128A034640CE5BAF7F9FABF898CB1C05FD88FA2DA1BA439FE213E99AFCE9F8530BB69A5C7EF0843985A514C8B64F9E1B060
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                Joe Sandbox View:
                • Filename: j3K4xUSpAP.exe, Detection: malicious, Browse
                • Filename: 7Za8LyDkT3.exe, Detection: malicious, Browse
                Reputation:low
                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........:V@.[8..[8..[8.{);..[8.{)=..[8..!<..[8..!;..[8..!=..[8.\.U..[8.\.E..[8.{)<..[8.{)>..[8.{)9..[8..[9..X8..!=..[8..!1.0^8..!...[8..[...[8..!:..[8.Rich.[8.................PE..L.................".... ..*..Z........C......`+...@...........................C..............................................=......p?..............RC..N....?.....<.=.8...................P.:..... .+.@.............+......j=......................text.....*.......*................. ..`.rdata........+.......*.............@..@.data.........=.......=.............@....rsrc........p?......F?.............@..@.reloc........?......R?.............@..B.zero.........C......RC................`........................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\LG3adrtYi2.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Sep 19 17:41:52 2022, mtime=Tue Oct 3 09:52:00 2023, atime=Mon Sep 19 17:41:52 2022, length=1800288, window=hide
                Category:dropped
                Size (bytes):1230
                Entropy (8bit):4.632027866898637
                Encrypted:false
                SSDEEP:24:8mILQv/ErdOE47gLOCOUANHdx4dLoUUFcqEqCqySm:8mUQvcrdOmLLiNHdedL905h/yS
                MD5:350FA50DC58FD12A16E26A371ACC95CD
                SHA1:706EB6FDA3D19BD277C9E4ACFF30C6E73D27CE0C
                SHA-256:BFC14A8741014EA128F0C07D657FE022FE05466BDDB322D20DDB54E3E6D92B5E
                SHA-512:D8BC37B90B3D6931A72C8341D9E0FC1932B81717378D8241AA240258430C81A70D90300223FA71B51BB40429E1436CBB8A383A2428AB508FBEA7AE556D56BC89
                Malicious:false
                Reputation:low
                Preview:L..................F.... ......{W...A.8........{W...`x...........................P.O. .:i.....+00.../C:\.....................1.....CW.V..PROGRA~2.........O.ICW.V....................V......_S.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1.....CW.V..AutoIt3.@......CW.VCW.V..........................'...A.u.t.o.I.t.3.....V.1.....CW.V..Aut2Exe.@......CW.VCW.V..............................A.u.t.2.E.x.e.....l.2.`x..3U:. .AUT2EX~1.EXE..P......3U:.CW.V..............................A.u.t.2.e.x.e._.x.6.4...e.x.e.......e...............-.......d............F.......C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe..E.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.u.t.o.I.t.3.\.A.u.t.2.E.x.e.\.A.u.t.2.e.x.e._.x.6.4...e.x.e.&.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.u.t.o.I.t.3.\.A.u.t.2.E.x.e.........*................@Z|...K.J.........`.......X.......desktop-aget0tr..hT..CrF.f4... .G...a......).;.hT..CrF.f4... .
                Process:C:\Users\user\Desktop\LG3adrtYi2.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Sep 19 17:41:50 2022, mtime=Tue Oct 3 09:52:00 2023, atime=Mon Sep 19 17:41:50 2022, length=1634400, window=hide
                Category:dropped
                Size (bytes):1208
                Entropy (8bit):4.62426465035476
                Encrypted:false
                SSDEEP:24:8m/HvtQv/ErdOE47gLO4jQA52dq4dLoUUFcQ+qySm:8mtQvcrdOmLXj52djdL903yS
                MD5:6E3815AD2A00A3C631CBE8A61788A64D
                SHA1:8ED178302DDFEC730D9195A9C053A6288FA73B5E
                SHA-256:091004254BC3CED0CC62046CDF4D252E7C626A4B444D966CC8F312BCD4AAC127
                SHA-512:0BB6B9E89BC691A5E2B58E591C5F052B6FBF94B3C960ABAB5C40EBAFB23FF7D918222DCA30B42AE507AE057D27253AAAA1F21DA079EED7FCBE28FD89DAEB1F54
                Malicious:false
                Reputation:low
                Preview:L..................F.... .....zW...A.8.......zW...`............................P.O. .:i.....+00.../C:\.....................1.....CW.V..PROGRA~2.........O.ICW.V....................V......_S.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1.....CW.V..AutoIt3.@......CW.VCW.V..........................'...A.u.t.o.I.t.3.....V.1.....CW.V..Aut2Exe.@......CW.VCW.V..............................A.u.t.2.E.x.e.....b.2.`...3U9. .Aut2exe.exe.H......3U9.CW.V..............................A.u.t.2.e.x.e...e.x.e.......a...............-.......`............F.......C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe..A.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.u.t.o.I.t.3.\.A.u.t.2.E.x.e.\.A.u.t.2.e.x.e...e.x.e.&.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.A.u.t.o.I.t.3.\.A.u.t.2.E.x.e.........*................@Z|...K.J.........`.......X.......desktop-aget0tr..hT..CrF.f4... .G...a......).;.hT..CrF.f4... .G...a......).;.......
                Process:C:\Users\user\Desktop\LG3adrtYi2.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):654688
                Entropy (8bit):7.191280968775951
                Encrypted:false
                SSDEEP:12288:enMwHskY7gjcjhVIEhqgM7bWvcsi6aVUfIy5U40vy3W/ceKSHMsiFyY6XN:4MysZgjS1hqgSC/izkfKjymk4HM5yJ
                MD5:E58562571DD10FEE8B3236E647F7654F
                SHA1:BBA519F10EBBBAED3DEE6DA9C9327191C5FEB6C7
                SHA-256:F6B6E8A5ECEABC8B6D2F96B1999E16034E32AB6A2FDE2254110A61A27817F956
                SHA-512:EDEF5991FFE0C5B19C091C549FC9E99E29506416A404F612E792C51853A6C50ABE3CE2C191ABE5780E8AC70246C89F37A0AD9A8BC7A3090BCAC930A9890D0064
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 79%
                • Antivirus: Virustotal, Detection: 71%, Browse
                Joe Sandbox View:
                • Filename: j3K4xUSpAP.exe, Detection: malicious, Browse
                • Filename: 7Za8LyDkT3.exe, Detection: malicious, Browse
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.u.'.u.'.u.......u.....[.u.....?.u...v.4.u...q.4.u...p...u.....".u....6.u.'.t.v.u...p.l.u....&.u.'..%.u...w.&.u.Rich'.u.........................PE..L............................v.......p............@..........................}...........................................................;..........(...8(...0...=.. t..T...................tt......@n..@...................$........................text.............................. ..`.rdata..............................@..@.data...@...........................@....wixburn8...........................@..@.tls................................@....gfids..............................@..@.rsrc....;.......<..................@..@.reloc...=...0...>..................@..B.zero........p.........................`................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):5.902965139121553
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:LG3adrtYi2.exe
                File size:20'480 bytes
                MD5:de36bc2bfc3c67820ebd75c912fadc3d
                SHA1:38bd51e1052ae5bede5293827e87d6f494b204c8
                SHA256:2a5083d6e55f5cb56764fc4ed7ad082a0ef75a908ed03132178cc80f802c3d16
                SHA512:efbc8a797e95f00c142c4c02c2f3faf4f46fabcdcd1a99d81df7581244a22f0b81f846d15de3b5f4b6d323deff555fd569db57aff3171ffebf27c03e4d53e6ef
                SSDEEP:384:5QpiPUjq7B0CiUAxIAtlYxJ4JVB00rXMSKRC:1PUu7cUyTYOvrX3
                TLSH:DE921906A95A539BE836187063B31D25A0797E72631D95CFFB8005791270EE4FA3335A
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........\...=...=...=...EX..=...E^..=...EH..=.......=...=...=...EO..=...EZ..=..Rich.=..................PE..L...;[Kf.................&.
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x402f0b
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x664B5B3B [Mon May 20 14:16:27 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:0
                File Version Major:5
                File Version Minor:0
                Subsystem Version Major:5
                Subsystem Version Minor:0
                Import Hash:fb0ee5bafbb99ce467989526f0be15c6
                Instruction
                call 00007F9EE47DAA8Dh
                jmp 00007F9EE47DA44Bh
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                mov eax, dword ptr [eax]
                cmp dword ptr [eax], E06D7363h
                jne 00007F9EE47DA73Ch
                cmp dword ptr [eax+10h], 03h
                jne 00007F9EE47DA736h
                mov eax, dword ptr [eax+14h]
                cmp eax, 19930520h
                je 00007F9EE47DA727h
                cmp eax, 19930521h
                je 00007F9EE47DA720h
                cmp eax, 19930522h
                je 00007F9EE47DA719h
                cmp eax, 01994000h
                jne 00007F9EE47DA717h
                call 00007F9EE47DAAE2h
                xor eax, eax
                pop ebp
                retn 0004h
                push 00402F15h
                call dword ptr [00404034h]
                xor eax, eax
                ret
                int3
                jmp dword ptr [00404108h]
                push 00000014h
                push 00405500h
                call 00007F9EE47DA979h
                push dword ptr [00406384h]
                mov esi, dword ptr [004040B0h]
                call esi
                pop ecx
                mov dword ptr [ebp-1Ch], eax
                cmp eax, FFFFFFFFh
                jne 00007F9EE47DA71Eh
                push dword ptr [ebp+08h]
                call dword ptr [004040B4h]
                pop ecx
                jmp 00007F9EE47DA779h
                push 00000008h
                call 00007F9EE47DAAA3h
                pop ecx
                and dword ptr [ebp-04h], 00000000h
                push dword ptr [00406384h]
                call esi
                mov dword ptr [ebp-1Ch], eax
                push dword ptr [00406380h]
                call esi
                pop ecx
                pop ecx
                mov dword ptr [ebp-20h], eax
                lea eax, dword ptr [ebp-20h]
                push eax
                lea eax, dword ptr [ebp-1Ch]
                push eax
                push dword ptr [ebp+08h]
                mov esi, dword ptr [004040CCh]
                call esi
                Programming Language:
                • [IMP] VS2008 SP1 build 30729
                • [ASM] VS2008 SP1 build 30729
                • [ C ] VS2008 SP1 build 30729
                • [IMP] VS2005 build 50727
                • [C++] VS2008 SP1 build 30729
                • [LNK] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x553c0x8c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2a8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x1f4.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x54700x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x40000x138.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x24640x2600c84b200cde39954c6014ca310200a419False0.5229235197368421data6.06274270454507IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x40000x1bf20x1c00a98880f3ac0c29ffd7f2d418a7f00788False0.4619140625OpenPGP Secret Key5.507400626408515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x60000x38c0x200202a0f14ba4a024e6a35d5895669b769False0.060546875data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x70000x2a80x400969c292b926b1e9b3c0ce2da6f58292aFalse0.3564453125data5.177428148708584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x80000x2860x400f932fe66e3eea67c82e1853a32db63b5False0.4814453125data3.8079558155782713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_MANIFEST0x70580x250ASCII text, with CRLF line terminatorsEnglishUnited States0.5084459459459459
                DLLImport
                SHLWAPI.dllPathCombineW, StrCmpNW
                MSVCR90.dll_crt_debugger_hook, _controlfp_s, _invoke_watson, _except_handler4_common, _decode_pointer, _onexit, _lock, __dllonexit, _unlock, ?terminate@@YAXXZ, __set_app_type, _encode_pointer, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _configthreadlocale, _initterm_e, _initterm, _acmdln, exit, _ismbblead, _XcptFilter, _exit, _cexit, __getmainargs, _amsg_exit, wcsstr, memcpy, memset
                KERNEL32.dllIsDebuggerPresent, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, ExitThread, FindFirstFileW, lstrcmpW, FindNextFileW, GetLogicalDrives, GetDriveTypeW, QueryDosDeviceW, lstrcpyW, GetFileSize, CreateFileMappingA, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, SetFilePointer, SetEndOfFile, CreateFileW, CloseHandle, CreateThread, ExitProcess, GetLastError, CreateMutexA, Sleep
                USER32.dllCharLowerW
                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegQueryValueExW
                ole32.dllCoInitializeEx
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                May 28, 2024 07:13:14.417252064 CEST53590551.1.1.1192.168.2.4

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:0
                Start time:01:12:52
                Start date:28/05/2024
                Path:C:\Users\user\Desktop\LG3adrtYi2.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\LG3adrtYi2.exe"
                Imagebase:0xf00000
                File size:20'480 bytes
                MD5 hash:DE36BC2BFC3C67820EBD75C912FADC3D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:19.5%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:16.7%
                  Total number of Nodes:132
                  Total number of Limit Nodes:5
                  execution_graph 622 f01070 627 f01079 622->627 625 f017e7 626 f0108d 631 f01d30 GetPEB 626->631 627->626 628 f01d40 627->628 632 f01d30 GetPEB 628->632 630 f01d52 630->627 631->625 632->630 633 f03235 _except_handler4_common 634 f02f15 635 f02f51 634->635 637 f02f27 634->637 636 f02f4c ?terminate@ 636->635 637->635 637->636 646 f02dc5 _XcptFilter 647 f02c05 652 f03011 647->652 650 f02c42 _amsg_exit 651 f02c4a 650->651 655 f02f6c 652->655 654 f02c0a __getmainargs 654->650 654->651 662 f031dc 655->662 657 f02f78 _decode_pointer 658 f02f9b 7 API calls 657->658 659 f02f8f _onexit 657->659 663 f03008 _unlock 658->663 660 f02fff __onexit 659->660 660->654 662->657 663->660 638 f03358 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 639 f03442 _crt_debugger_hook 638->639 640 f0344a GetCurrentProcess TerminateProcess 638->640 639->640 641 f02dd9 642 f02df4 641->642 643 f02ded _exit 641->643 644 f02dfd _cexit 642->644 645 f02e03 __onexit 642->645 643->642 644->645 664 f02e2a 665 f02e38 __set_app_type _encode_pointer __p__fmode __p__commode 664->665 667 f02ed7 _pre_c_init __RTC_Initialize 665->667 668 f02ef1 667->668 669 f02ee5 __setusermatherr 667->669 674 f0325a _controlfp_s 668->674 669->668 672 f02f08 673 f02eff _configthreadlocale 673->672 675 f02ef6 674->675 676 f03276 _invoke_watson 674->676 675->672 675->673 676->675 522 f02c4b 543 f031dc 522->543 524 f02c57 GetStartupInfoA 525 f02c85 InterlockedCompareExchange 524->525 526 f02c93 525->526 527 f02c97 525->527 526->527 528 f02c9e Sleep 526->528 529 f02cc1 527->529 530 f02cb7 _amsg_exit 527->530 528->525 531 f02cea 529->531 532 f02cca _initterm_e 529->532 530->531 534 f02d14 531->534 535 f02cf9 _initterm 531->535 532->531 533 f02ce5 __onexit 532->533 536 f02d20 __IsNonwritableInCurrentImage 534->536 537 f02d18 InterlockedExchange 534->537 535->534 538 f02daf _ismbblead 536->538 539 f02df4 536->539 542 f02d99 exit 536->542 544 f01000 Sleep CreateMutexA GetLastError 536->544 537->536 538->536 539->533 540 f02dfd _cexit 539->540 540->533 542->536 543->524 545 f01036 CoInitializeEx CreateThread 544->545 546 f0102e ExitProcess 544->546 547 f01055 Sleep 545->547 548 f02b80 545->548 547->547 554 f02830 GetLogicalDrives 548->554 550 f02bdf ExitThread 552 f02b8b 552->550 560 f02750 552->560 566 f028f0 memset memset PathCombineW FindFirstFileW 552->566 559 f0285d 554->559 555 f028d6 555->552 556 f0286c RegOpenKeyExW 557 f0288e RegQueryValueExW 556->557 556->559 558 f028ca RegCloseKey 557->558 557->559 558->559 559->555 559->556 559->558 561 f027a9 560->561 562 f0276c 560->562 561->552 583 f027b0 GetDriveTypeW 562->583 565 f0279b lstrcpyW 565->561 567 f02b45 FindCloseChangeNotification 566->567 575 f029c1 566->575 567->552 568 f02a24 CharLowerW 568->575 569 f029cc lstrcmpW 570 f029e2 lstrcmpW 569->570 569->575 571 f029f8 PathCombineW 570->571 570->575 573 f028f0 18 API calls 571->573 572 f02b29 FindNextFileW 572->567 572->575 573->575 574 f02b60 wcsstr 574->575 575->568 575->569 575->572 575->574 576 f02aaa PathCombineW 575->576 578 f02ada Sleep 575->578 580 f02afa Sleep 575->580 591 f02450 CreateFileW 575->591 588 f02b60 wcsstr 576->588 589 f02b60 wcsstr 578->589 590 f02b60 wcsstr 580->590 584 f0278f 583->584 585 f027d8 583->585 584->561 584->565 585->584 586 f027ec QueryDosDeviceW 585->586 586->584 587 f02806 StrCmpNW 586->587 587->584 588->575 589->575 590->575 592 f02482 GetFileSize 591->592 593 f0247b 591->593 592->593 594 f0249e CreateFileMappingA 592->594 593->575 596 f024f8 CloseHandle 594->596 597 f02509 MapViewOfFile 594->597 596->593 598 f02527 CloseHandle CloseHandle 597->598 600 f02542 597->600 598->593 601 f025a9 600->601 603 f025c6 600->603 607 f02555 6 API calls 600->607 608 f02090 601->608 603->607 614 f021f0 603->614 606 f02681 memcpy 606->607 607->593 609 f020be 608->609 613 f02183 608->613 609->613 618 f01e30 609->618 612 f0215c memcpy 612->613 613->607 615 f0220a 614->615 616 f02211 614->616 615->606 615->607 616->615 617 f023c7 memcpy 616->617 617->615 619 f01e4a 618->619 620 f01e51 618->620 619->612 619->613 620->619 621 f02007 memcpy 620->621 621->619 677 f02f0b 680 f03288 677->680 679 f02f10 679->679 681 f032ba GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 680->681 682 f032ad 680->682 683 f032b1 681->683 682->681 682->683 683->679

                  Callgraph

                  Control-flow Graph

                  APIs
                  • memset.MSVCR90 ref: 00F02966
                  • memset.MSVCR90 ref: 00F0297C
                  • PathCombineW.SHLWAPI(?,$recycle.bin,00F05428), ref: 00F02994
                  • FindFirstFileW.KERNELBASE(?,?), ref: 00F029A8
                  • lstrcmpW.KERNEL32(?,00F0542C), ref: 00F029D8
                  • lstrcmpW.KERNEL32(?,00F05430), ref: 00F029EE
                  • PathCombineW.SHLWAPI(?,$recycle.bin,?), ref: 00F02A0A
                  • CharLowerW.USER32(?), ref: 00F02A37
                  • PathCombineW.SHLWAPI(?,$recycle.bin,?), ref: 00F02ABC
                  • Sleep.KERNELBASE(00000064), ref: 00F02ADC
                  • Sleep.KERNELBASE(00000064), ref: 00F02AFC
                  • FindNextFileW.KERNELBASE(000000FF,?), ref: 00F02B37
                  • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 00F02B4C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: CombineFindPath$FileSleeplstrcmpmemset$ChangeCharCloseFirstLowerNextNotification
                  • String ID: $recycle.bin$.exe$VolDrv$appdata$application data$boot$config.msi$default$intel$msocache$perflogs$program files$programdata$sys$system$win$windows
                  • API String ID: 1364993765-4156905926
                  • Opcode ID: ab0945d820e632936bae60a90bc98b989e357da764d84cae0a77d7b0450e52f7
                  • Instruction ID: 09904657998d4cab0cce26422eef57c213196dc2c81a2495d6afe80777e8ac66
                  • Opcode Fuzzy Hash: ab0945d820e632936bae60a90bc98b989e357da764d84cae0a77d7b0450e52f7
                  • Instruction Fuzzy Hash: 445160F5D003189BCB60DFA0DC8DBDE7778BB45705F004498E60DA6181E7B59A88BF65

                  Control-flow Graph

                  APIs
                  • CreateFileW.KERNELBASE(00F02B26,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00F0246C
                  • GetFileSize.KERNEL32(000000FF,00000000), ref: 00F02488
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: File$CreateSize
                  • String ID: .zero
                  • API String ID: 2791376181-843663606
                  • Opcode ID: 7130104fb7967785443edcd9f9e0ffec27e69c9240ed552d82138baaca4da3a3
                  • Instruction ID: 6414156acb8ae0c49e5297e9a46b76dea2022fa65636eca591bb1b6bcbdc7e9f
                  • Opcode Fuzzy Hash: 7130104fb7967785443edcd9f9e0ffec27e69c9240ed552d82138baaca4da3a3
                  • Instruction Fuzzy Hash: E1A11D75E00209EFCB44CFA4D999BEEB7B5BF48300F208159EA01BB391D735A941EB64

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 73 f02830-f0285b GetLogicalDrives 74 f02866-f0286a 73->74 75 f028d6-f028e1 74->75 76 f0286c-f0288c RegOpenKeyExW 74->76 77 f028d4 76->77 78 f0288e-f028b9 RegQueryValueExW 76->78 77->74 79 f028ca-f028ce RegCloseKey 78->79 80 f028bb-f028bf 78->80 79->77 80->79 82 f028c1-f028c7 80->82 82->79
                  APIs
                  • GetLogicalDrives.KERNELBASE ref: 00F02836
                  • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00F02884
                  • RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00F028B1
                  • RegCloseKey.KERNELBASE(?), ref: 00F028CE
                  Strings
                  • NoDrives, xrefs: 00F028A8
                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 00F02877
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: CloseDrivesLogicalOpenQueryValue
                  • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
                  • API String ID: 2666887985-3471754645
                  • Opcode ID: 318c24fd8e32464ea7323035022dcca64f08bdac4a482083a38e638454f44a86
                  • Instruction ID: 90540e194b835126c4ad8a8aac4150746f9680fc58ea00d7fa3adbacf8ba64a8
                  • Opcode Fuzzy Hash: 318c24fd8e32464ea7323035022dcca64f08bdac4a482083a38e638454f44a86
                  • Instruction Fuzzy Hash: 5111C9B5E4020E9BDF14CFD4D949BEEB7B4FB04704F108109E611B6280D7B86A49EFA1

                  Control-flow Graph

                  APIs
                  • Sleep.KERNELBASE(000007D0), ref: 00F01009
                  • CreateMutexA.KERNELBASE(00000000,00000000,00F04158), ref: 00F01018
                  • GetLastError.KERNEL32 ref: 00F01021
                  • ExitProcess.KERNEL32 ref: 00F01030
                  • CoInitializeEx.OLE32(00000000,00000000), ref: 00F0103A
                  • CreateThread.KERNELBASE(00000000,00000000,Function_00002B80,00000000,00000000,00000000), ref: 00F0104F
                  • Sleep.KERNELBASE(0036EE80), ref: 00F0105A
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: CreateSleep$ErrorExitInitializeLastMutexProcessThread
                  • String ID:
                  • API String ID: 3564892718-0
                  • Opcode ID: 711f2751efda8e34718a0bb5ae18ac0295e43dd6cc10b5e136793c760f42f3f4
                  • Instruction ID: 337186cab3787d0b8c380a3398c2a866a65eb7fd336d0196c1de22360dd2204c
                  • Opcode Fuzzy Hash: 711f2751efda8e34718a0bb5ae18ac0295e43dd6cc10b5e136793c760f42f3f4
                  • Instruction Fuzzy Hash: BFF059B17D8308BBF6602BE0AD0FF593A64BB14F52F214404F74EF91D096E17844BA66

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 87 f027b0-f027d6 GetDriveTypeW 88 f02825-f0282b 87->88 89 f027d8-f027df 87->89 90 f027e1-f027e8 89->90 91 f027ec-f02804 QueryDosDeviceW 89->91 90->91 92 f027ea 90->92 91->88 93 f02806-f0281c StrCmpNW 91->93 92->88 93->88 94 f0281e 93->94 94->88
                  APIs
                  • GetDriveTypeW.KERNELBASE(00F0278F), ref: 00F027BD
                  • QueryDosDeviceW.KERNELBASE(00F0278F,?,00000208), ref: 00F027FC
                  • StrCmpNW.KERNELBASE(?,\??\,00000004), ref: 00F02814
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: DeviceDriveQueryType
                  • String ID: \??\
                  • API String ID: 1681518211-3047946824
                  • Opcode ID: 1eab72680176079021e839b1939af1716f453e71759fbb15dda0509d4c37df59
                  • Instruction ID: 2b3afea1659f4bb0d0b228b2fc487a6c8317bb1523d4d3e314479ec551723f50
                  • Opcode Fuzzy Hash: 1eab72680176079021e839b1939af1716f453e71759fbb15dda0509d4c37df59
                  • Instruction Fuzzy Hash: AC014FB4D4020CDBCF64CF91CC4CAD977B8AB08714F00C0AAAA04A7280D7349AC8EFA4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 95 f02b80-f02b95 call f02830 98 f02ba0-f02ba4 95->98 99 f02ba6-f02bc7 call f02750 98->99 100 f02bdf-f02be1 ExitThread 98->100 103 f02bc9-f02bcd 99->103 104 f02bdd 99->104 105 f02bd1-f02bd5 call f028f0 103->105 106 f02bcf 103->106 104->98 109 f02bda 105->109 106->104 109->104
                  APIs
                    • Part of subcall function 00F02830: GetLogicalDrives.KERNELBASE ref: 00F02836
                    • Part of subcall function 00F02830: RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 00F02884
                    • Part of subcall function 00F02830: RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 00F028B1
                    • Part of subcall function 00F02830: RegCloseKey.KERNELBASE(?), ref: 00F028CE
                  • ExitThread.KERNEL32 ref: 00F02BE1
                    • Part of subcall function 00F02750: lstrcpyW.KERNEL32(?,?), ref: 00F027A3
                    • Part of subcall function 00F028F0: memset.MSVCR90 ref: 00F02966
                    • Part of subcall function 00F028F0: memset.MSVCR90 ref: 00F0297C
                    • Part of subcall function 00F028F0: PathCombineW.SHLWAPI(?,$recycle.bin,00F05428), ref: 00F02994
                    • Part of subcall function 00F028F0: FindFirstFileW.KERNELBASE(?,?), ref: 00F029A8
                    • Part of subcall function 00F028F0: lstrcmpW.KERNEL32(?,00F0542C), ref: 00F029D8
                    • Part of subcall function 00F028F0: lstrcmpW.KERNEL32(?,00F05430), ref: 00F029EE
                    • Part of subcall function 00F028F0: PathCombineW.SHLWAPI(?,$recycle.bin,?), ref: 00F02A0A
                    • Part of subcall function 00F028F0: FindNextFileW.KERNELBASE(000000FF,?), ref: 00F02B37
                    • Part of subcall function 00F028F0: FindCloseChangeNotification.KERNELBASE(000000FF), ref: 00F02B4C
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: Find$CloseCombineFilePathlstrcmpmemset$ChangeDrivesExitFirstLogicalNextNotificationOpenQueryThreadValuelstrcpy
                  • String ID:
                  • API String ID: 1875947465-0
                  • Opcode ID: e79ec75c39c374d86c037b17417a732be4d7f99033690ca3908142fa1cd02dc8
                  • Instruction ID: 69ec05ff89933236fa20f3e3248fbb43ab362ca66f384da96a0207c96fe80963
                  • Opcode Fuzzy Hash: e79ec75c39c374d86c037b17417a732be4d7f99033690ca3908142fa1cd02dc8
                  • Instruction Fuzzy Hash: F3011DF5D04208EBCB44DFD4C94AADEB7B4AB88304F1480AAD50573281E6359A84FB65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 110 f02750-f0276a 111 f027a9-f027af 110->111 112 f0276c-f0278a call f027b0 110->112 114 f0278f-f02799 112->114 114->111 115 f0279b-f027a3 lstrcpyW 114->115 115->111
                  APIs
                    • Part of subcall function 00F027B0: GetDriveTypeW.KERNELBASE(00F0278F), ref: 00F027BD
                  • lstrcpyW.KERNEL32(?,?), ref: 00F027A3
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID: DriveTypelstrcpy
                  • String ID:
                  • API String ID: 3664088370-0
                  • Opcode ID: 056c50cf3e4e2c10da75ad62456f04dca6940e5f4fb4392b812c9c8a0e7fe87e
                  • Instruction ID: c013acb83c3324fcb4cdbfa43a30fc0868afe70c838c50f5aa7b2576b81c8d77
                  • Opcode Fuzzy Hash: 056c50cf3e4e2c10da75ad62456f04dca6940e5f4fb4392b812c9c8a0e7fe87e
                  • Instruction Fuzzy Hash: E6F09075D0020CFBCB00DFA4D8457DDB7B4EF44310F00C0A8E9159B240E235AB18EB55
                  Memory Dump Source
                  • Source File: 00000000.00000002.4087205311.0000000000F01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
                  • Associated: 00000000.00000002.4087188543.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087220602.0000000000F04000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4087236229.0000000000F07000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f00000_LG3adrtYi2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                  • Instruction ID: be7eecee3400b42b3e558a840de4aeb97e4223185f45bdd8b65d759b642826a8
                  • Opcode Fuzzy Hash: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                  • Instruction Fuzzy Hash: 85A002321A5B8CC7C612A68DA651B51B3ECE348D54F440461A50D43E015659B9108495