Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Apache ActiveMQ.exe

Overview

General Information

Sample name:Apache ActiveMQ.exe
Analysis ID:1448271
MD5:b8932033b53ca08967100c58e12126be
SHA1:6f30131181d81129c2f59d050214f47a6eedabbe
SHA256:07fe71b256c1c913b0f3e3fa67e53d21a3d1f499beb4e550597f5743797a77c4
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Detected potential crypto function
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • Apache ActiveMQ.exe (PID: 880 cmdline: "C:\Users\user\Desktop\Apache ActiveMQ.exe" MD5: B8932033B53CA08967100C58E12126BE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Apache ActiveMQ.exeAvira: detected
Source: mvs05.zyns.comVirustotal: Detection: 5%Perma Link
Source: Apache ActiveMQ.exeReversingLabs: Detection: 47%
Source: Apache ActiveMQ.exeVirustotal: Detection: 53%Perma Link
Source: Apache ActiveMQ.exeJoe Sandbox ML: detected
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: mvs05.zyns.com
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeCode function: 0_2_004010000_2_00401000
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeCode function: 0_2_00402D300_2_00402D30
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeCode function: 0_2_00402EB00_2_00402EB0
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeCode function: 0_2_004025600_2_00402560
Source: classification engineClassification label: mal68.winEXE@1/0@1/0
Source: Apache ActiveMQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Apache ActiveMQ.exeReversingLabs: Detection: 47%
Source: Apache ActiveMQ.exeVirustotal: Detection: 53%
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeSection loaded: rasadhlp.dllJump to behavior
Source: Apache ActiveMQ.exeStatic PE information: section name: .xdata
Source: Apache ActiveMQ.exe, 00000000.00000002.1339157211.0000000000813000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeAPI call chain: ExitProcess graph end nodegraph_0-263
Source: C:\Users\user\Desktop\Apache ActiveMQ.exeAPI call chain: ExitProcess graph end nodegraph_0-257
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Apache ActiveMQ.exe47%ReversingLabsWin64.Trojan.Generic
Apache ActiveMQ.exe53%VirustotalBrowse
Apache ActiveMQ.exe100%AviraTR/Agent_AGen.evstv
Apache ActiveMQ.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
mvs05.zyns.com5%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
mvs05.zyns.com
81.19.82.2
truefalseunknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1448271
Start date and time:2024-05-28 07:47:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Apache ActiveMQ.exe
Detection:MAL
Classification:mal68.winEXE@1/0@1/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 3
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, act0.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):6.048633899053562
TrID:
  • Win64 Executable (generic) (12005/4) 74.80%
  • Generic Win/DOS Executable (2004/3) 12.49%
  • DOS Executable Generic (2002/1) 12.47%
  • VXD Driver (31/22) 0.19%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:Apache ActiveMQ.exe
File size:19'968 bytes
MD5:b8932033b53ca08967100c58e12126be
SHA1:6f30131181d81129c2f59d050214f47a6eedabbe
SHA256:07fe71b256c1c913b0f3e3fa67e53d21a3d1f499beb4e550597f5743797a77c4
SHA512:59239e599e03c21b28953d947752abada5ea1ab4e95c84c054589acac86f743342a278fc93567db7bb7e6dc77d0a1101387acea99a577ab58785b2b046b37aea
SSDEEP:384:N8sZgktIJ7xP6Ouz12RUxVcn7JBpJDuixXe1dQUC:N8xJ7xPZuBVGlJDuixO1dxC
TLSH:C5922943EBA1E41DE06BC03B8323A637E1727C0C5735B22B1F54CA353DE6E55AB51A1A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....2Ie........../...."."...(................@.....................................8......... ............................
Icon Hash:8e3369d4a2c07117
Entrypoint:0x401000
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:
Time Stamp:0x6549321B [Mon Nov 6 18:36:11 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:c780720f489db1bb1bd4cd626443ef53
Instruction
inc ecx
push edi
inc ecx
push esi
inc ecx
push ebp
inc ecx
push esp
push ebp
push edi
push esi
push ebx
dec eax
sub esp, 00000788h
dec esp
lea ebp, dword ptr [esp+000001E0h]
dec eax
lea edx, dword ptr [esp+000002A8h]
dec esp
mov eax, ebp
nop word ptr [eax+eax+00000000h]
dec eax
mov dword ptr [eax], 00000000h
dec eax
add eax, 08h
dec eax
cmp edx, eax
jne 00007F36B0B905F2h
dec esp
lea esp, dword ptr [esp+000003C0h]
xor ecx, ecx
dec eax
mov eax, 00000000h
mov byte ptr [eax], al
add byte ptr [eax], al
mov dword ptr [esp+000002B0h], 00000020h
dec esp
mov edx, esp
dec eax
mov dword ptr [esp+000002A8h], eax
inc ecx
mov eax, 00000104h
call dword ptr [00007082h]
xor edx, edx
cmp byte ptr [esp+000003C0h], 00000000h
je 00007F36B0B90613h
nop word ptr [eax+eax+00h]
dec eax
add edx, 01h
inc ecx
cmp byte ptr [esp+edx], 00000000h
jne 00007F36B0B905F7h
dec esp
mov ecx, esp
call dword ptr [0000708Ch]
movzx edx, byte ptr [esp+000003C0h]
test dl, dl
je 00007F36B0B90BB1h
xor ebx, ebx
dec esp
mov eax, esp
nop dword ptr [eax+00000000h]
cmp dl, 0000005Ch
dec eax
cmove ebx, eax
movzx edx, byte ptr [eax+01h]
dec eax
add eax, 01h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x80000x298.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x1968.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x3c.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x80d80x88.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x20e00x22006fdfdfe986fcc3484896fbb9c4a2278cFalse0.525390625data5.627891674667346IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x40000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x50000x3400x400812470c03c232e082e9692efa0016cbeFalse0.8515625data6.9419982714073285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.pdata0x60000x3c0x20091a03565842bdcf60a60e3de7949ab73False0.111328125data0.4965832874032078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.xdata0x70000x600x20027ebe7a1ace7c7e31492fdaa324c5328False0.177734375data1.408330790784607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.idata0x80000x2980x400425e9073e35c1619af76c7312da5f8f6False0.302734375data2.5660147618705977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x90000x19680x1a000273326b42fbb0b3f4a64824f05ac0c1False0.8725961538461539data7.332118530154859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x90e80x14fdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9884608226316769
RT_GROUP_ICON0xa5e80x14dataEnglishUnited States1.05
RT_VERSION0xa6000x364dataEnglishUnited States0.4182027649769585
DLLImport
KERNEL32.dllCloseHandle, CreateFileA, ExitProcess, GetFileSize, GetModuleFileNameA, ReadFile, SetCurrentDirectoryA, VirtualAlloc, VirtualProtect
USER32.dllCharUpperBuffA
WS2_32.dllWSAStartup, getaddrinfo, select, socket
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
May 28, 2024 07:48:20.518582106 CEST5489053192.168.2.71.1.1.1
May 28, 2024 07:48:20.612936974 CEST53548901.1.1.1192.168.2.7
May 28, 2024 07:48:20.717875004 CEST53513421.1.1.1192.168.2.7
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
May 28, 2024 07:48:20.518582106 CEST192.168.2.71.1.1.10x67afStandard query (0)mvs05.zyns.comA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
May 28, 2024 07:48:20.612936974 CEST1.1.1.1192.168.2.70x67afNo error (0)mvs05.zyns.com81.19.82.2A (IP address)IN (0x0001)false

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:48:09
Start date:28/05/2024
Path:C:\Users\user\Desktop\Apache ActiveMQ.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\Apache ActiveMQ.exe"
Imagebase:0x400000
File size:19'968 bytes
MD5 hash:B8932033B53CA08967100C58E12126BE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:56.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:92.9%
    Total number of Nodes:28
    Total number of Limit Nodes:3
    execution_graph 244 401000 245 401030 244->245 245->245 246 401040 GetModuleFileNameA 245->246 247 401082 246->247 248 401093 CharUpperBuffA 246->248 247->248 252 4010ac 248->252 259 4010e9 248->259 249 401660 WSAStartup 250 401687 socket 249->250 251 401ec8 ExitProcess 249->251 271 403070 select 250->271 267 4016c0 251->267 253 4024bd 252->253 255 4014bd SetCurrentDirectoryA 252->255 252->259 257 4024c5 ExitProcess 253->257 255->259 256 4017a0 getaddrinfo 256->267 258 403070 select 258->267 259->249 259->259 260 401de1 CreateFileA 261 401e1d GetFileSize 260->261 260->267 261->257 262 401e36 VirtualAlloc 261->262 263 402551 ExitProcess 262->263 262->267 264 4024da CloseHandle 272 402560 264->272 265 401e92 ReadFile 265->267 267->251 267->256 267->258 267->260 267->264 267->265 268 402500 VirtualProtect 274 403070 select 268->274 270 402532 270->251 271->267 273 4025ad 272->273 273->268 273->273 274->270

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00401000 1 Function_00403070 0->1 4 Function_00402560 0->4 2 Function_00402D30 3 Function_00402EB0 4->2 4->3 5 Function_00408118
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1339057869.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1339042685.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339107251.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339123146.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Apache ActiveMQ.jbxd
    Similarity
    • API ID: BuffCharFileModuleNameUpper
    • String ID: $http
    • API String ID: 2024523369-873725951
    • Opcode ID: a7bfa58b3e785364bba8d7a58ed389af0945984ccfc8b6752abdc9d2fa8139fe
    • Instruction ID: 18ebdfe36f7ce563a48adc982f35782c96f61a176dc7b6e38e572a19ab18772c
    • Opcode Fuzzy Hash: a7bfa58b3e785364bba8d7a58ed389af0945984ccfc8b6752abdc9d2fa8139fe
    • Instruction Fuzzy Hash: C5A28872609BC486EB708B15E85439EB3A5F788B84F50813ACACD5BB98DF7DC195CB04

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 147 403070-4030bc select
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1339057869.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1339042685.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339107251.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339123146.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Apache ActiveMQ.jbxd
    Similarity
    • API ID: select
    • String ID:
    • API String ID: 1274211008-0
    • Opcode ID: 2afe70f6e1d7badbc86555bbc02daba7c804dfb2e1d674eaba49766e7d203123
    • Instruction ID: 9138568d85152fab7a684a46f553e8024497aec5c1016684214272fd1432ab3b
    • Opcode Fuzzy Hash: 2afe70f6e1d7badbc86555bbc02daba7c804dfb2e1d674eaba49766e7d203123
    • Instruction Fuzzy Hash: 61E04672518A8186E760CF54F44930AB7B0F3C6308FA05129F78E12B28CF7EC14A8F08

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 148 402560-4025aa 149 4025ad-402613 148->149 150 402615-40261b 149->150 151 40261f-40263f 149->151 150->151 151->149 152 402645-40264f 151->152 153 402650-402661 152->153 153->153 154 402663-402703 call 402d30 call 402eb0 153->154 159 402706-40270d 154->159 160 402710-402714 159->160 160->160 161 402716-40271e 160->161 162 402720-402724 161->162 162->162 163 402726-40274a call 402d30 call 402eb0 162->163 163->159 168 40274c-402775 163->168 169 402778-40277c 168->169 169->169 170 40277e-402788 169->170 171 402790-4027a1 170->171 171->171 172 4027a3-4027bd 171->172 173 4027c0-4027c2 172->173 174 4027c8-4027dd 173->174 174->174 175 4027df-4027e3 174->175 176 4027e9-4029ac 175->176 177 402d0f-402d11 175->177 179 4029b4-4029c2 176->179 178 402d18-402d29 177->178 178->178 180 402d2b 178->180 181 4029b0 179->181 182 4029c4-4029d2 179->182 180->180 181->179 182->173 183 4029d8-4029e2 182->183 184 4029e8-4029fa 183->184 184->184 185 4029fc-402a19 184->185 186 402a20-402a32 185->186 186->186 187 402a34-402a3c 186->187 188 402a42-402ab9 187->188 189 402cc4-402cd7 187->189 190 402ac0-402ad3 188->190 191 402ad8-402ae8 190->191 191->191 192 402aea-402af1 191->192 193 402af8-402b08 192->193 193->193 194 402b0a-402b2f 193->194 195 402b30-402b44 194->195 195->195 196 402b46-402b53 195->196 197 402b58-402b6c 196->197 197->197 198 402b6e-402b84 197->198 199 402b88-402b8c 198->199 199->199 200 402b8e-402b91 199->200 201 402c12-402c1a 200->201 202 402b93-402bc5 200->202 203 402c1d-402c21 201->203 204 402bca-402bee call 402d30 call 402eb0 202->204 203->203 205 402c23-402c29 203->205 214 402ce0-402ce6 204->214 215 402bf4-402c0f 204->215 207 402c30-402c34 205->207 207->207 209 402c36-402c38 207->209 211 402c40-402c51 209->211 211->211 213 402c53-402c5d 211->213 216 402c60-402c70 213->216 217 402cf0-402cf4 214->217 215->201 216->216 219 402c72-402c7c 216->219 217->217 218 402cf6-402cfc 217->218 220 402d00-402d04 218->220 221 402c80-402c92 219->221 220->220 222 402d06-402d0a 220->222 221->221 223 402c94-402ca1 221->223 222->204 224 402ca8-402cac 223->224 224->224 225 402cae-402cbe 224->225 225->189 225->190
    Memory Dump Source
    • Source File: 00000000.00000002.1339057869.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1339042685.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339107251.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339123146.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Apache ActiveMQ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7ae05771651aeae6022775d0ca7bc3a69ec6c130ffb2df9e20e994601bf35d75
    • Instruction ID: 12a2575ac4c9f032ae46a52689510018f589ddd02d6464ded454ffe762891883
    • Opcode Fuzzy Hash: 7ae05771651aeae6022775d0ca7bc3a69ec6c130ffb2df9e20e994601bf35d75
    • Instruction Fuzzy Hash: 6E12F07660DAD086D7318B26E90479FBF61F39AB84F889126DEC913F99C67DC045DB00

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 226 402eb0-402ec5 227 402ec8-402edd 226->227 227->227 228 402edf-40301c 227->228 229 403020-403031 228->229 229->229 230 403033-403038 229->230 231 403045-403055 230->231 232 403040 231->232 233 403057-403065 231->233 232->231
    Memory Dump Source
    • Source File: 00000000.00000002.1339057869.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1339042685.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339107251.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339123146.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Apache ActiveMQ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 63961e1d2750e3025f81e63c1909700d5b92105a6f963775dd7ff8d1afdc0986
    • Instruction ID: 84fe1e85e7c2dbd22adcee172c83c9e3c8fbf2a5d202f0aa8e3e50dd74e2b0dd
    • Opcode Fuzzy Hash: 63961e1d2750e3025f81e63c1909700d5b92105a6f963775dd7ff8d1afdc0986
    • Instruction Fuzzy Hash: EB4159137287E455E7238E712610F2BBE64B79A744FCBB090EF8292B92D539CC25D750

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 234 402d30-402d43 235 402d48-402d5d 234->235 235->235 236 402d5f-402e5a 235->236 237 402e60-402e71 236->237 237->237 238 402e73-402e78 237->238 239 402e85-402e95 238->239 240 402e80 239->240 241 402e97-402ea3 239->241 240->239
    Memory Dump Source
    • Source File: 00000000.00000002.1339057869.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1339042685.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339074632.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339107251.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1339123146.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_Apache ActiveMQ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3e8f7d1126beb807212561592e77820d145722df680154be7b635ec7c79ed166
    • Instruction ID: 91e572cd85205bd8f57dab5cdc62d0a725b9b0734bc8f945078b887ebf4f5093
    • Opcode Fuzzy Hash: 3e8f7d1126beb807212561592e77820d145722df680154be7b635ec7c79ed166
    • Instruction Fuzzy Hash: 97319A1372C7E45AE3234E312920E5BBE90F796744FCBA091EFC682B92D529CC25D750