Windows
Analysis Report
lsass.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
lsass.exe (PID: 3040 cmdline:
"C:\Users\ user\Deskt op\lsass.e xe" MD5: 60E18F7B8D1F43731D0E9169C2D16547)
- cleanup
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: vburov: |
Timestamp: | 06/04/24-16:54:47.252299 |
SID: | 2052879 |
Source Port: | 58260 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 06/04/24-16:54:47.252564 |
SID: | 2052879 |
Source Port: | 63427 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
- • Compliance
- • Networking
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Remote Access Functionality
Click to jump to signature section
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | Code function: | 0_2_00007FF670FF21C0 | |
Source: | Code function: | 0_2_00007FF670FF3550 | |
Source: | Code function: | 0_2_00007FF670FF2650 | |
Source: | Code function: | 0_2_00007FF670FF1170 | |
Source: | Code function: | 0_2_00007FF670FF1390 | |
Source: | Code function: | 0_2_00007FF670FF14B0 | |
Source: | Code function: | 0_2_00007FF670FF5DC0 | |
Source: | Code function: | 0_2_00007FF670FF20D0 | |
Source: | Code function: | 0_2_00007FF670FF32E0 | |
Source: | Code function: | 0_2_00007FF670FF4500 | |
Source: | Code function: | 0_2_00007FF670FF2510 | |
Source: | Code function: | 0_2_00007FF670FF1010 | |
Source: | Code function: | 0_2_00007FF670FF1E10 |
Source: | Code function: | 0_2_00007FF670FF1390 |
Source: | Code function: | 0_2_00007FF670FF15C0 | |
Source: | Code function: | 0_2_00007FF670FF3B00 | |
Source: | Code function: | 0_2_00007FF670FF3F20 |
Source: | Code function: |
Source: | Binary string: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | API coverage: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF670FF43F0 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF670FF21C0 | |
Source: | Code function: | 0_2_00007FF670FF4A28 |
Source: | Code function: | 0_2_00007FF670FF3B00 |
Source: | Code function: | 0_2_00007FF670FF494C |
Source: | Code function: | 0_2_00007FF670FF24A0 | |
Source: | Code function: | 0_2_00007FF670FF4500 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Obfuscated Files or Information | LSASS Memory | 3 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fp2e7a.wpc.phicdn.net | 192.229.221.95 | true | false | unknown |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1451836 |
Start date and time: | 2024-06-04 16:54:38 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | lsass.exe |
Detection: | MAL |
Classification: | mal52.winEXE@1/0@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, SI HClient.exe - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, slscr.update.microsoft.co m, ocsp.edge.digicert.com - VT rate limit hit for: lsass.
exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fp2e7a.wpc.phicdn.net | Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 5.9183212098884335 |
TrID: |
|
File name: | lsass.exe |
File size: | 60'640 bytes |
MD5: | 60e18f7b8d1f43731d0e9169c2d16547 |
SHA1: | 83ebb66f070956225959ee773b468f89ed55479c |
SHA256: | efa9e8325232bbd3f9a118d396de04370e56c3c7b6d552fab46b5b39f3ad522d |
SHA512: | 45509ec64f1ee5faad4e759d482b7d8dd6c2dacf9bd71257403ab7d7a060ac9e2e9c99dd670592312fde3807b4bb08c6b65b0ac2dbe8c8c457920d2eeab87d89 |
SSDEEP: | 1536:W+IDW1k2ACCJk3TbA3eeLRE7zouliEUPa3z:hIC1k2An3tLi09y3 |
TLSH: | 8E434A4EA79670C6D4A24670C5A74262BF36F36627024BFF12D4C0385E663CAAF35F94 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iW:..9i..9i..9i.c8h..9i.c:h..9i.p.i..9i..8i..9i.c4h..9i.c9h..9i.c=h..9i.c.i..9i.c;h..9iRich..9i................PE..d...?..J... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x1400048e0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4AAAFE3F [Sat Sep 12 01:49:51 2009 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 10 |
OS Version Minor: | 0 |
File Version Major: | 10 |
File Version Minor: | 0 |
Subsystem Version Major: | 10 |
Subsystem Version Minor: | 0 |
Import Hash: | 3924d1606f44d90586a3ec75785c2730 |
Signature Valid: | true |
Signature Issuer: | CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 366DA07E17C53A2BCBBF949B9318E8A9 |
Thumbprint SHA-1: | 09A1AA05288E952C901821DEAECE78D148D2E4D2 |
Thumbprint SHA-256: | 5FC581A4B101E94BFA06E6548DAA244B91B0A62B90D559820FD49BACB625B90B |
Serial: | 330000047069F2AC064904EC1C000000000470 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F2CA4B6D9C8h |
dec eax |
add esp, 28h |
jmp 00007F2CA4B6D8C3h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
nop word ptr [eax+eax+00000000h] |
dec eax |
cmp ecx, dword ptr [00008769h] |
jne 00007F2CA4B6D972h |
dec eax |
rol ecx, 10h |
test cx, FFFFh |
jne 00007F2CA4B6D963h |
ret |
dec eax |
ror ecx, 10h |
jmp 00007F2CA4B6DAA7h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
jmp dword ptr [00003BF6h] |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
jmp dword ptr [00003BFAh] |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
dec eax |
mov dword ptr [esp+20h], ebx |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 20h |
dec eax |
and dword ptr [ebp+18h], 00000000h |
dec eax |
mov ebx, 2DDFA232h |
cdq |
sub eax, dword ptr [eax] |
add byte ptr [eax-75h], cl |
add eax, 00008711h |
dec eax |
cmp eax, ebx |
jne 00007F2CA4B6D9F9h |
dec eax |
lea ecx, dword ptr [ebp+18h] |
call dword ptr [00003D56h] |
dec eax |
mov eax, dword ptr [ebp+18h] |
dec eax |
mov dword ptr [ebp+10h], eax |
call dword ptr [00003CA8h] |
mov eax, eax |
dec eax |
xor dword ptr [ebp+10h], eax |
call dword ptr [00003CA4h] |
mov eax, eax |
dec eax |
xor dword ptr [ebp+10h], eax |
call dword ptr [00003D38h] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0xb550 | 0xb0 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb600 | 0x1b8 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x10000 | 0x708 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xe000 | 0x654 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xc400 | 0x28e0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x11000 | 0x200 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x9070 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x7070 | 0x118 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x84b8 | 0x420 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0xb41c | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x50f7 | 0x5200 | faab5d44d9331e1acbeff4249f6a71fc | False | 0.5247713414634146 | data | 5.871715930250279 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x5776 | 0x5800 | 95f8c6799f532f29d934cfd379b301d1 | False | 0.33642578125 | data | 4.515878226815834 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xd000 | 0x850 | 0x200 | 169857542ef95792982897cd9219e12d | False | 0.140625 | data | 0.8232739801820367 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xe000 | 0x654 | 0x800 | a4c446c606c9bceb6bce40a4b29f294d | False | 0.40478515625 | PEX Binary Archive | 3.6896573898382914 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.didat | 0xf000 | 0x30 | 0x200 | afdaaa9b04d9f0a3b5c5b43e082745c6 | False | 0.060546875 | data | 0.338777230370671 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x10000 | 0x708 | 0x800 | a659fbccf6956a97642629289f4f322a | False | 0.40771484375 | data | 4.076294532307643 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x11000 | 0x200 | 0x200 | e179b26055bf037dcfade000ff97bd6d | False | 0.775390625 | data | 5.2829730313258585 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x10360 | 0x3a8 | data | English | United States | 0.46153846153846156 |
RT_MANIFEST | 0x100a0 | 0x2c0 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5142045454545454 |
DLL | Import |
---|---|
api-ms-win-core-crt-l1-1-0.dll | wcschr, _wcsicmp, wcstol, _vsnprintf_s, strcpy_s, memcpy, memset |
api-ms-win-core-crt-l2-1-0.dll | _initterm_e, exit, _initterm |
ntdll.dll | NtSetInformationThread, RtlReleaseResource, NtFreeVirtualMemory, NtConnectPort, NtRequestWaitReplyPort, RtlLeaveCriticalSection, NtAllocateVirtualMemory, NtClose, NtAcceptConnectPort, NtReplyWaitReceivePort, RtlCaptureContext, RtlLookupFunctionEntry, NtCompleteConnectPort, RtlVirtualUnwind, RtlSetDaclSecurityDescriptor, NtCreatePort, RtlSetOwnerSecurityDescriptor, NtDeviceIoControlFile, RtlFreeHeap, RtlSetProcessIsCritical, RtlFreeSid, RtlDeriveCapabilitySidsFromName, RtlAddMandatoryAce, RtlUnhandledExceptionFilter, RtlLengthRequiredSid, RtlCreateAndSetSD, NtSetSecurityObject, NtOpenEvent, RtlSubAuthoritySid, RtlAllocateHeap, NtSetInformationProcess, RtlCreateAcl, RtlInitializeSid, RtlEnterCriticalSection, RtlNtStatusToDosError, RtlAcquireResourceExclusive, RtlCreateSecurityDescriptor, NtOpenFile, RtlAcquireResourceShared, DbgPrintEx, RtlInitializeResource, NtListenPort, RtlSetSaclSecurityDescriptor, RtlAddAccessAllowedAce, RtlLengthSid, RtlAllocateAndInitializeSid, NtSetInformationFile, RtlInitUnicodeString, RtlMakeSelfRelativeSD |
RPCRT4.dll | RpcServerUseProtseqEpW, RpcServerRegisterIf3, RpcServerListen, NdrServerCallAll, NdrServerCall2, I_RpcMapWin32Status |
api-ms-win-core-errorhandling-l1-1-0.dll | SetUnhandledExceptionFilter, GetLastError, SetErrorMode, SetLastError, UnhandledExceptionFilter |
api-ms-win-core-handle-l1-1-0.dll | DuplicateHandle, CloseHandle |
api-ms-win-core-io-l1-1-0.dll | DeviceIoControl |
api-ms-win-core-libraryloader-l1-2-0.dll | GetProcAddress, LoadLibraryExW |
api-ms-win-core-registry-l1-1-0.dll | RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegEnumKeyExW |
api-ms-win-core-heap-obsolete-l1-1-0.dll | LocalFree, LocalAlloc |
api-ms-win-security-base-l1-1-0.dll | GetTokenInformation |
api-ms-win-core-processthreads-l1-1-0.dll | ExitThread, OpenProcessToken, TlsSetValue, TlsAlloc, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, TerminateProcess, CreateThread, TlsGetValue |
api-ms-win-core-processenvironment-l1-1-0.dll | SetEnvironmentVariableW, GetEnvironmentVariableW |
api-ms-win-core-synch-l1-1-0.dll | SetEvent, CreateEventW, OpenEventW |
api-ms-win-core-threadpool-l1-2-0.dll | CreateThreadpoolIo, CreateThreadpool, StartThreadpoolIo, CancelThreadpoolIo, TrySubmitThreadpoolCallback, SetThreadpoolThreadMaximum |
api-ms-win-core-synch-l1-2-0.dll | Sleep |
api-ms-win-core-sysinfo-l1-1-0.dll | GetSystemInfo, GetSystemTimeAsFileTime, GetTickCount |
api-ms-win-core-profile-l1-1-0.dll | QueryPerformanceCounter |
api-ms-win-core-windowserrorreporting-l1-1-0.dll | WerSetFlags |
api-ms-win-core-delayload-l1-1-0.dll | DelayLoadFailureHook |
api-ms-win-core-delayload-l1-1-1.dll | ResolveDelayLoadedAPI |
Name | Ordinal | Address |
---|---|---|
LsaGetInterface | 1 | 0x140002c00 |
LsaImpersonateKsecCaller | 2 | 0x140001170 |
LsaRegisterExtension | 3 | 0x1400047c0 |
LsaRegisterInterface | 4 | 0x140002860 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jun 4, 2024 16:55:51.310605049 CEST | 1.1.1.1 | 192.168.2.5 | 0xba38 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jun 4, 2024 16:55:51.310605049 CEST | 1.1.1.1 | 192.168.2.5 | 0xba38 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 10:55:39 |
Start date: | 04/06/2024 |
Path: | C:\Users\user\Desktop\lsass.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff670ff0000 |
File size: | 60'640 bytes |
MD5 hash: | 60E18F7B8D1F43731D0E9169C2D16547 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 1.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 51.8% |
Total number of Nodes: | 490 |
Total number of Limit Nodes: | 4 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF670FF32E0 Relevance: 36.9, APIs: 18, Strings: 3, Instructions: 155memorynativeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF670FF2FD0 Relevance: 21.1, APIs: 7, Strings: 5, Instructions: 131libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|