Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FATURA VE BELGELER.exe

Overview

General Information

Sample name:FATURA VE BELGELER.exe
Analysis ID:1467029
MD5:558524593d71558e3ca216f0aea14817
SHA1:4f074c3dd6658341eb046831327dd1f97ed32753
SHA256:bbf178d449fed69a9c18c43fea71ebb235e85fc12e33005797f482e46c435005
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Enables debug privileges
PE file does not import any functions
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • FATURA VE BELGELER.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\FATURA VE BELGELER.exe" MD5: 558524593D71558E3CA216F0AEA14817)
    • conhost.exe (PID: 4544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    Process Memory Space: FATURA VE BELGELER.exe PID: 7132JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: FATURA VE BELGELER.exe PID: 7132JoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: FATURA VE BELGELER.exeReversingLabs: Detection: 18%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability

        Exploits

        barindex
        Source: Yara matchFile source: 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER.exe PID: 7132, type: MEMORYSTR
        Source: FATURA VE BELGELER.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCC44FC0_2_00007FFAACCC44FC
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCC1CC00_2_00007FFAACCC1CC0
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCD4E6C0_2_00007FFAACCD4E6C
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCC8B280_2_00007FFAACCC8B28
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCCBEC90_2_00007FFAACCCBEC9
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCC0EC80_2_00007FFAACCC0EC8
        Source: FATURA VE BELGELER.exeStatic PE information: No import functions for PE file found
        Source: FATURA VE BELGELER.exe, 00000000.00000000.1243002946.0000027799E30000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAtedikubisuvereka2 vs FATURA VE BELGELER.exe
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3707466125.00000277AC03A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEzuxarujutomegoxeF vs FATURA VE BELGELER.exe
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3707466125.00000277ABAFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAtedikubisuvereka2 vs FATURA VE BELGELER.exe
        Source: FATURA VE BELGELER.exeBinary or memory string: OriginalFilenameAtedikubisuvereka2 vs FATURA VE BELGELER.exe
        Source: classification engineClassification label: mal80.expl.evad.winEXE@2/0@0/0
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4544:120:WilError_03
        Source: FATURA VE BELGELER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: FATURA VE BELGELER.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: FATURA VE BELGELER.exeReversingLabs: Detection: 18%
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeFile read: C:\Users\user\Desktop\FATURA VE BELGELER.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\FATURA VE BELGELER.exe "C:\Users\user\Desktop\FATURA VE BELGELER.exe"
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: FATURA VE BELGELER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: FATURA VE BELGELER.exeStatic file information: File size 3801606 > 1048576
        Source: FATURA VE BELGELER.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: FATURA VE BELGELER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACCC590B push ss; ret 0_2_00007FFAACCC590C
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeCode function: 0_2_00007FFAACDA026B push esp; retf 4810h0_2_00007FFAACDA0312
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: FATURA VE BELGELER.exe PID: 7132, type: MEMORYSTR
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeMemory allocated: 2779A1B0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeMemory allocated: 277B3AE0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: FATURA VE BELGELER.exe, 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeProcess token adjusted: DebugJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: FATURA VE BELGELER.exe, --.csReference to suspicious API methods: GetProcAddress(_EC72_EE72_ECBA_0EB8_EE22_060F_08D6_0601, _EEC5_08E7_08CC_0618_EEE3_ECBA_08DF)
        Source: FATURA VE BELGELER.exe, --.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)_EE53_ECBA_0E6C_08FE_EE56_08DF_EC98_0E72_0E6A_08F1_06DE_0E71_EEEF_08D9_EE54.Length, 64u, out var _0E79_EE02_0E76_EED1_08FE_EC9D_0E72)
        Source: FATURA VE BELGELER.exe, --.csReference to suspicious API methods: LoadLibrary(_0608_06E9_0EBC_EE5D_0600_ECAE_EE6F_EE06_EEE6_EEB4_EC87_EE78_EE8D(_061B_EEDE_EE9D_066A_EE46_08E9_EE7F._EEED_08DB_08E3_08C9_ECB9_EEE7_EE64_08E8_EE20_066B_EC84_EE48_EE25_EEF6_EE39_065D))
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeQueries volume information: C:\Users\user\Desktop\FATURA VE BELGELER.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FATURA VE BELGELER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Process Injection
        111
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Process Injection
        Security Account Manager111
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS13
        System Information Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        FATURA VE BELGELER.exe18%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1467029
        Start date and time:2024-07-03 16:40:09 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 30s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:18
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:FATURA VE BELGELER.exe
        Detection:MAL
        Classification:mal80.expl.evad.winEXE@2/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 89%
        • Number of executed functions: 8
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: FATURA VE BELGELER.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
        Entropy (8bit):4.638104698320504
        TrID:
        • Win64 Executable Console Net Framework (206006/5) 48.58%
        • Win64 Executable Console (202006/5) 47.64%
        • Win64 Executable (generic) (12005/4) 2.83%
        • Generic Win/DOS Executable (2004/3) 0.47%
        • DOS Executable Generic (2002/1) 0.47%
        File name:FATURA VE BELGELER.exe
        File size:3'801'606 bytes
        MD5:558524593d71558e3ca216f0aea14817
        SHA1:4f074c3dd6658341eb046831327dd1f97ed32753
        SHA256:bbf178d449fed69a9c18c43fea71ebb235e85fc12e33005797f482e46c435005
        SHA512:35ea16465ce8492e30f015a229e0051f725fe18be823223bba385f4242ad520aa25dee80ff73a20d3a1d46ff8c88ebe5089b4e8befa01fc243c15be2eaa5e7e2
        SSDEEP:12288:6VjzLahn1c41z3czE21fgpiVD1kBNG+XloA7ZLX8H7:6Fwn1c+z3cvgsVD1YGEloOZLMb
        TLSH:B406D381B1538C97FC5A05B1E8EA75F010FE6E5B74F4400FDF997E1625B223D209AA3A
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...RJ.f.........."...0.>................ ....@...... .......................`......6.:...`................................
        Icon Hash:aa8cac8eb6a2ba96
        Entrypoint:0x400000
        Entrypoint Section:
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x66854A52 [Wed Jul 3 12:55:46 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        dec ebp
        pop edx
        nop
        add byte ptr [ebx], al
        add byte ptr [eax], al
        add byte ptr [eax+eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x48f5a.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x9fa20x1c.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x803e0x8200d7a9f05d65e7aa2fdcfb85641796674eFalse0.620703125data6.404204059085763IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xc0000x48f5a0x4900023012c7ffde7159dd652c217d6425d9aFalse0.06370732555650685data4.769580785310881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0xc30c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.1798780487804878
        RT_ICON0xc9740x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.2513440860215054
        RT_ICON0xcc5c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.3918918918918919
        RT_ICON0xcd840xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3200959488272921
        RT_ICON0xdc2c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.33664259927797835
        RT_ICON0xe4d40x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.2622832369942196
        RT_ICON0xea3c0x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04393141403083114
        RT_ICON0x50a640x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.18786307053941909
        RT_ICON0x5300c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.2453095684803002
        RT_ICON0x540b40x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3484042553191489
        RT_GROUP_ICON0x5451c0x92data0.6301369863013698
        RT_VERSION0x545b00x3e0data0.4959677419354839
        RT_VERSION0x549900x3e0dataEnglishUnited States0.4959677419354839
        RT_MANIFEST0x54d700x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:10:41:02
        Start date:03/07/2024
        Path:C:\Users\user\Desktop\FATURA VE BELGELER.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\FATURA VE BELGELER.exe"
        Imagebase:0x27799e20000
        File size:3'801'606 bytes
        MD5 hash:558524593D71558E3CA216F0AEA14817
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.3706364069.000002779BAFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low
        Has exited:false

        Target ID:1
        Start time:10:41:02
        Start date:03/07/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff75da10000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:14.2%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:6
          Total number of Limit Nodes:0
          execution_graph 9994 7ffaaccc350a 9995 7ffaaccc3519 VirtualProtect 9994->9995 9997 7ffaaccc35f1 9995->9997 9998 7ffaaccc0921 9999 7ffaaccc094f FreeConsole 9998->9999 10001 7ffaaccc09ce 9999->10001

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 365 7ffaaccc8b28-7ffaacccd2a5 367 7ffaacccd2a7-7ffaacccd2ee 365->367 368 7ffaacccd2ef-7ffaacccd309 365->368 367->368 371 7ffaacccd35e-7ffaacccd37e 368->371 372 7ffaacccd30b-7ffaacccd319 368->372 376 7ffaacccd3d3-7ffaacccd3de 371->376 374 7ffaacccd332 372->374 375 7ffaacccd31b-7ffaacccd330 372->375 377 7ffaacccd334-7ffaacccd339 374->377 375->377 378 7ffaacccd380-7ffaacccd386 376->378 379 7ffaacccd3e0-7ffaacccd3f7 376->379 381 7ffaacccd436-7ffaacccd456 377->381 382 7ffaacccd33f-7ffaacccd34e 377->382 383 7ffaacccd922-7ffaacccd93a 378->383 384 7ffaacccd38c-7ffaacccd3d0 call 7ffaaccc8b08 378->384 391 7ffaacccd426-7ffaacccd431 call 7ffaaccc8a48 379->391 392 7ffaacccd3f9-7ffaacccd41f call 7ffaaccc8b08 379->392 387 7ffaacccd4a7-7ffaacccd4b2 381->387 395 7ffaacccd358-7ffaacccd359 382->395 396 7ffaacccd350-7ffaacccd356 382->396 398 7ffaacccd984-7ffaacccd9b1 call 7ffaaccc50a8 383->398 399 7ffaacccd93c-7ffaacccd977 call 7ffaaccc8dc0 383->399 384->376 393 7ffaacccd458-7ffaacccd45e 387->393 394 7ffaacccd4b4-7ffaacccd4c3 387->394 413 7ffaacccd56c-7ffaacccd580 391->413 392->391 393->383 401 7ffaacccd464-7ffaacccd485 call 7ffaaccc8b08 393->401 407 7ffaacccd4d9 394->407 408 7ffaacccd4c5-7ffaacccd4d7 394->408 397 7ffaacccd35b-7ffaacccd35c 395->397 396->397 397->371 437 7ffaacccd9b3-7ffaacccd9bb 398->437 438 7ffaacccd9bc-7ffaacccd9bf 398->438 442 7ffaacccd979-7ffaacccd982 399->442 443 7ffaacccd9c1-7ffaacccd9cb 399->443 426 7ffaacccd48a-7ffaacccd4a4 401->426 414 7ffaacccd4db-7ffaacccd4e0 407->414 408->414 420 7ffaacccd582-7ffaacccd588 413->420 421 7ffaacccd5d0-7ffaacccd5df 413->421 414->413 424 7ffaacccd4e6-7ffaacccd508 call 7ffaaccc8b08 414->424 422 7ffaacccd5a7-7ffaacccd5bf 420->422 423 7ffaacccd58a-7ffaacccd5a5 420->423 434 7ffaacccd5e1-7ffaacccd5ea 421->434 435 7ffaacccd5ec 421->435 432 7ffaacccd5c8-7ffaacccd5cb 422->432 423->422 453 7ffaacccd536-7ffaacccd537 424->453 454 7ffaacccd50a-7ffaacccd534 424->454 426->387 441 7ffaacccd778-7ffaacccd78d 432->441 444 7ffaacccd5ee-7ffaacccd5f3 434->444 435->444 437->438 438->443 455 7ffaacccd78f-7ffaacccd7cb 441->455 456 7ffaacccd7cd 441->456 442->398 445 7ffaacccd9d6-7ffaacccd9e7 443->445 446 7ffaacccd9cd-7ffaacccd9d5 443->446 449 7ffaacccd5f9-7ffaacccd5fc 444->449 450 7ffaacccd8ff-7ffaacccd900 444->450 451 7ffaacccd9e9-7ffaacccd9f1 445->451 452 7ffaacccd9f2-7ffaacccda2d 445->452 446->445 458 7ffaacccd644 449->458 459 7ffaacccd5fe-7ffaacccd61b call 7ffaaccc0188 449->459 457 7ffaacccd903-7ffaacccd912 450->457 451->452 467 7ffaacccda34-7ffaacccda3f 452->467 468 7ffaacccda2f call 7ffaacccb430 452->468 465 7ffaacccd539-7ffaacccd540 453->465 454->465 461 7ffaacccd7cf-7ffaacccd7d4 455->461 456->461 470 7ffaacccd913-7ffaacccd91b 457->470 464 7ffaacccd646-7ffaacccd64b 458->464 459->458 495 7ffaacccd61d-7ffaacccd633 459->495 473 7ffaacccd7d6-7ffaacccd833 call 7ffaaccc4fe0 461->473 474 7ffaacccd844-7ffaacccd84e 461->474 471 7ffaacccd651-7ffaacccd65d 464->471 472 7ffaacccd74c-7ffaacccd76f 464->472 465->413 475 7ffaacccd542-7ffaacccd567 call 7ffaaccc8b30 465->475 496 7ffaacccda51 467->496 497 7ffaacccda41-7ffaacccda4f 467->497 468->467 470->383 471->383 481 7ffaacccd663-7ffaacccd672 471->481 485 7ffaacccd775-7ffaacccd776 472->485 529 7ffaacccd8b4 473->529 530 7ffaacccd835-7ffaacccd83e 473->530 479 7ffaacccd850-7ffaacccd885 call 7ffaaccc4fe0 474->479 475->413 494 7ffaacccd8ee-7ffaacccd8fe 475->494 515 7ffaacccd88a-7ffaacccd892 479->515 490 7ffaacccd674-7ffaacccd683 481->490 491 7ffaacccd685-7ffaacccd692 call 7ffaaccc0188 481->491 485->441 502 7ffaacccd698-7ffaacccd69e 490->502 491->502 511 7ffaacccd637-7ffaacccd642 495->511 512 7ffaacccd635 495->512 499 7ffaacccda53-7ffaacccda58 496->499 497->499 505 7ffaacccda6f-7ffaacccda77 call 7ffaaccc4ff8 499->505 506 7ffaacccda5a-7ffaacccda6d call 7ffaaccc1d28 499->506 508 7ffaacccd6d3-7ffaacccd6d8 502->508 509 7ffaacccd6a0-7ffaacccd6cd 502->509 521 7ffaacccda7c-7ffaacccda83 505->521 506->521 508->383 519 7ffaacccd6de-7ffaacccd6fe 508->519 509->508 511->464 512->511 515->457 516 7ffaacccd894-7ffaacccd897 515->516 516->470 522 7ffaacccd899 516->522 531 7ffaacccd712-7ffaacccd742 call 7ffaaccc9400 519->531 532 7ffaacccd700-7ffaacccd70f 519->532 526 7ffaacccd8e0-7ffaacccd8eb 522->526 527 7ffaacccd89b-7ffaacccd8ae 522->527 526->494 527->529 529->479 529->529 530->474 536 7ffaacccd747-7ffaacccd74a 531->536 532->531 536->441
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID: 0#%$0#%$0#%$x!%
          • API String ID: 0-995454574
          • Opcode ID: b23fa3b948361c495a7f3e47509e296e14a01455413dee533158d204c1e864c2
          • Instruction ID: aede66894b2b404d8b8ab9fd09acf74a2a3e022f83cc078c28b730987f4829bd
          • Opcode Fuzzy Hash: b23fa3b948361c495a7f3e47509e296e14a01455413dee533158d204c1e864c2
          • Instruction Fuzzy Hash: 1252F670A0DA098FEB69EF28C855A7977E1FF59301B1441BDE08EC7292DE24EC56C781

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1279 7ffaaccc1cc0-7ffaaccc49d1 call 7ffaaccc4890 1286 7ffaaccc49f4-7ffaaccc4a03 1279->1286 1287 7ffaaccc4a05-7ffaaccc4a1f call 7ffaaccc4890 call 7ffaaccc48e0 1286->1287 1288 7ffaaccc49d3-7ffaaccc49e9 call 7ffaaccc4890 call 7ffaaccc48e0 1286->1288 1297 7ffaaccc49eb-7ffaaccc49f2 1288->1297 1298 7ffaaccc4a20-7ffaaccc4a70 1288->1298 1297->1286 1302 7ffaaccc4a72-7ffaaccc4a77 call 7ffaaccc4108 1298->1302 1303 7ffaaccc4a7c-7ffaaccc4ab3 1298->1303 1302->1303 1307 7ffaaccc4ab9-7ffaaccc4ac4 1303->1307 1308 7ffaaccc4caf-7ffaaccc4d19 1303->1308 1309 7ffaaccc4b38-7ffaaccc4b3d 1307->1309 1310 7ffaaccc4ac6-7ffaaccc4ad4 1307->1310 1338 7ffaaccc4d36-7ffaaccc4d60 1308->1338 1339 7ffaaccc4d1b-7ffaaccc4d21 1308->1339 1313 7ffaaccc4bb0-7ffaaccc4bba 1309->1313 1314 7ffaaccc4b3f-7ffaaccc4b4b 1309->1314 1310->1308 1311 7ffaaccc4ada-7ffaaccc4ae9 1310->1311 1315 7ffaaccc4b1d-7ffaaccc4b28 1311->1315 1316 7ffaaccc4aeb-7ffaaccc4b1b 1311->1316 1319 7ffaaccc4bdc-7ffaaccc4be4 1313->1319 1320 7ffaaccc4bbc-7ffaaccc4bc9 call 7ffaaccc4128 1313->1320 1314->1308 1318 7ffaaccc4b51-7ffaaccc4b64 1314->1318 1315->1308 1323 7ffaaccc4b2e-7ffaaccc4b36 1315->1323 1316->1315 1324 7ffaaccc4b69-7ffaaccc4b6c 1316->1324 1321 7ffaaccc4be7-7ffaaccc4bf2 1318->1321 1319->1321 1335 7ffaaccc4bce-7ffaaccc4bda 1320->1335 1321->1308 1325 7ffaaccc4bf8-7ffaaccc4c08 1321->1325 1323->1309 1323->1310 1328 7ffaaccc4b82-7ffaaccc4b8a 1324->1328 1329 7ffaaccc4b6e-7ffaaccc4b7e 1324->1329 1325->1308 1330 7ffaaccc4c0e-7ffaaccc4c1b 1325->1330 1328->1308 1333 7ffaaccc4b90-7ffaaccc4baf 1328->1333 1329->1328 1330->1308 1334 7ffaaccc4c21-7ffaaccc4c41 1330->1334 1334->1308 1342 7ffaaccc4c43-7ffaaccc4c52 1334->1342 1335->1319 1343 7ffaaccc4d23-7ffaaccc4d34 1339->1343 1344 7ffaaccc4d61-7ffaaccc4d7d 1339->1344 1346 7ffaaccc4c54-7ffaaccc4c5f 1342->1346 1347 7ffaaccc4c9d-7ffaaccc4cae 1342->1347 1343->1338 1343->1339 1353 7ffaaccc4d7f-7ffaaccc4da5 1344->1353 1346->1347 1352 7ffaaccc4c61-7ffaaccc4c98 call 7ffaaccc4128 1346->1352 1352->1347 1355 7ffaaccc4da7-7ffaaccc4db5 1353->1355 1357 7ffaaccc4dc9-7ffaaccc4e01 1355->1357 1358 7ffaaccc4db7-7ffaaccc4dc7 1355->1358 1364 7ffaaccc4e03-7ffaaccc4e09 1357->1364 1365 7ffaaccc4e58-7ffaaccc4e5f 1357->1365 1358->1357 1358->1358 1364->1365 1368 7ffaaccc4e0b-7ffaaccc4e0c 1364->1368 1366 7ffaaccc4ea2-7ffaaccc4ecb 1365->1366 1367 7ffaaccc4e61-7ffaaccc4e62 1365->1367 1369 7ffaaccc4e65-7ffaaccc4e68 1367->1369 1370 7ffaaccc4e0f-7ffaaccc4e12 1368->1370 1371 7ffaaccc4ecc-7ffaaccc4ee1 1369->1371 1372 7ffaaccc4e6a-7ffaaccc4e7b 1369->1372 1370->1371 1374 7ffaaccc4e18-7ffaaccc4e25 1370->1374 1383 7ffaaccc4ee3-7ffaaccc4eea 1371->1383 1384 7ffaaccc4eeb-7ffaaccc4f16 1371->1384 1375 7ffaaccc4e99-7ffaaccc4ea0 1372->1375 1376 7ffaaccc4e7d-7ffaaccc4e83 1372->1376 1377 7ffaaccc4e27-7ffaaccc4e4e 1374->1377 1378 7ffaaccc4e51-7ffaaccc4e56 1374->1378 1375->1366 1375->1369 1376->1371 1380 7ffaaccc4e85-7ffaaccc4e95 1376->1380 1377->1378 1378->1365 1378->1370 1380->1375 1383->1384
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID: d
          • API String ID: 0-2564639436
          • Opcode ID: 52fa16fea0961acbcd689d25458f2ee2c2fcd64ae0d8c5ee7f27e240aa7d696d
          • Instruction ID: 0e1c4cbb89fbb4eb3fd9b4d3975a8fcd955a707e77f743e0dcedf2047d8683a3
          • Opcode Fuzzy Hash: 52fa16fea0961acbcd689d25458f2ee2c2fcd64ae0d8c5ee7f27e240aa7d696d
          • Instruction Fuzzy Hash: 04124271A1DA4A8FE35AEF28D4816B177E0EF46310B04C2B9D48EC7197DE28F84687C1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1388 7ffaacccbec9-7ffaacccbee9 1390 7ffaacccbf33-7ffaacccbf4a call 7ffaaccc7330 call 7ffaaccc7a90 1388->1390 1391 7ffaacccbeeb-7ffaacccbf14 1388->1391 1392 7ffaacccbfda 1390->1392 1401 7ffaacccbf50-7ffaacccbf5e 1390->1401 1391->1392 1393 7ffaacccbf1a-7ffaacccbf31 1391->1393 1397 7ffaacccbfde-7ffaacccbfeb 1392->1397 1393->1390 1399 7ffaacccc02d-7ffaacccc039 1397->1399 1400 7ffaacccbfed-7ffaacccbffd 1397->1400 1403 7ffaacccc03f-7ffaacccc055 1399->1403 1404 7ffaacccc26c-7ffaacccc27f 1399->1404 1402 7ffaacccbfff-7ffaacccc00c 1400->1402 1405 7ffaacccbfcf-7ffaacccbfd9 1401->1405 1406 7ffaacccbf60-7ffaacccbf62 1401->1406 1407 7ffaacccc056-7ffaacccc093 call 7ffaacccb430 * 2 call 7ffaaccc7330 1402->1407 1408 7ffaacccc00e-7ffaacccc015 1402->1408 1403->1407 1414 7ffaacccc2c1-7ffaacccc2cc 1404->1414 1415 7ffaacccc281-7ffaacccc2ab 1404->1415 1406->1397 1411 7ffaacccbf64 1406->1411 1407->1404 1438 7ffaacccc099-7ffaacccc0b4 1407->1438 1412 7ffaacccc016-7ffaacccc02c 1408->1412 1416 7ffaacccbf66-7ffaacccbf6f 1411->1416 1417 7ffaacccbfaa-7ffaacccbfb8 1411->1417 1412->1399 1421 7ffaacccc2ce-7ffaacccc2da 1414->1421 1422 7ffaacccc2dd-7ffaacccc2fc 1414->1422 1426 7ffaacccc2b9-7ffaacccc2bf 1415->1426 1427 7ffaacccc2ad-7ffaacccc2b6 1415->1427 1423 7ffaacccbfc8-7ffaacccbfce 1416->1423 1424 7ffaacccbf71-7ffaacccbf8e 1416->1424 1417->1392 1419 7ffaacccbfba-7ffaacccbfc6 1417->1419 1419->1423 1421->1422 1428 7ffaacccc2fe-7ffaacccc30a 1422->1428 1429 7ffaacccc30d-7ffaacccc326 1422->1429 1423->1405 1424->1402 1434 7ffaacccbf90-7ffaacccbf95 1424->1434 1426->1414 1427->1426 1428->1429 1432 7ffaacccc336-7ffaacccc34b 1429->1432 1433 7ffaacccc328-7ffaacccc333 1429->1433 1433->1432 1434->1412 1436 7ffaacccbf97-7ffaacccbfa9 call 7ffaaccc76d0 1434->1436 1436->1417 1440 7ffaacccc0b6-7ffaacccc0b9 1438->1440 1441 7ffaacccc10d-7ffaacccc117 1438->1441 1442 7ffaacccc13a-7ffaacccc13b 1440->1442 1443 7ffaacccc0bb-7ffaacccc0db 1440->1443 1444 7ffaacccc18f-7ffaacccc197 1441->1444 1445 7ffaacccc13d-7ffaacccc174 1442->1445 1452 7ffaacccc119-7ffaacccc138 1443->1452 1453 7ffaacccc0dd-7ffaacccc0ee 1443->1453 1446 7ffaacccc208-7ffaacccc21b 1444->1446 1447 7ffaacccc199-7ffaacccc19e 1444->1447 1445->1444 1450 7ffaacccc21f-7ffaacccc22b call 7ffaaccc4380 1446->1450 1447->1450 1451 7ffaacccc1a0-7ffaacccc1e4 call 7ffaaccc76d0 1447->1451 1462 7ffaacccc230-7ffaacccc240 1450->1462 1451->1404 1464 7ffaacccc1ea-7ffaacccc207 1451->1464 1452->1442 1459 7ffaacccc176-7ffaacccc18b 1452->1459 1453->1445 1461 7ffaacccc0f0-7ffaacccc10c 1453->1461 1459->1444 1461->1441 1462->1404 1463 7ffaacccc242-7ffaacccc26b 1462->1463 1464->1446
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID: H
          • API String ID: 0-2852464175
          • Opcode ID: d325f30e6c7165ceb98c7c161e57c0de0d594547bb93409371e79ec787d527eb
          • Instruction ID: ff52293caed202ba9df8bc02fb98f4a97a650dee24125e1a74bad9f2664b491a
          • Opcode Fuzzy Hash: d325f30e6c7165ceb98c7c161e57c0de0d594547bb93409371e79ec787d527eb
          • Instruction Fuzzy Hash: 18F12A3191DB868FF31ECF2984951B577E2FF95301B1486BED4CAC7292DA28E84687C1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1466 7ffaaccc44fc-7ffaaccc4503 1467 7ffaaccc4505-7ffaaccc450d 1466->1467 1468 7ffaaccc450e-7ffaaccc455e 1466->1468 1467->1468 1470 7ffaaccc4564-7ffaaccc45f0 call 7ffaaccc4038 1468->1470 1471 7ffaaccc47d6-7ffaaccc4809 1468->1471 1503 7ffaaccc4652-7ffaaccc4665 1470->1503 1478 7ffaaccc4813-7ffaaccc482e 1471->1478 1479 7ffaaccc480b-7ffaaccc4812 1471->1479 1482 7ffaaccc4862-7ffaaccc4891 1478->1482 1483 7ffaaccc4830-7ffaaccc4832 1478->1483 1479->1478 1499 7ffaaccc4894-7ffaaccc48ca 1482->1499 1485 7ffaaccc4834-7ffaaccc4837 call 7ffaaccc4108 1483->1485 1486 7ffaaccc483c-7ffaaccc4842 1483->1486 1485->1486 1489 7ffaaccc4844-7ffaaccc484a 1486->1489 1490 7ffaaccc4851-7ffaaccc4861 1486->1490 1493 7ffaaccc484c 1489->1493 1494 7ffaaccc484e-7ffaaccc484f 1489->1494 1493->1494 1494->1490 1499->1499 1501 7ffaaccc48cc 1499->1501 1504 7ffaaccc45f2-7ffaaccc4649 call 7ffaaccc4368 * 2 call 7ffaaccc4370 1503->1504 1505 7ffaaccc4667-7ffaaccc4669 1503->1505 1539 7ffaaccc4650 1504->1539 1507 7ffaaccc46c2-7ffaaccc46d5 1505->1507 1509 7ffaaccc46d7-7ffaaccc46d9 1507->1509 1510 7ffaaccc466b-7ffaaccc46c0 call 7ffaaccc4368 * 2 call 7ffaaccc0208 1507->1510 1512 7ffaaccc477e-7ffaaccc4791 1509->1512 1510->1507 1515 7ffaaccc4797-7ffaaccc47ad 1512->1515 1516 7ffaaccc46de-7ffaaccc4710 call 7ffaaccc4368 1512->1516 1527 7ffaaccc47b1-7ffaaccc47bd 1515->1527 1528 7ffaaccc47af 1515->1528 1529 7ffaaccc4712-7ffaaccc4728 1516->1529 1530 7ffaaccc472a-7ffaaccc472b 1516->1530 1534 7ffaaccc47c4-7ffaaccc47d5 1527->1534 1528->1527 1532 7ffaaccc472d-7ffaaccc4777 call 7ffaaccc1cc0 call 7ffaaccc4110 1529->1532 1530->1532 1541 7ffaaccc477c 1532->1541 1539->1503 1541->1512
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID: fish
          • API String ID: 0-1064584243
          • Opcode ID: de750268c42007cca2b15a24d926ac593776da96b8172dc7930b9d125a9af38b
          • Instruction ID: 1ed89ea50493cfa8b38fabd7339968e92c65e71b7964eb0b501e57fd1e559176
          • Opcode Fuzzy Hash: de750268c42007cca2b15a24d926ac593776da96b8172dc7930b9d125a9af38b
          • Instruction Fuzzy Hash: EBD12871A1DB4A8FE75DEF28C8555B577E1EF96310B0481BEE48FC3292DE24E8068781
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 128af82079ab39809895a1e54a43e8d743ea549fa5d46adca783730db9f3f3bc
          • Instruction ID: 4de9fb17a421ada6902e950d1a092353adde80200ab5ceecd1a13c7e4e824f03
          • Opcode Fuzzy Hash: 128af82079ab39809895a1e54a43e8d743ea549fa5d46adca783730db9f3f3bc
          • Instruction Fuzzy Hash: AB516A2190D74A4FE71E9E3888551B57BA1EB43320B0582BBD48EC75A7DD28A84A83D2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1542 7ffaaccc350a-7ffaaccc3517 1543 7ffaaccc3522-7ffaaccc3533 1542->1543 1544 7ffaaccc3519-7ffaaccc3521 1542->1544 1545 7ffaaccc3535-7ffaaccc353d 1543->1545 1546 7ffaaccc353e-7ffaaccc35ef VirtualProtect 1543->1546 1544->1543 1545->1546 1550 7ffaaccc35f7-7ffaaccc361f 1546->1550 1551 7ffaaccc35f1 1546->1551 1551->1550
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID: ProtectVirtual
          • String ID:
          • API String ID: 544645111-0
          • Opcode ID: 5afec40b5c7566713648d03e82997a593bb6cc5af10db8cd837ee75a5ab1f8fc
          • Instruction ID: 6438d27fe402703ede901648e2372c8010e02500e308a7db8206ef81d91cf72d
          • Opcode Fuzzy Hash: 5afec40b5c7566713648d03e82997a593bb6cc5af10db8cd837ee75a5ab1f8fc
          • Instruction Fuzzy Hash: 0841093190DB888FD71ADFA898466F97FF1EF56321F0842AFD049C3192CB646456C791

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1659 7ffaaccc0921-7ffaaccc09cc FreeConsole 1663 7ffaaccc09d4-7ffaaccc09fb 1659->1663 1664 7ffaaccc09ce 1659->1664 1664->1663
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID: ConsoleFree
          • String ID:
          • API String ID: 771614528-0
          • Opcode ID: 390f85c1f5acbb5507f24693b235f13c73dfefbd1abbb377275b76f823cafb00
          • Instruction ID: 320a7626de98d24bc6636b08b8392f05602c436f57125ce4abcdf90398a20938
          • Opcode Fuzzy Hash: 390f85c1f5acbb5507f24693b235f13c73dfefbd1abbb377275b76f823cafb00
          • Instruction Fuzzy Hash: F531B17150C7488FDB15DFA8D849BEABBF0EF56321F0482AFD08AC3552D768A44ACB51
          Memory Dump Source
          • Source File: 00000000.00000002.3713550828.00007FFAACDA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACDA0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaacda0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 96c75a13273d33b0181c4bd242ed3086f63b2218c889d9c939efa61d96dba6bf
          • Instruction ID: d074f6282c1d3482f26252cdbbaca889be00a480e4b416083091dda555ca726b
          • Opcode Fuzzy Hash: 96c75a13273d33b0181c4bd242ed3086f63b2218c889d9c939efa61d96dba6bf
          • Instruction Fuzzy Hash: D651D53190DA49CFEB55DB18C8919A977E0FF56304F1485A9D05FCB186DA25F84ACB80
          Memory Dump Source
          • Source File: 00000000.00000002.3713274276.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ffaaccc0000_FATURA VE BELGELER.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3f55c9853b08d0add28b552626c216917fdd231e10f1dfb0819f9d3a61b3aadc
          • Instruction ID: 33101ab3e4fc982e26e5dad9ad538d947542d65fc7b10e3fff6dce0000c0a5da
          • Opcode Fuzzy Hash: 3f55c9853b08d0add28b552626c216917fdd231e10f1dfb0819f9d3a61b3aadc
          • Instruction Fuzzy Hash: 594127E390E2912FF306ABF8A85A0E57F90EF4122470884FBD1CC8E4D7EA14A549C3C5