Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
br0A8E2X6I.exe

Overview

General Information

Sample name:br0A8E2X6I.exe
renamed because original name is a hash value
Original sample name:cb9d1ebc73719f1434f92e6648b4815c01dadef4761f7cc4e91561ce34da6346.exe
Analysis ID:1496330
MD5:64b4ac441e96d0fca88fb2a62cc170b0
SHA1:5d111704bfb4a26778bc5bf7f9e13cda1a53a767
SHA256:cb9d1ebc73719f1434f92e6648b4815c01dadef4761f7cc4e91561ce34da6346
Tags:45-66-231-202exeSocks5Systemz
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • br0A8E2X6I.exe (PID: 5604 cmdline: "C:\Users\user\Desktop\br0A8E2X6I.exe" MD5: 64B4AC441E96D0FCA88FB2A62CC170B0)
    • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://goodfooggooftool.net/index.php", "http://sulugilioiu19.net/index.php", "http://selebration17io.io/index.php", "http://vacantion18ffeu.cc/index.php", "http://valarioulinity1.net/index.php", "http://buriatiarutuhuob.net/index.php", "http://cassiosssionunu.me/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6a4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2a4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      Click to see the 3 entries
      No Sigma rule has matched
      Timestamp:2024-08-21T07:11:30.506045+0200
      SID:2039103
      Severity:1
      Source Port:49711
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-08-21T07:11:30.260968+0200
      SID:2039103
      Severity:1
      Source Port:49711
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: br0A8E2X6I.exeAvira: detected
      Source: http://goodfooggooftool.net/index.phpAvira URL Cloud: Label: malware
      Source: http://valarioulinity1.net/index.phpAvira URL Cloud: Label: malware
      Source: http://cassiosssionunu.me/index.phpAvira URL Cloud: Label: malware
      Source: http://vacantion18ffeu.cc/index.phpAvira URL Cloud: Label: malware
      Source: http://selebration17io.io/index.phpAvira URL Cloud: Label: phishing
      Source: http://sulugilioiu19.net/index.phpAvira URL Cloud: Label: malware
      Source: http://buriatiarutuhuob.net/index.phpAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Roaming\rdihhcdAvira: detection malicious, Label: HEUR/AGEN.1307711
      Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://goodfooggooftool.net/index.php", "http://sulugilioiu19.net/index.php", "http://selebration17io.io/index.php", "http://vacantion18ffeu.cc/index.php", "http://valarioulinity1.net/index.php", "http://buriatiarutuhuob.net/index.php", "http://cassiosssionunu.me/index.php"]}
      Source: selebration17io.ioVirustotal: Detection: 16%Perma Link
      Source: http://goodfooggooftool.net/index.phpVirustotal: Detection: 15%Perma Link
      Source: http://valarioulinity1.net/index.phpVirustotal: Detection: 14%Perma Link
      Source: http://selebration17io.io/index.phpVirustotal: Detection: 14%Perma Link
      Source: http://cassiosssionunu.me/index.phpVirustotal: Detection: 13%Perma Link
      Source: http://buriatiarutuhuob.net/index.phpVirustotal: Detection: 15%Perma Link
      Source: http://vacantion18ffeu.cc/index.phpVirustotal: Detection: 21%Perma Link
      Source: http://sulugilioiu19.net/index.phpVirustotal: Detection: 13%Perma Link
      Source: C:\Users\user\AppData\Roaming\rdihhcdReversingLabs: Detection: 76%
      Source: C:\Users\user\AppData\Roaming\rdihhcdVirustotal: Detection: 74%Perma Link
      Source: br0A8E2X6I.exeReversingLabs: Detection: 76%
      Source: br0A8E2X6I.exeVirustotal: Detection: 74%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\rdihhcdJoe Sandbox ML: detected
      Source: br0A8E2X6I.exeJoe Sandbox ML: detected
      Source: br0A8E2X6I.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: Binary string: C:\giz59_mugeheta\bufemadubicuk99\tij-dulinunif87\kabe.pdb source: br0A8E2X6I.exe, rdihhcd.2.dr
      Source: Binary string: 4gFC:\giz59_mugeheta\bufemadubicuk99\tij-dulinunif87\kabe.pdb source: br0A8E2X6I.exe, rdihhcd.2.dr

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.5:49711 -> 188.40.141.211:80
      Source: C:\Windows\explorer.exeNetwork Connect: 188.40.141.211 80Jump to behavior
      Source: Malware configuration extractorURLs: http://goodfooggooftool.net/index.php
      Source: Malware configuration extractorURLs: http://sulugilioiu19.net/index.php
      Source: Malware configuration extractorURLs: http://selebration17io.io/index.php
      Source: Malware configuration extractorURLs: http://vacantion18ffeu.cc/index.php
      Source: Malware configuration extractorURLs: http://valarioulinity1.net/index.php
      Source: Malware configuration extractorURLs: http://buriatiarutuhuob.net/index.php
      Source: Malware configuration extractorURLs: http://cassiosssionunu.me/index.php
      Source: Joe Sandbox ViewIP Address: 188.40.141.211 188.40.141.211
      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jynwoplqqkht.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 235Host: selebration17io.io
      Source: global trafficHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://smiodprqlvtv.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 316Host: selebration17io.io
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: selebration17io.io
      Source: unknownHTTP traffic detected: POST /index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jynwoplqqkht.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 235Host: selebration17io.io
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Content-Length: 7Content-Type: application/octet-streamDate: Wed, 21 Aug 2024 05:11:30 GMTData Raw: 03 00 00 00 1f 3d 19 Data Ascii: =
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Content-Length: 0Content-Type: application/octet-streamDate: Wed, 21 Aug 2024 05:11:30 GMT
      Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000002.00000000.2075690937.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
      Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000002.00000002.3272482280.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000002.00000000.2077924540.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2078364506.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2078340556.0000000008870000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000002.00000002.3268274578.00000000011A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://selebration17io.io/index.php
      Source: explorer.exe, 00000002.00000003.3096930645.0000000003534000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3095948833.0000000003531000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://smiodprqlvtv.net/
      Source: explorer.exe, 00000002.00000003.3096930645.0000000003534000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3095948833.0000000003531000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://smiodprqlvtv.net/application/x-www-form-urlencodedMozilla/5.0
      Source: explorer.exe, 00000002.00000002.3275682540.000000000C81C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081841615.000000000C81C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: explorer.exe, 00000002.00000003.3095522768.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094758629.000000000C514000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081353082.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3275303144.000000000C518000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000002.00000003.3095264105.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3270338419.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000002.00000002.3270338419.0000000007637000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2077257852.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000002.00000003.3094228937.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2076341879.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3269123884.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
      Source: explorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009D42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
      Source: explorer.exe, 00000002.00000002.3275032244.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081353082.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
      Source: explorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00401553 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401553
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00403005 RtlCreateUserThread,NtTerminateProcess,0_2_00403005
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00401561 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401561
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_0040156B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040156B
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_0040156F NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040156F
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00401729 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401729
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_004023E5 NtQuerySystemInformation,0_2_004023E5
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401583
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00401587 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401587
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_004026A0 NtEnumerateKey,0_2_004026A0
      Source: C:\Windows\explorer.exeCode function: 2_2_011229682_2_01122968
      Source: br0A8E2X6I.exe, 00000000.00000002.2097489854.0000000000442000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWonder4 vs br0A8E2X6I.exe
      Source: br0A8E2X6I.exeBinary or memory string: OriginalFilenameWonder4 vs br0A8E2X6I.exe
      Source: br0A8E2X6I.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: br0A8E2X6I.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: rdihhcd.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/1
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_005F4C48 CreateToolhelp32Snapshot,Module32First,0_2_005F4C48
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rdihhcdJump to behavior
      Source: br0A8E2X6I.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: br0A8E2X6I.exeReversingLabs: Detection: 76%
      Source: br0A8E2X6I.exeVirustotal: Detection: 74%
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
      Source: C:\Windows\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\OfficeJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: br0A8E2X6I.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\giz59_mugeheta\bufemadubicuk99\tij-dulinunif87\kabe.pdb source: br0A8E2X6I.exe, rdihhcd.2.dr
      Source: Binary string: 4gFC:\giz59_mugeheta\bufemadubicuk99\tij-dulinunif87\kabe.pdb source: br0A8E2X6I.exe, rdihhcd.2.dr

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeUnpacked PE file: 0.2.br0A8E2X6I.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00403253 push eax; ret 0_2_0040332D
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00401C64 push es; retf 0_2_00401C83
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00403335 push eax; ret 0_2_0040332D
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_00402F91 push 60B44389h; retf 0_2_00402FAB
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_004F1CCB push es; retf 0_2_004F1CEA
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_004F2FF8 push 60B44389h; retf 0_2_004F3012
      Source: br0A8E2X6I.exeStatic PE information: section name: .text entropy: 7.422171603883306
      Source: rdihhcd.2.drStatic PE information: section name: .text entropy: 7.422171603883306
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rdihhcdJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rdihhcdJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\br0a8e2x6i.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\rdihhcd:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeAPI/Special instruction interceptor: Address: 7FF8C88EE814
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeAPI/Special instruction interceptor: Address: 7FF8C88ED584
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 460Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 878Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 867Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3784Thread sleep count: 460 > 30Jump to behavior
      Source: explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
      Source: explorer.exe, 00000002.00000002.3272482280.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
      Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
      Source: explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
      Source: explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
      Source: explorer.exe, 00000002.00000002.3272482280.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
      Source: explorer.exe, 00000002.00000003.3094228937.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
      Source: explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000002.00000003.3096144958.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000002.00000003.3095264105.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_004F092B mov eax, dword ptr fs:[00000030h]0_2_004F092B
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_004F0D90 mov eax, dword ptr fs:[00000030h]0_2_004F0D90
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeCode function: 0_2_005F4525 push dword ptr fs:[00000030h]0_2_005F4525

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: rdihhcd.2.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 188.40.141.211 80Jump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeThread created: C:\Windows\explorer.exe EIP: 1121A88Jump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\br0A8E2X6I.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
      Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
      Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2077053592.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000002.00000000.2076060157.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3268615891.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000002.00000002.3268026747.0000000000EF0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2075690937.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
      Source: C:\Windows\explorer.exeCode function: 2_2_011235B8 GetUserNameW,2_2_011235B8

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      31
      Process Injection
      11
      Masquerading
      OS Credential Dumping411
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media2
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture113
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      Account Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials1
      System Owner/User Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync13
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      br0A8E2X6I.exe76%ReversingLabsWin32.Trojan.Brresmon
      br0A8E2X6I.exe75%VirustotalBrowse
      br0A8E2X6I.exe100%AviraHEUR/AGEN.1307711
      br0A8E2X6I.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\rdihhcd100%AviraHEUR/AGEN.1307711
      C:\Users\user\AppData\Roaming\rdihhcd100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\rdihhcd76%ReversingLabsWin32.Trojan.Brresmon
      C:\Users\user\AppData\Roaming\rdihhcd75%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      selebration17io.io17%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://word.office.comon0%URL Reputationsafe
      https://word.office.comon0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
      http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
      http://goodfooggooftool.net/index.php16%VirustotalBrowse
      http://valarioulinity1.net/index.php15%VirustotalBrowse
      http://selebration17io.io/index.php15%VirustotalBrowse
      http://cassiosssionunu.me/index.php14%VirustotalBrowse
      http://goodfooggooftool.net/index.php100%Avira URL Cloudmalware
      http://valarioulinity1.net/index.php100%Avira URL Cloudmalware
      http://cassiosssionunu.me/index.php100%Avira URL Cloudmalware
      http://smiodprqlvtv.net/application/x-www-form-urlencodedMozilla/5.00%Avira URL Cloudsafe
      http://vacantion18ffeu.cc/index.php100%Avira URL Cloudmalware
      http://selebration17io.io/index.php100%Avira URL Cloudphishing
      http://schemas.micro0%URL Reputationsafe
      http://crl.v0%URL Reputationsafe
      https://outlook.com0%URL Reputationsafe
      https://wns.windows.com/)s0%URL Reputationsafe
      http://buriatiarutuhuob.net/index.php16%VirustotalBrowse
      http://vacantion18ffeu.cc/index.php21%VirustotalBrowse
      http://sulugilioiu19.net/index.php14%VirustotalBrowse
      http://smiodprqlvtv.net/0%Avira URL Cloudsafe
      http://sulugilioiu19.net/index.php100%Avira URL Cloudmalware
      http://buriatiarutuhuob.net/index.php100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      selebration17io.io
      188.40.141.211
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      http://goodfooggooftool.net/index.phptrue
      • 16%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://valarioulinity1.net/index.phptrue
      • 15%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://cassiosssionunu.me/index.phptrue
      • 14%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://selebration17io.io/index.phptrue
      • 15%, Virustotal, Browse
      • Avira URL Cloud: phishing
      unknown
      http://vacantion18ffeu.cc/index.phptrue
      • 21%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://sulugilioiu19.net/index.phptrue
      • 14%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://buriatiarutuhuob.net/index.phptrue
      • 16%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://word.office.comonexplorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000002.3275682540.000000000C81C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081841615.000000000C81C000.00000004.00000001.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000003.3095264105.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3270338419.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2077257852.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://powerpoint.office.comcemberexplorer.exe, 00000002.00000002.3275032244.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081353082.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://smiodprqlvtv.net/application/x-www-form-urlencodedMozilla/5.0explorer.exe, 00000002.00000003.3096930645.0000000003534000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3095948833.0000000003531000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000002.00000003.3095522768.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094758629.000000000C514000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2081353082.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3275303144.000000000C518000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.msn.com/explorer.exe, 00000002.00000003.3096144958.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://excel.office.comexplorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009BB3000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.microexplorer.exe, 00000002.00000000.2077924540.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2078364506.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2078340556.0000000008870000.00000002.00000001.00040000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.vexplorer.exe, 00000002.00000000.2075690937.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3268026747.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://outlook.comexplorer.exe, 00000002.00000000.2078773166.0000000009BB3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3272482280.0000000009D42000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.0000000009D42000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://smiodprqlvtv.net/explorer.exe, 00000002.00000003.3096930645.0000000003534000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3095948833.0000000003531000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://wns.windows.com/)sexplorer.exe, 00000002.00000002.3272482280.00000000099B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096144958.00000000099BF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2078773166.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      188.40.141.211
      selebration17io.ioGermany
      24940HETZNER-ASDEtrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1496330
      Start date and time:2024-08-21 07:10:13 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 42s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:1
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:br0A8E2X6I.exe
      renamed because original name is a hash value
      Original Sample Name:cb9d1ebc73719f1434f92e6648b4815c01dadef4761f7cc4e91561ce34da6346.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@1/2@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 33
      • Number of non-executed functions: 6
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtEnumerateKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      01:11:10API Interceptor589x Sleep call for process: explorer.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      188.40.141.211setup.exeGet hashmaliciousBabuk, DjvuBrowse
      • zexeq.com/test2/get.php?pid=63423FF445583FE5A9A41B7CFEC3D9C4&first=true
      SecuriteInfo.com.Win32.Evo-gen.21074.1738.exeGet hashmaliciousSmokeLoaderBrowse
      • agressivemnaiq.xyz/
      A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • host-data-coin-11.com/
      be1c79275d836696a00b258d15a8b337a8c9beb8198a5bd3d5aaf64d660c8005_dump.exeGet hashmaliciousSmokeLoaderBrowse
      • host-data-coin-11.com/
      EF2D1DE8BE7B216F6983BD43D120B512A0917EBE887F30D256ECA8395CE613CC.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • host-data-coin-11.com/
      LisectAVT_2403002B_303.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • aucmoney.com/upload/
      LisectAVT_2403002C_47.exeGet hashmaliciousSmokeLoaderBrowse
      • trad-einmyus.com/index.php
      EF48AEBC0F1E77208BBCD5206C58678BB1181994507D1084E1D324DCA9D5D3B8.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • host-data-coin-11.com/
      E6D881EA9A11D23E31737469C38C5C74DE54ADC680A662D877C6CAB46E3A34AB.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • host-data-coin-11.com/
      D9B72DA68DB9EB3D54BFD70C71F9A07EF222B7D9662DE35E74BA080B473DF4E2.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • host-data-coin-11.com/
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      selebration17io.io987123[1].exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
      • 188.40.141.211
      Vjt694rffx.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
      • 91.215.85.120
      ak55ZgXKwt.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
      • 91.215.85.120
      tZksysDKeT.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
      • 91.215.85.120
      woM8Z8CFYx.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
      • 91.215.85.120
      6t0abj5L0W.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
      • 91.215.85.120
      UUVupNLfBb.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
      • 91.215.85.120
      FNzQAE7DvU.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
      • 91.215.85.120
      Hweat0i2VU.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
      • 91.215.85.120
      c2DmniR687.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
      • 91.215.85.120
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      HETZNER-ASDE53QoH91Zg3.exeGet hashmaliciousUnknownBrowse
      • 88.99.2.111
      7GfciIf7ys.exeGet hashmaliciousUnknownBrowse
      • 213.239.213.220
      2pFytt52ws.exeGet hashmaliciousUnknownBrowse
      • 95.216.22.24
      53QoH91Zg3.exeGet hashmaliciousUnknownBrowse
      • 195.201.62.78
      http://manga-netflix10737.tinyblogging.com.xx3.kz/Get hashmaliciousUnknownBrowse
      • 138.201.139.144
      https://monogogo.info/JQJMLAWN#em=npaladino@bigge.comGet hashmaliciousPhisherBrowse
      • 46.4.15.55
      http://www.lesliehawes.comGet hashmaliciousUnknownBrowse
      • 135.181.16.82
      KKveTTgaAAsecNNaaaa.sh4.elfGet hashmaliciousUnknownBrowse
      • 46.4.110.10
      ExeFile (267).exeGet hashmaliciousEmotetBrowse
      • 195.201.56.70
      ExeFile (27).exeGet hashmaliciousAZORult, PureLog StealerBrowse
      • 168.119.251.131
      No context
      No context
      Process:C:\Windows\explorer.exe
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):240128
      Entropy (8bit):6.731687145851453
      Encrypted:false
      SSDEEP:3072:R7zwL9yI/sBPRA4QCMTRswzIdIzXLEZGs1LCX3B5MPMbynBDm:9zwLJsBP9QbHznkZFcoP
      MD5:64B4AC441E96D0FCA88FB2A62CC170B0
      SHA1:5D111704BFB4A26778BC5BF7F9E13CDA1A53A767
      SHA-256:CB9D1EBC73719F1434F92E6648B4815C01DADEF4761F7CC4E91561CE34DA6346
      SHA-512:5BEC6DA89297D73E3EC7F53658C2006BA84C22776A8F63D80619B7EBE810BDCCB8C729D6CE688C6AB1B1D61A16DC4E08B390C2D401B1C2B913F5DF3107BEB5E9
      Malicious:true
      Antivirus:
      • Antivirus: Avira, Detection: 100%
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: ReversingLabs, Detection: 76%
      • Antivirus: Virustotal, Detection: 75%, Browse
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................................PE..L....8.d.................x...........&............@.................................G...........................................d.... ............................................................@...@............................................text....v.......x.................. ..`.rdata..0T.......V...|..............@..@.data...(%.......R..................@....rsrc....... .......$..............@..@................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\explorer.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:ggPYV:rPYV
      MD5:187F488E27DB4AF347237FE461A079AD
      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
      Malicious:true
      Reputation:high, very likely benign file
      Preview:[ZoneTransfer]....ZoneId=0
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.731687145851453
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.94%
      • Clipper DOS Executable (2020/12) 0.02%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • VXD Driver (31/22) 0.00%
      File name:br0A8E2X6I.exe
      File size:240'128 bytes
      MD5:64b4ac441e96d0fca88fb2a62cc170b0
      SHA1:5d111704bfb4a26778bc5bf7f9e13cda1a53a767
      SHA256:cb9d1ebc73719f1434f92e6648b4815c01dadef4761f7cc4e91561ce34da6346
      SHA512:5bec6da89297d73e3ec7f53658c2006ba84c22776a8f63d80619b7ebe810bdccb8c729d6ce688c6ab1b1d61a16dc4e08b390c2d401b1c2b913f5df3107beb5e9
      SSDEEP:3072:R7zwL9yI/sBPRA4QCMTRswzIdIzXLEZGs1LCX3B5MPMbynBDm:9zwLJsBP9QbHznkZFcoP
      TLSH:4734BF227AF2D0B1D7AB05700973EFA45F7BB87216B4C17F2368076A5E706D08A5A353
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................................................PE..L....8.d...
      Icon Hash:454941415145611d
      Entrypoint:0x40268e
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x64D6388E [Fri Aug 11 13:33:02 2023 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:eb9aaa0ab1d9686972350806b52b7256
      Instruction
      call 00007F8A386D5349h
      jmp 00007F8A386CF47Eh
      sub eax, 000003A4h
      je 00007F8A386CF624h
      sub eax, 04h
      je 00007F8A386CF619h
      sub eax, 0Dh
      je 00007F8A386CF60Eh
      dec eax
      je 00007F8A386CF605h
      xor eax, eax
      ret
      mov eax, 00000404h
      ret
      mov eax, 00000412h
      ret
      mov eax, 00000804h
      ret
      mov eax, 00000411h
      ret
      mov edi, edi
      push esi
      push edi
      mov esi, eax
      push 00000101h
      xor edi, edi
      lea eax, dword ptr [esi+1Ch]
      push edi
      push eax
      call 00007F8A386D3A77h
      xor eax, eax
      movzx ecx, ax
      mov eax, ecx
      mov dword ptr [esi+04h], edi
      mov dword ptr [esi+08h], edi
      mov dword ptr [esi+0Ch], edi
      shl ecx, 10h
      or eax, ecx
      lea edi, dword ptr [esi+10h]
      stosd
      stosd
      stosd
      mov ecx, 0042F030h
      add esp, 0Ch
      lea eax, dword ptr [esi+1Ch]
      sub ecx, esi
      mov edi, 00000101h
      mov dl, byte ptr [ecx+eax]
      mov byte ptr [eax], dl
      inc eax
      dec edi
      jne 00007F8A386CF5F9h
      lea eax, dword ptr [esi+0000011Dh]
      mov esi, 00000100h
      mov dl, byte ptr [eax+ecx]
      mov byte ptr [eax], dl
      inc eax
      dec esi
      jne 00007F8A386CF5F9h
      pop edi
      pop esi
      ret
      mov edi, edi
      push ebp
      mov ebp, esp
      sub esp, 0000051Ch
      mov eax, dword ptr [0042F680h]
      xor eax, ebp
      mov dword ptr [ebp-04h], eax
      push ebx
      push edi
      lea eax, dword ptr [ebp-00000518h]
      push eax
      push dword ptr [esi+04h]
      call dword ptr [004290B8h]
      mov edi, 00000100h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x2daac0x64.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x420000x85d8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x291f00x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d3400x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x290000x19c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x276b60x278005db209e803a85c91701ad3f62731d441False0.7699886273734177data7.422171603883306IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x290000x54300x5600660a9620e92219d42d56655718a88cd9False0.46184593023255816OpenPGP Secret Key5.721873167233637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x2f0000x125280x5200b0614985d36160ae09e7d24167d212c8False0.10589748475609756dBase III DBT, next free block index 75651551.2291133318406493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x420000x85d80x86009d0959a1bbde36f620c99cce020e88dcFalse0.4897971082089552data4.680321239917704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x423900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.5530383795309168
      RT_ICON0x432380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.5699458483754513
      RT_ICON0x43ae00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.5932080924855492
      RT_ICON0x440480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.45518672199170124
      RT_ICON0x465f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.4540337711069418
      RT_ICON0x476980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania0.46024590163934426
      RT_ICON0x480200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.47429078014184395
      RT_STRING0x487280x62cdataRomanianRomania0.4291139240506329
      RT_STRING0x48d580x474dataRomanianRomania0.45263157894736844
      RT_STRING0x491d00x532dataRomanianRomania0.44586466165413535
      RT_STRING0x497080x6c4dataRomanianRomania0.42782909930715934
      RT_STRING0x49dd00x5b8dataRomanianRomania0.4275956284153005
      RT_STRING0x4a3880x24cdataRomanianRomania0.5051020408163265
      RT_ACCELERATOR0x484f00x48dataRomanianRomania0.8472222222222222
      RT_GROUP_ICON0x484880x68dataRomanianRomania0.6923076923076923
      RT_VERSION0x485380x1f0MS Windows COFF PowerPC object file0.5282258064516129
      DLLImport
      KERNEL32.dllGetComputerNameW, GetFileAttributesExA, GetTickCount, FindNextVolumeMountPointA, GetUserDefaultLangID, AssignProcessToJobObject, GetSystemPowerStatus, VerifyVersionInfoA, GetModuleFileNameW, InterlockedExchange, GetLogicalDriveStringsA, GetLastError, GetProcAddress, VirtualAlloc, SetVolumeLabelW, LoadLibraryA, WriteConsoleA, AddConsoleAliasW, MoveFileA, GetNumberFormatW, RemoveDirectoryW, QueryDosDeviceW, GlobalFindAtomW, EnumResourceTypesW, CreateWaitableTimerW, GetConsoleTitleW, VirtualProtect, CompareStringA, DeleteFileW, GetCurrentProcessId, GetFileInformationByHandle, UnregisterWaitEx, GetVolumeInformationW, CreateFileA, LocalAlloc, SetComputerNameW, SetStdHandle, WriteConsoleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleHandleW, Sleep, ExitProcess, GetStartupInfoW, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, HeapFree, WriteFile, GetModuleFileNameA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetSystemTimeAsFileTime, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, RaiseException, RtlUnwind, HeapAlloc, HeapReAlloc, HeapSize, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, CloseHandle, GetConsoleOutputCP
      USER32.dllSetMenu
      GDI32.dllGetCharABCWidthsFloatW
      WINHTTP.dllWinHttpReadData
      Language of compilation systemCountry where language is spokenMap
      RomanianRomania
      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
      2024-08-21T07:11:30.506045+0200TCP2039103ET MALWARE Suspected Smokeloader Activity (POST)14971180192.168.2.5188.40.141.211
      2024-08-21T07:11:30.260968+0200TCP2039103ET MALWARE Suspected Smokeloader Activity (POST)14971180192.168.2.5188.40.141.211
      TimestampSource PortDest PortSource IPDest IP
      Aug 21, 2024 07:11:29.618721962 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:11:29.623701096 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:29.623792887 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:11:29.623975992 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:11:29.624001026 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:11:29.628813982 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:29.628909111 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:30.255297899 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:30.260967970 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:11:30.261007071 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:11:30.266244888 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:30.266457081 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:30.450603008 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:11:30.506045103 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:12:46.255522013 CEST8049711188.40.141.211192.168.2.5
      Aug 21, 2024 07:12:46.255759001 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:12:46.255970001 CEST4971180192.168.2.5188.40.141.211
      Aug 21, 2024 07:12:46.260725021 CEST8049711188.40.141.211192.168.2.5
      TimestampSource PortDest PortSource IPDest IP
      Aug 21, 2024 07:11:29.294415951 CEST6440453192.168.2.51.1.1.1
      Aug 21, 2024 07:11:29.617777109 CEST53644041.1.1.1192.168.2.5
      Aug 21, 2024 07:11:52.698153019 CEST5354607162.159.36.2192.168.2.5
      Aug 21, 2024 07:11:53.154598951 CEST53577301.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 21, 2024 07:11:29.294415951 CEST192.168.2.51.1.1.10xf85bStandard query (0)selebration17io.ioA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 21, 2024 07:11:29.617777109 CEST1.1.1.1192.168.2.50xf85bNo error (0)selebration17io.io188.40.141.211A (IP address)IN (0x0001)false
      • jynwoplqqkht.com
        • selebration17io.io
      • smiodprqlvtv.net
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.549711188.40.141.211801028C:\Windows\explorer.exe
      TimestampBytes transferredDirectionData
      Aug 21, 2024 07:11:29.623975992 CEST284OUTPOST /index.php HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      Accept: */*
      Referer: http://jynwoplqqkht.com/
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
      Content-Length: 235
      Host: selebration17io.io
      Aug 21, 2024 07:11:29.624001026 CEST235OUTData Raw: 48 9d 89 cc 48 67 59 50 58 70 55 55 78 a8 53 be 5c 6d 9e 66 ff 1e ad af b6 19 ab f7 0b f2 d6 97 fc aa 81 b1 72 32 e5 c4 a7 5b 6a 75 80 82 f6 0f 8e 22 2e 42 00 86 3b 7d ef 83 66 87 fe 3d be f5 42 21 9b c6 a1 19 ba 8a 14 62 cc d6 4f 96 8b a4 20 f1
      Data Ascii: HHgYPXpUUxS\mfr2[ju".B;}f=B!bO !~%UuW]XP3[w\w7f-zb67IgQ%B<#[w&QCwf-4F!?2MV<D,DNqs$-gcY+,
      Aug 21, 2024 07:11:30.255297899 CEST151INHTTP/1.1 404 Not Found
      Server: nginx/1.18.0
      Content-Length: 7
      Content-Type: application/octet-stream
      Date: Wed, 21 Aug 2024 05:11:30 GMT
      Data Raw: 03 00 00 00 1f 3d 19
      Data Ascii: =
      Aug 21, 2024 07:11:30.260967970 CEST284OUTPOST /index.php HTTP/1.1
      Connection: Keep-Alive
      Content-Type: application/x-www-form-urlencoded
      Accept: */*
      Referer: http://smiodprqlvtv.net/
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
      Content-Length: 316
      Host: selebration17io.io
      Aug 21, 2024 07:11:30.261007071 CEST316OUTData Raw: 48 9d 89 cc 48 67 59 50 58 70 55 55 78 a8 53 be 5c 6d 9e 66 ff 1e ad af b6 19 ab f7 0b f2 d6 97 fc aa 81 b1 72 32 e5 c4 a7 5b 6a 75 80 82 f6 0f 8e 22 2e 42 00 86 3b 7d ef 83 66 87 fe 3d be f5 42 21 9b c6 a2 19 c8 8a 14 62 cd d6 4f 96 ef fb 3d c2
      Data Ascii: HHgYPXpUUxS\mfr2[ju".B;}f=B!bO=w%$N*jgA_7q51u#O<lzV46jW)v&JyOR-o*4?-=F=\RW@a~7V)ar
      Aug 21, 2024 07:11:30.450603008 CEST144INHTTP/1.1 404 Not Found
      Server: nginx/1.18.0
      Content-Length: 0
      Content-Type: application/octet-stream
      Date: Wed, 21 Aug 2024 05:11:30 GMT


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:01:11:03
      Start date:21/08/2024
      Path:C:\Users\user\Desktop\br0A8E2X6I.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\br0A8E2X6I.exe"
      Imagebase:0x400000
      File size:240'128 bytes
      MD5 hash:64B4AC441E96D0FCA88FB2A62CC170B0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2097598650.0000000000510000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2097653376.0000000000541000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:01:11:09
      Start date:21/08/2024
      Path:C:\Windows\explorer.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\Explorer.EXE
      Imagebase:0x7ff674740000
      File size:5'141'208 bytes
      MD5 hash:662F4F92FDE3557E86D110526BB578D5
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:6.6%
        Dynamic/Decrypted Code Coverage:33.3%
        Signature Coverage:59.5%
        Total number of Nodes:84
        Total number of Limit Nodes:3
        execution_graph 4487 401561 4488 401570 4487->4488 4489 4018dd 4488->4489 4490 401608 NtDuplicateObject 4488->4490 4490->4489 4491 401625 NtCreateSection 4490->4491 4492 4016a5 NtCreateSection 4491->4492 4493 40164b NtMapViewOfSection 4491->4493 4492->4489 4495 4016d1 4492->4495 4493->4492 4494 40166e NtMapViewOfSection 4493->4494 4494->4492 4496 40168c 4494->4496 4495->4489 4497 4016db NtMapViewOfSection 4495->4497 4496->4492 4497->4489 4498 401702 NtMapViewOfSection 4497->4498 4498->4489 4499 401724 4498->4499 4499->4489 4500 401729 3 API calls 4499->4500 4500->4489 4547 4f092b GetPEB 4548 4f0972 4547->4548 4409 403005 4410 40315c 4409->4410 4411 40302f 4409->4411 4411->4410 4412 4030ea RtlCreateUserThread NtTerminateProcess 4411->4412 4412->4410 4459 402e07 4461 402e1a 4459->4461 4460 40193e 11 API calls 4462 402f54 4460->4462 4461->4460 4461->4462 4475 40194a 4476 40194f 4475->4476 4477 401991 Sleep 4476->4477 4478 4019ac 4477->4478 4479 401553 10 API calls 4478->4479 4480 4019bd 4478->4480 4479->4480 4390 4f003c 4391 4f0049 4390->4391 4403 4f0e0f SetErrorMode SetErrorMode 4391->4403 4396 4f0265 4397 4f02ce VirtualProtect 4396->4397 4399 4f030b 4397->4399 4398 4f0439 VirtualFree 4400 4f04be LoadLibraryA 4398->4400 4399->4398 4402 4f08c7 4400->4402 4404 4f0223 4403->4404 4405 4f0d90 4404->4405 4406 4f0dad 4405->4406 4407 4f0dbb GetPEB 4406->4407 4408 4f0238 VirtualAlloc 4406->4408 4407->4408 4408->4396 4413 5f44a8 4414 5f44b7 4413->4414 4417 5f4c48 4414->4417 4422 5f4c63 4417->4422 4418 5f4c6c CreateToolhelp32Snapshot 4419 5f4c88 Module32First 4418->4419 4418->4422 4420 5f4c97 4419->4420 4423 5f44c0 4419->4423 4424 5f4907 4420->4424 4422->4418 4422->4419 4425 5f4932 4424->4425 4426 5f497b 4425->4426 4427 5f4943 VirtualAlloc 4425->4427 4426->4426 4427->4426 4428 402eba 4429 402ecc 4428->4429 4431 402f54 4429->4431 4432 40193e 4429->4432 4433 40194f 4432->4433 4434 401991 Sleep 4433->4434 4435 4019ac 4434->4435 4437 4019bd 4435->4437 4438 401553 4435->4438 4437->4431 4439 401563 4438->4439 4440 401608 NtDuplicateObject 4439->4440 4450 4018dd 4439->4450 4441 401625 NtCreateSection 4440->4441 4440->4450 4442 4016a5 NtCreateSection 4441->4442 4443 40164b NtMapViewOfSection 4441->4443 4445 4016d1 4442->4445 4442->4450 4443->4442 4444 40166e NtMapViewOfSection 4443->4444 4444->4442 4446 40168c 4444->4446 4447 4016db NtMapViewOfSection 4445->4447 4445->4450 4446->4442 4448 401702 NtMapViewOfSection 4447->4448 4447->4450 4449 401724 4448->4449 4448->4450 4449->4450 4452 401729 4449->4452 4450->4437 4453 40172b 4452->4453 4458 401724 4452->4458 4454 4016be NtCreateSection 4453->4454 4453->4458 4455 4016d1 4454->4455 4454->4458 4456 4016db NtMapViewOfSection 4455->4456 4455->4458 4457 401702 NtMapViewOfSection 4456->4457 4456->4458 4457->4458 4458->4450

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 85 401553-4015b2 call 4011cd 97 4015b4 85->97 98 4015b7-4015bc 85->98 97->98 100 4015c2-4015d3 98->100 101 4018df-4018e7 98->101 104 4015d9-401602 100->104 105 4018dd 100->105 101->98 106 4018ec-40193b call 4011cd 101->106 104->105 113 401608-40161f NtDuplicateObject 104->113 105->106 113->105 116 401625-401649 NtCreateSection 113->116 118 4016a5-4016cb NtCreateSection 116->118 119 40164b-40166c NtMapViewOfSection 116->119 118->105 122 4016d1-4016d5 118->122 119->118 120 40166e-40168a NtMapViewOfSection 119->120 120->118 124 40168c-4016a2 120->124 122->105 125 4016db-4016fc NtMapViewOfSection 122->125 124->118 125->105 127 401702-40171e NtMapViewOfSection 125->127 127->105 128 401724 127->128 128->105 131 401724 call 401729 128->131 131->105
        APIs
        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401667
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401685
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create$DuplicateObject
        • String ID:
        • API String ID: 1546783058-0
        • Opcode ID: 1cdcbea8673e3ba493c5bd81f578c50c028e74630b806944f59cf8ede5196817
        • Instruction ID: ffaca3094f7e189a6d1e876f152d3a102a579446f97b5118db7f8e4db1241ca1
        • Opcode Fuzzy Hash: 1cdcbea8673e3ba493c5bd81f578c50c028e74630b806944f59cf8ede5196817
        • Instruction Fuzzy Hash: FB613075A00204FBEB209F91CC49FAF7BB8EF85700F10412AF912BA1E5D7759941DB66

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 132 40156b-4015b2 call 4011cd 144 4015b4 132->144 145 4015b7-4015bc 132->145 144->145 147 4015c2-4015d3 145->147 148 4018df-4018e7 145->148 151 4015d9-401602 147->151 152 4018dd 147->152 148->145 153 4018ec-40193b call 4011cd 148->153 151->152 160 401608-40161f NtDuplicateObject 151->160 152->153 160->152 163 401625-401649 NtCreateSection 160->163 165 4016a5-4016cb NtCreateSection 163->165 166 40164b-40166c NtMapViewOfSection 163->166 165->152 169 4016d1-4016d5 165->169 166->165 167 40166e-40168a NtMapViewOfSection 166->167 167->165 171 40168c-4016a2 167->171 169->152 172 4016db-4016fc NtMapViewOfSection 169->172 171->165 172->152 174 401702-40171e NtMapViewOfSection 172->174 174->152 175 401724 174->175 175->152 178 401724 call 401729 175->178 178->152
        APIs
        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401667
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401685
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create$DuplicateObject
        • String ID:
        • API String ID: 1546783058-0
        • Opcode ID: c2bbe74deda3eb27cc46c97da06047b5daec93b008bb2466c6e516ff61897217
        • Instruction ID: bfc0b8c1e1aad88884ae744cc722ee3a04b4b25e2f03b0569bf5ee1b63965b96
        • Opcode Fuzzy Hash: c2bbe74deda3eb27cc46c97da06047b5daec93b008bb2466c6e516ff61897217
        • Instruction Fuzzy Hash: 34512B75900205BBEB209F91CC49FAF7BB8FF85B00F14412AF912BA2E5D7759941CB25

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 179 401561-4015b2 call 4011cd 189 4015b4 179->189 190 4015b7-4015bc 179->190 189->190 192 4015c2-4015d3 190->192 193 4018df-4018e7 190->193 196 4015d9-401602 192->196 197 4018dd 192->197 193->190 198 4018ec-40193b call 4011cd 193->198 196->197 205 401608-40161f NtDuplicateObject 196->205 197->198 205->197 208 401625-401649 NtCreateSection 205->208 210 4016a5-4016cb NtCreateSection 208->210 211 40164b-40166c NtMapViewOfSection 208->211 210->197 214 4016d1-4016d5 210->214 211->210 212 40166e-40168a NtMapViewOfSection 211->212 212->210 216 40168c-4016a2 212->216 214->197 217 4016db-4016fc NtMapViewOfSection 214->217 216->210 217->197 219 401702-40171e NtMapViewOfSection 217->219 219->197 220 401724 219->220 220->197 223 401724 call 401729 220->223 223->197
        APIs
        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401667
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401685
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create$DuplicateObject
        • String ID:
        • API String ID: 1546783058-0
        • Opcode ID: f5d4f3e6d24d18269c7d341504c2ba3eacb72c3278c0acdc5b4cfb2713eaeaae
        • Instruction ID: 412e9309e7daddaa9b19f32dddfbffbd79934f2f1d3bc440b9a7152e2b53a84f
        • Opcode Fuzzy Hash: f5d4f3e6d24d18269c7d341504c2ba3eacb72c3278c0acdc5b4cfb2713eaeaae
        • Instruction Fuzzy Hash: 235119B1900205BFEB209F91CC49FAF7BB8EF85B00F14412AF912BA2E5D7759941CB25

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 224 40156f-4015b2 call 4011cd 232 4015b4 224->232 233 4015b7-4015bc 224->233 232->233 235 4015c2-4015d3 233->235 236 4018df-4018e7 233->236 239 4015d9-401602 235->239 240 4018dd 235->240 236->233 241 4018ec-40193b call 4011cd 236->241 239->240 248 401608-40161f NtDuplicateObject 239->248 240->241 248->240 251 401625-401649 NtCreateSection 248->251 253 4016a5-4016cb NtCreateSection 251->253 254 40164b-40166c NtMapViewOfSection 251->254 253->240 257 4016d1-4016d5 253->257 254->253 255 40166e-40168a NtMapViewOfSection 254->255 255->253 259 40168c-4016a2 255->259 257->240 260 4016db-4016fc NtMapViewOfSection 257->260 259->253 260->240 262 401702-40171e NtMapViewOfSection 260->262 262->240 263 401724 262->263 263->240 266 401724 call 401729 263->266 266->240
        APIs
        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401667
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401685
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create$DuplicateObject
        • String ID:
        • API String ID: 1546783058-0
        • Opcode ID: 8d7d0f05522378b87eb0e5b73b0488eef97448bc713828db65d76f104e18ff93
        • Instruction ID: 5723072b253cbae10e330d7def6e8ce5ab34414c0c11206194204dab9df800f9
        • Opcode Fuzzy Hash: 8d7d0f05522378b87eb0e5b73b0488eef97448bc713828db65d76f104e18ff93
        • Instruction Fuzzy Hash: 6A5109B1900205BBEB209F91CC49FAF7BB8EF85B00F144129FA11BA2E5D6759945CB24

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 267 401583-4015b2 call 4011cd 276 4015b4 267->276 277 4015b7-4015bc 267->277 276->277 279 4015c2-4015d3 277->279 280 4018df-4018e7 277->280 283 4015d9-401602 279->283 284 4018dd 279->284 280->277 285 4018ec-40193b call 4011cd 280->285 283->284 292 401608-40161f NtDuplicateObject 283->292 284->285 292->284 295 401625-401649 NtCreateSection 292->295 297 4016a5-4016cb NtCreateSection 295->297 298 40164b-40166c NtMapViewOfSection 295->298 297->284 301 4016d1-4016d5 297->301 298->297 299 40166e-40168a NtMapViewOfSection 298->299 299->297 303 40168c-4016a2 299->303 301->284 304 4016db-4016fc NtMapViewOfSection 301->304 303->297 304->284 306 401702-40171e NtMapViewOfSection 304->306 306->284 307 401724 306->307 307->284 310 401724 call 401729 307->310 310->284
        APIs
        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401667
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401685
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create$DuplicateObject
        • String ID:
        • API String ID: 1546783058-0
        • Opcode ID: bd72895939b5cf7358d34c5469aba93b22efce73c39120c4875d5ae9870c0d64
        • Instruction ID: be4f3395432beacb56dc40f225edc855b7308e08cbc6b66c5e1fe0de6445bc19
        • Opcode Fuzzy Hash: bd72895939b5cf7358d34c5469aba93b22efce73c39120c4875d5ae9870c0d64
        • Instruction Fuzzy Hash: D6510BB1900205BBEB209F91CC49FAF7BB8EF85B00F14412AFA11BA2E5D7759945CB64

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 311 401587-4015b2 call 4011cd 315 4015b4 311->315 316 4015b7-4015bc 311->316 315->316 318 4015c2-4015d3 316->318 319 4018df-4018e7 316->319 322 4015d9-401602 318->322 323 4018dd 318->323 319->316 324 4018ec-40193b call 4011cd 319->324 322->323 331 401608-40161f NtDuplicateObject 322->331 323->324 331->323 334 401625-401649 NtCreateSection 331->334 336 4016a5-4016cb NtCreateSection 334->336 337 40164b-40166c NtMapViewOfSection 334->337 336->323 340 4016d1-4016d5 336->340 337->336 338 40166e-40168a NtMapViewOfSection 337->338 338->336 342 40168c-4016a2 338->342 340->323 343 4016db-4016fc NtMapViewOfSection 340->343 342->336 343->323 345 401702-40171e NtMapViewOfSection 343->345 345->323 346 401724 345->346 346->323 349 401724 call 401729 346->349 349->323
        APIs
        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401667
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401685
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create$DuplicateObject
        • String ID:
        • API String ID: 1546783058-0
        • Opcode ID: 1ec31b479fd08731287e8d0e55fe4d339ef2a67852c713b723290c7befe848b2
        • Instruction ID: c9324331886a871ff7b65cfc1a3adde32c11ca3f72b54674233341407885f4d3
        • Opcode Fuzzy Hash: 1ec31b479fd08731287e8d0e55fe4d339ef2a67852c713b723290c7befe848b2
        • Instruction Fuzzy Hash: 7E511A71900249BBEB209F91CC48FEF7BB8EF85B00F144169F911AA2E5D7759945CB24

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 350 401729 351 40172b 350->351 352 40172f-40174d 350->352 351->352 353 40172d 351->353 364 401764 352->364 365 401755-401778 352->365 353->352 355 4016be-4016cb NtCreateSection 353->355 358 4016d1-4016d5 355->358 359 4018dd-40193b call 4011cd 355->359 358->359 362 4016db-4016fc NtMapViewOfSection 358->362 362->359 366 401702-40171e NtMapViewOfSection 362->366 364->365 376 40177b-4017b8 365->376 366->359 367 401724 366->367 367->359 370 401724 call 401729 367->370 370->359 392 4017ba-4017e3 376->392 397 4017e5-4017eb 392->397 398 4017ed 392->398 399 4017f3-4017f9 397->399 398->399 400 401809-40180d 399->400 401 4017fb-401807 399->401 400->399 402 40180f-401814 400->402 401->400 403 401816 call 40181b 402->403 404 40187c-40188b 402->404 405 40188e-401891 404->405 407 401893-40189d 405->407 408 4018bb-4018d4 405->408 409 4018a0-4018a9 407->409 408->359 410 4018b7 409->410 411 4018ab-4018b5 409->411 410->409 412 4018b9 410->412 411->410 412->405
        APIs
        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016C6
        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016F7
        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401719
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: Section$View$Create
        • String ID:
        • API String ID: 33071139-0
        • Opcode ID: b6b7661ceeaa473891237c732f5305db374e8f07cd43916073c5c2763a81e662
        • Instruction ID: bb29a515743844fa426f6922f48e3936f90c9c278b9ffb8c9c9d974ad6050a99
        • Opcode Fuzzy Hash: b6b7661ceeaa473891237c732f5305db374e8f07cd43916073c5c2763a81e662
        • Instruction Fuzzy Hash: 69519272904104EBEB249A55CC44FAA77B5FF85700F24813BE842772F0D67C6942E65B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 413 403005-403029 414 40315c-403161 413->414 415 40302f-403047 413->415 415->414 416 40304d-40305e 415->416 417 403060-403069 416->417 418 40306e-40307c 417->418 418->418 419 40307e-403085 418->419 420 4030a7-4030ae 419->420 421 403087-4030a6 419->421 422 4030d0-4030d3 420->422 423 4030b0-4030cf 420->423 421->420 424 4030d5-4030d8 422->424 425 4030dc 422->425 423->422 424->425 426 4030da 424->426 425->417 427 4030de-4030e3 425->427 426->427 427->414 428 4030e5-4030e8 427->428 428->414 429 4030ea-403159 RtlCreateUserThread NtTerminateProcess 428->429 429->414
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateProcessTerminateThreadUser
        • String ID:
        • API String ID: 1921587553-0
        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
        • Instruction ID: 9349ae55c142a47270c9c73eabb89239111d3cd47c98212c67b606f4e0ccd907
        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
        • Instruction Fuzzy Hash: C5412531218E088FD7A8EF6CA88576377D5F798311F6643AAE809D3389EA34DC5187C5

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 430 5f4c48-5f4c61 431 5f4c63-5f4c65 430->431 432 5f4c6c-5f4c78 CreateToolhelp32Snapshot 431->432 433 5f4c67 431->433 434 5f4c7a-5f4c80 432->434 435 5f4c88-5f4c95 Module32First 432->435 433->432 434->435 440 5f4c82-5f4c86 434->440 436 5f4c9e-5f4ca6 435->436 437 5f4c97-5f4c98 call 5f4907 435->437 441 5f4c9d 437->441 440->431 440->435 441->436
        APIs
        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005F4C70
        • Module32First.KERNEL32(00000000,00000224), ref: 005F4C90
        Memory Dump Source
        • Source File: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, Offset: 005EE000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_5ee000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID: CreateFirstModule32SnapshotToolhelp32
        • String ID:
        • API String ID: 3833638111-0
        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
        • Instruction ID: 8e48648d00941eaf4401a52e74464d3554647b0e6f455bba0e1092ad6e64a005
        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
        • Instruction Fuzzy Hash: B3F06D322017196BD7203BF9A98DA7F7AECBF89724F101529F746924C0DBB8EC454A61

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 4f003c-4f0047 1 4f004c-4f0263 call 4f0a3f call 4f0e0f call 4f0d90 VirtualAlloc 0->1 2 4f0049 0->2 17 4f028b-4f0292 1->17 18 4f0265-4f0289 call 4f0a69 1->18 2->1 20 4f02a1-4f02b0 17->20 22 4f02ce-4f03c2 VirtualProtect call 4f0cce call 4f0ce7 18->22 20->22 23 4f02b2-4f02cc 20->23 29 4f03d1-4f03e0 22->29 23->20 30 4f0439-4f04b8 VirtualFree 29->30 31 4f03e2-4f0437 call 4f0ce7 29->31 33 4f04be-4f04cd 30->33 34 4f05f4-4f05fe 30->34 31->29 36 4f04d3-4f04dd 33->36 37 4f077f-4f0789 34->37 38 4f0604-4f060d 34->38 36->34 40 4f04e3-4f0505 36->40 41 4f078b-4f07a3 37->41 42 4f07a6-4f07b0 37->42 38->37 43 4f0613-4f0637 38->43 52 4f0517-4f0520 40->52 53 4f0507-4f0515 40->53 41->42 44 4f086e-4f08be LoadLibraryA 42->44 45 4f07b6-4f07cb 42->45 46 4f063e-4f0648 43->46 51 4f08c7-4f08f9 44->51 48 4f07d2-4f07d5 45->48 46->37 49 4f064e-4f065a 46->49 54 4f07d7-4f07e0 48->54 55 4f0824-4f0833 48->55 49->37 50 4f0660-4f066a 49->50 56 4f067a-4f0689 50->56 58 4f08fb-4f0901 51->58 59 4f0902-4f091d 51->59 60 4f0526-4f0547 52->60 53->60 61 4f07e4-4f0822 54->61 62 4f07e2 54->62 57 4f0839-4f083c 55->57 63 4f068f-4f06b2 56->63 64 4f0750-4f077a 56->64 57->44 65 4f083e-4f0847 57->65 58->59 66 4f054d-4f0550 60->66 61->48 62->55 69 4f06ef-4f06fc 63->69 70 4f06b4-4f06ed 63->70 64->46 71 4f084b-4f086c 65->71 72 4f0849 65->72 67 4f0556-4f056b 66->67 68 4f05e0-4f05ef 66->68 74 4f056f-4f057a 67->74 75 4f056d 67->75 68->36 76 4f06fe-4f0748 69->76 77 4f074b 69->77 70->69 71->57 72->44 78 4f057c-4f0599 74->78 79 4f059b-4f05bb 74->79 75->68 76->77 77->56 84 4f05bd-4f05db 78->84 79->84 84->66
        APIs
        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 004F024D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4f0000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID: AllocVirtual
        • String ID: cess$kernel32.dll
        • API String ID: 4275171209-1230238691
        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
        • Instruction ID: 83880b094ae64c264b2fc075c34aefdff4589c7d83e42e366babc69d92f96334
        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
        • Instruction Fuzzy Hash: 6E527A74A01229DFDB64CF58C984BA9BBB1BF09304F1480DAE50DAB352DB34AE85DF15

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 443 4f0e0f-4f0e24 SetErrorMode * 2 444 4f0e2b-4f0e2c 443->444 445 4f0e26 443->445 445->444
        APIs
        • SetErrorMode.KERNELBASE(00000400,?,?,004F0223,?,?), ref: 004F0E19
        • SetErrorMode.KERNELBASE(00000000,?,?,004F0223,?,?), ref: 004F0E1E
        Memory Dump Source
        • Source File: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4f0000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID: ErrorMode
        • String ID:
        • API String ID: 2340568224-0
        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
        • Instruction ID: 0f54c85112c70c8300c1c69f5b337ed9408a1e8e4429274e0b8fc5c206ebf4b7
        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
        • Instruction Fuzzy Hash: 37D0123154512CB7D7002A94DC09BDE7B1CDF05B62F008411FB0DD9181C774994046E9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 446 40193e-401947 447 40195e 446->447 448 40194f-40195a 446->448 447->448 449 401961-4019ae call 4011cd Sleep call 401452 447->449 448->449 460 4019b0-4019b8 call 401553 449->460 461 4019bd-401a03 call 4011cd 449->461 460->461
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: 71f746a8505fe108ed8da4cdd9973d259565c9a68103dfaed9332816d2b6fe75
        • Instruction ID: 4db8ba0b08380255fc5aa34ea3e13561f838480f888933e927f1079a64c57490
        • Opcode Fuzzy Hash: 71f746a8505fe108ed8da4cdd9973d259565c9a68103dfaed9332816d2b6fe75
        • Instruction Fuzzy Hash: 9A11CEF120C208FBEB006A959D62E7A3268AB40714F304137BA43790F1D57E8923F76B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 475 40194a-4019ae call 4011cd Sleep call 401452 488 4019b0-4019b8 call 401553 475->488 489 4019bd-401a03 call 4011cd 475->489 488->489
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: da38201a32f90b98934b488a65b371e434f1df0c2a04d29242935d2455de016b
        • Instruction ID: 0371ecd990254dd767a604aa567081474727263e4e3774a05daf7e54a603023c
        • Opcode Fuzzy Hash: da38201a32f90b98934b488a65b371e434f1df0c2a04d29242935d2455de016b
        • Instruction Fuzzy Hash: A901A1B120C204EBDB009A95DD62E7A3364AB40314F30453BBA437A1F1C67D9913E72B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 503 40195c-4019ae call 4011cd Sleep call 401452 515 4019b0-4019b8 call 401553 503->515 516 4019bd-401a03 call 4011cd 503->516 515->516
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: 5e3dbe5dd20a4fb5b92f76c9b13fda5f390ba4e8200e1751a23b03b4d52e4fb4
        • Instruction ID: 3b2e7dc224df146109f963d95c0ead7a9e1b698bafe8296883a7ac19869aede1
        • Opcode Fuzzy Hash: 5e3dbe5dd20a4fb5b92f76c9b13fda5f390ba4e8200e1751a23b03b4d52e4fb4
        • Instruction Fuzzy Hash: BA0171B5208204EADB006AD5DD71E7A3269AB44314F304537BA43791F1D57D8912F72B

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 530 401973-4019ae call 4011cd Sleep call 401452 541 4019b0-4019b8 call 401553 530->541 542 4019bd-401a03 call 4011cd 530->542 541->542
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: acb1fae293eb73a10805bbdd55e216ebbc49928181db8483aeacc3243d44ee5b
        • Instruction ID: 4b03b50232763afd30ab0c608f125a1a80ed78bb00471cf4ed55e3bed959d7b6
        • Opcode Fuzzy Hash: acb1fae293eb73a10805bbdd55e216ebbc49928181db8483aeacc3243d44ee5b
        • Instruction Fuzzy Hash: F80184B5208204EBDB006AD5DD71EBA3269AB44354F304537BA43790F1C57D8912F72B
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: e5353c19dd0b10c2d892503bd00f36fba5e3f507ee708bcba0cfbdc82fbef293
        • Instruction ID: f592bab324d3cd5d6286c78059ef0a1e8702b22de7bd53a4ec4d5e19e7ef6e8c
        • Opcode Fuzzy Hash: e5353c19dd0b10c2d892503bd00f36fba5e3f507ee708bcba0cfbdc82fbef293
        • Instruction Fuzzy Hash: 0D0184B5208204EBDB006AC5DD62EBA3265AB44314F204537FA43791F1C57D8912F72B
        APIs
        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005F4958
        Memory Dump Source
        • Source File: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, Offset: 005EE000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_5ee000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
        • Instruction ID: 085c0f954417309b83168f673c5e81fdb1f8666071698826cd6e0a9a711028de
        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
        • Instruction Fuzzy Hash: 29113279A00208EFDB01DF98C985E99BFF5AF08350F058094FA489B361D375EA50DF40
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: 74fb996ba95ec06bb2abe22af5600ab9efc13f551b73dbf86f34961914988ff4
        • Instruction ID: 68c2b1bb8267a16b47d2b790190fa602822f098e0b694be4ddc2e306b3be1968
        • Opcode Fuzzy Hash: 74fb996ba95ec06bb2abe22af5600ab9efc13f551b73dbf86f34961914988ff4
        • Instruction Fuzzy Hash: 2AF086B5208204FADB006BD59D61EBA3768AB44354F204137BA13790F1C57D8912F72B
        APIs
        • Sleep.KERNELBASE(00001388,0000006E), ref: 00401999
          • Part of subcall function 00401553: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401617
          • Part of subcall function 00401553: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401644
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID: CreateDuplicateObjectSectionSleep
        • String ID:
        • API String ID: 4152845823-0
        • Opcode ID: f19d6598d7b3f8bbc47500c90c3d0bc6a0ede41a7b6f28d3ccddc132527cc834
        • Instruction ID: 49220a4dcaca44086484813bdb512237367292e15b320859d1a96440f4f24ef4
        • Opcode Fuzzy Hash: f19d6598d7b3f8bbc47500c90c3d0bc6a0ede41a7b6f28d3ccddc132527cc834
        • Instruction Fuzzy Hash: 7801A7B1208244FBDB016BD19D62EB93768AB05354F204537FA53790F2C67D8912E72B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4f0000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID: .$GetProcAddress.$l
        • API String ID: 0-2784972518
        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
        • Instruction ID: ee8d9548c56cb374e40298a9480588cf3b25a9a1b09fae618662e7862dfbde42
        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
        • Instruction Fuzzy Hash: E3316EB6900609DFDB10CF99C880AAEBBF5FF48324F54404AD541A7312D7B5EA45CFA4
        Memory Dump Source
        • Source File: 00000000.00000002.2097732029.00000000005EE000.00000040.00000020.00020000.00000000.sdmp, Offset: 005EE000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_5ee000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
        • Instruction ID: 5ee4f932e13bde47adf8f9d2f2b3a21610db4a8b08f504854693dfd7722b8a26
        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
        • Instruction Fuzzy Hash: 6C1170723401049FD744DE55DC91EB777EAFB89320B298165EA08CB315D679EC02CB60
        Memory Dump Source
        • Source File: 00000000.00000002.2097560647.00000000004F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004F0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_4f0000_br0A8E2X6I.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
        • Instruction ID: 2b3fd6cf4533f3a8e818fb1884d4457831b369b992358946cb87bab4cba5e53e
        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
        • Instruction Fuzzy Hash: 3701A7766016088FDF21CF64C904BBB33E5FBD6316F4544A6DA0697342E778A9418B94
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c0f638128aba8f2e57abeaf16cd5152cf31c34a5a8aefa37a689e9950b3c5785
        • Instruction ID: d35cd02017a8908298582cacd0956aff43537afd2df8e264233619bb44fb754d
        • Opcode Fuzzy Hash: c0f638128aba8f2e57abeaf16cd5152cf31c34a5a8aefa37a689e9950b3c5785
        • Instruction Fuzzy Hash: 82C08C72D960008AE65BC6908A87644BB33F003830B341F2DC5018F126D272C2178220
        Memory Dump Source
        • Source File: 00000000.00000002.2097324360.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_br0A8E2X6I.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 43de6de374997940977aed32f8962cbc5b01e7d76103009d4fd772cc687ca080
        • Instruction ID: b8708e0fd601c17419c4bee628408aeaf70cc106fe2e9d70b960fe5b7e9fb35e
        • Opcode Fuzzy Hash: 43de6de374997940977aed32f8962cbc5b01e7d76103009d4fd772cc687ca080
        • Instruction Fuzzy Hash: 0DC02B7308020940C754CE701A0010CF2D09555208F31FD234005FF182D260F1C755C2

        Execution Graph

        Execution Coverage:44.8%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:9.1%
        Total number of Nodes:110
        Total number of Limit Nodes:9
        execution_graph 1151 1121a35 1152 1121a3a 1151->1152 1155 1121aa8 1152->1155 1165 1121af8 1155->1165 1158 1121a9b 1159 1121ac3 SleepEx 1159->1159 1160 1121ad3 1159->1160 1172 11222ec 1160->1172 1166 1121b2f 1165->1166 1167 1121aba 1166->1167 1168 1121bf8 RtlCreateHeap 1166->1168 1167->1158 1167->1159 1169 1121c29 1168->1169 1169->1167 1170 1121da8 CreateThread 1169->1170 1171 1121dd9 CreateThread 1170->1171 1192 1123d1c 1170->1192 1171->1167 1189 1123df8 1171->1189 1173 112230a 1172->1173 1198 1124b68 1173->1198 1175 1121ae8 1176 1121eb4 1175->1176 1204 1124db8 1176->1204 1178 1121eef 1179 1121f20 CreateMutexExA 1178->1179 1180 1121f3a 1179->1180 1208 1124f28 1180->1208 1182 1121f79 1213 112202c 1182->1213 1187 1121fe6 1225 1122394 1187->1225 1231 1122df8 1187->1231 1190 1123e0a EnumWindows SleepEx 1189->1190 1191 1123e2e 1189->1191 1190->1190 1190->1191 1193 1123dd3 1192->1193 1194 1123d39 CreateToolhelp32Snapshot 1192->1194 1195 1123dbb SleepEx 1194->1195 1196 1123d4d Process32First 1194->1196 1195->1193 1195->1194 1197 1123d65 1196->1197 1197->1195 1199 1124b91 1198->1199 1200 1124ba5 GetTokenInformation 1199->1200 1203 1124c02 1199->1203 1201 1124bd0 1200->1201 1202 1124bda GetTokenInformation 1201->1202 1202->1203 1203->1175 1205 1124de5 GetVolumeInformationA 1204->1205 1207 1124e38 1205->1207 1207->1178 1211 1124f4a 1208->1211 1209 1125006 ObtainUserAgentString 1209->1182 1210 1124f8b RegQueryValueExA 1210->1211 1211->1210 1212 1124fde 1211->1212 1212->1209 1215 112204f 1213->1215 1214 1121fa5 CreateFileMappingA 1214->1187 1215->1214 1216 1122166 1215->1216 1217 11220b3 DeleteFileW CopyFileW 1215->1217 1234 11235b8 1216->1234 1217->1214 1218 11220d3 DeleteFileW 1217->1218 1221 11220e9 1218->1221 1220 1122183 CreateFileW 1220->1214 1222 112211e DeleteFileW 1221->1222 1223 1122132 1222->1223 1238 1124a48 1223->1238 1226 11223c5 1225->1226 1243 1123414 CreateFileW 1226->1243 1228 11223da 1245 1122434 1228->1245 1230 11223eb 1230->1187 1232 1123414 CreateFileW 1231->1232 1233 1122e1b 1232->1233 1233->1187 1235 11235d9 1234->1235 1236 11235f9 GetUserNameW 1235->1236 1237 112361a 1236->1237 1237->1220 1239 1124a6f 1238->1239 1240 1124a8f SetFileAttributesW CreateFileW 1239->1240 1241 1124ada SetFileTime 1240->1241 1242 1124afb 1241->1242 1242->1216 1244 1123469 1243->1244 1244->1228 1269 1123f08 1245->1269 1247 11226e0 1250 112277f 1247->1250 1251 1122821 1247->1251 1263 11226f8 1247->1263 1248 11228c5 1249 1123f08 2 API calls 1248->1249 1255 11228ec 1249->1255 1253 1122794 DeleteFileW DeleteFileW 1250->1253 1264 1122884 1250->1264 1252 1123f08 2 API calls 1251->1252 1258 1122848 1252->1258 1254 11227b6 1253->1254 1257 1123f08 2 API calls 1254->1257 1256 1122968 2 API calls 1255->1256 1255->1264 1256->1264 1259 11227e0 1257->1259 1260 1122968 2 API calls 1258->1260 1258->1264 1262 11227fd SleepEx RtlExitUserThread 1259->1262 1260->1264 1261 1123f08 2 API calls 1261->1263 1262->1264 1263->1250 1263->1261 1263->1264 1273 1122968 1263->1273 1264->1230 1266 1122487 1266->1264 1267 1124a48 3 API calls 1266->1267 1268 11226bc 1266->1268 1267->1268 1268->1247 1268->1248 1270 1123f37 1269->1270 1279 11240a4 1270->1279 1272 1124057 1272->1266 1274 1122971 1273->1274 1276 1122d8b 1273->1276 1275 11240a4 2 API calls 1274->1275 1278 1122a70 1274->1278 1275->1278 1276->1263 1277 1123f08 2 API calls 1277->1276 1278->1276 1278->1277 1280 11240e7 1279->1280 1281 11240ee 1279->1281 1280->1272 1281->1280 1282 112439e RtlAllocateHeap 1281->1282 1283 11243cb 1282->1283 1283->1280 1284 11243d7 RtlReAllocateHeap 1283->1284 1284->1283

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_01125490 1 Function_01123710 56 Function_01125044 1->56 64 Function_011253F4 1->64 2 Function_01123414 41 Function_01125450 2->41 2->56 61 Function_011250F0 2->61 2->64 3 Function_01122394 3->2 18 Function_01122434 3->18 3->64 4 Function_01121995 5 Function_01123D1C 25 Function_0112483C 5->25 45 Function_011251D8 5->45 6 Function_0112529C 7 Function_0112539C 8 Function_01125500 9 Function_01121901 10 Function_01125204 11 Function_01123B04 26 Function_01123BBC 11->26 62 Function_01125470 11->62 12 Function_01123F08 31 Function_011240A4 12->31 40 Function_011254AC 12->40 12->41 48 Function_011249D8 12->48 12->64 13 Function_01124988 14 Function_01124888 14->8 15 Function_0112180F 16 Function_01124D0C 17 Function_01121E30 55 Function_01124C44 17->55 18->0 18->10 18->12 18->56 58 Function_01124A48 18->58 59 Function_011247C8 18->59 18->61 18->62 18->64 74 Function_01122968 18->74 19 Function_01121EB4 19->3 19->7 22 Function_01124DB8 19->22 35 Function_01124F28 19->35 39 Function_0112202C 19->39 19->41 47 Function_011254D8 19->47 19->56 19->64 69 Function_01122DF8 19->69 20 Function_01124EB4 20->41 20->61 21 Function_01121A35 36 Function_01121AA8 21->36 22->6 22->41 22->56 22->64 23 Function_011235B8 23->1 23->41 23->64 65 Function_01123674 23->65 24 Function_0112163E 27 Function_01121820 28 Function_011246A0 28->41 28->56 28->64 29 Function_011210A1 30 Function_01121526 31->0 31->7 31->40 31->41 50 Function_0112455C 31->50 31->56 31->61 31->64 73 Function_011244E8 31->73 32 Function_011212A4 53 Function_011214C4 32->53 33 Function_01124B24 34 Function_0112192A 35->10 35->56 35->64 36->19 67 Function_01121AF8 36->67 75 Function_011222EC 36->75 37 Function_0112192E 38 Function_01121A2F 39->20 39->23 39->41 39->56 39->58 39->64 42 Function_01126151 43 Function_01121857 44 Function_011230D4 44->13 44->14 44->26 44->41 44->61 44->64 46 Function_01121758 48->40 49 Function_0112105E 51 Function_0112125C 52 Function_011210C3 54 Function_01121844 55->16 55->45 56->41 56->61 57 Function_01121045 58->41 58->64 59->25 60 Function_01123E48 60->8 60->25 60->45 63 Function_01121876 65->41 65->56 65->64 66 Function_01126175 67->5 67->17 67->55 67->56 67->64 68 Function_01123DF8 67->68 69->2 69->20 69->28 69->41 69->44 69->61 69->64 70 Function_01121979 71 Function_01121867 72 Function_01124B68 72->8 72->41 72->64 73->40 73->41 74->10 74->11 74->12 74->31 74->41 74->56 74->61 74->62 74->64 75->72 76 Function_0112186D

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: NameUser
        • String ID:
        • API String ID: 2645101109-0
        • Opcode ID: fd6447a474a0c6c4e583e87f53b4852dd761150ae4ae7b776ee82d00e2f1a7d0
        • Instruction ID: 65a9e36fd2bf167285702f53515fc1422f1b7d9f23893a2207694108e7a7d375
        • Opcode Fuzzy Hash: fd6447a474a0c6c4e583e87f53b4852dd761150ae4ae7b776ee82d00e2f1a7d0
        • Instruction Fuzzy Hash: 09113A30718B5D4FCBD4EF6890583AEB6D2FBEC314F400A6E984EC3254DB788A558781

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 1122434-1122491 call 1123f08 3 1122497-112249c 0->3 4 112293f 0->4 3->4 6 11224a2-11224a5 3->6 5 1122945-112295f 4->5 6->4 7 11224ab-11224b6 6->7 8 112292f-112293d call 1125470 7->8 9 11224bc-11224ef call 11250f0 7->9 8->4 8->5 9->8 15 11224f5-112251a call 1125044 call 1125204 9->15 20 1122545 15->20 21 112251c-1122536 15->21 22 112254a-1122563 call 1125204 20->22 21->20 26 1122538-1122543 21->26 27 11226d2-11226da 22->27 28 1122569-112257c 22->28 26->22 31 11226e0-11226e4 27->31 32 11228c5-11228f2 call 1123f08 27->32 29 11225ce-11225d0 28->29 30 112257e-11225c5 28->30 29->27 36 11225d6-1122648 call 1125490 29->36 30->29 34 11226ea-11226f2 31->34 35 112278c-112281c call 11247c8 DeleteFileW * 2 call 112356c call 1123f08 call 1125470 SleepEx RtlExitUserThread 31->35 44 1122927-112292d 32->44 45 11228f4-11228fb 32->45 39 1122821-112284e call 1123f08 34->39 40 11226f8-1122705 34->40 35->8 77 11226c7-11226cd call 1125470 36->77 78 112264a-11226c2 call 1125044 call 11250f0 call 1124a48 call 11253f4 36->78 39->44 53 1122854-112285b 39->53 40->44 55 112270b-112270e 40->55 44->8 45->44 50 11228fd-1122900 45->50 50->44 54 1122902-1122922 call 1122968 call 1125470 50->54 53->44 58 1122861-1122864 53->58 54->44 55->44 61 1122714-1122718 55->61 58->44 64 112286a-11228c3 call 1122968 call 11247c8 call 1125470 58->64 66 112271a-1122747 call 1123f08 61->66 67 112277f-1122786 61->67 64->44 80 1122779-112277d 66->80 81 1122749-1122750 66->81 67->35 67->44 77->27 78->77 80->66 80->67 81->80 82 1122752-1122755 81->82 82->80 87 1122757-1122774 call 1122968 call 1125470 82->87 87->80
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: DeleteFile$ExitSleepThreadUser
        • String ID: |:|
        • API String ID: 2796381497-3736120136
        • Opcode ID: af6f0522112b9facc9e0093e301f45ffe89ead3b77408e0bdccb132fd8c44f9d
        • Instruction ID: 696e762c862123743bf9f5818b2b4d3c0c4e4e9e8e9c152b7a8b10e772fb1ac9
        • Opcode Fuzzy Hash: af6f0522112b9facc9e0093e301f45ffe89ead3b77408e0bdccb132fd8c44f9d
        • Instruction Fuzzy Hash: F2E1A530718F698FDB5DAB2C84587AE76D1FB98315F10462ED49FC3281DF34A9128786

        Control-flow Graph

        APIs
        • DeleteFileW.KERNEL32 ref: 011220B6
        • CopyFileW.KERNEL32 ref: 011220C5
        • DeleteFileW.KERNEL32 ref: 011220D6
        • DeleteFileW.KERNEL32 ref: 01122121
          • Part of subcall function 01124A48: SetFileAttributesW.KERNEL32 ref: 01124A97
          • Part of subcall function 01124A48: CreateFileW.KERNEL32 ref: 01124AC1
          • Part of subcall function 01124A48: SetFileTime.KERNEL32 ref: 01124AEC
        • CreateFileW.KERNEL32 ref: 011221AD
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: File$Delete$Create$AttributesCopyTime
        • String ID:
        • API String ID: 642576546-0
        • Opcode ID: 7f063b496fdb5386f4a3bc3b38053528e15544823e1f82b1c44872616a46c509
        • Instruction ID: 635915ef1df2d8410f85847b4b7d0e58e719b50690bba75f96f58f5a0476f967
        • Opcode Fuzzy Hash: 7f063b496fdb5386f4a3bc3b38053528e15544823e1f82b1c44872616a46c509
        • Instruction Fuzzy Hash: 74415920718A5D4FDBA8AF6C98583AE35D2EBDC314F10012EE94EC7385DE389D168785

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 144 1121af8-1121b2d 145 1121b2f-1121b36 144->145 146 1121b4b-1121b4f 145->146 147 1121b51-1121b5d 146->147 148 1121b38-1121b49 146->148 149 1121b74-1121b79 147->149 150 1121b5f-1121b65 147->150 148->146 152 1121b7f-1121b86 149->152 151 1121b67-1121b72 150->151 150->152 151->152 153 1121b91-1121b97 152->153 154 1121b88-1121b8f 152->154 153->145 155 1121b99-1121ba3 153->155 154->153 154->155 156 1121bb2-1121bca call 1121e30 155->156 157 1121ba5-1121bac 155->157 158 1121e07 156->158 162 1121bd0-1121bf2 call 1121e30 156->162 157->156 157->158 160 1121e09-1121e27 158->160 162->158 165 1121bf8-1121c27 RtlCreateHeap 162->165 166 1121c29-1121c43 call 1125044 165->166 166->158 170 1121c49-1121c61 call 11253f4 166->170 170->166 173 1121c63-1121c7e call 1121e30 170->173 173->158 176 1121c84-1121ca3 call 1121e30 173->176 176->158 179 1121ca9-1121cc8 call 1121e30 176->179 179->158 182 1121cce-1121ced call 1121e30 179->182 182->158 185 1121cf3-1121d12 call 1121e30 182->185 185->158 188 1121d18-1121d37 call 1121e30 185->188 188->158 191 1121d3d-1121d98 call 1124c44 * 3 188->191 191->158 198 1121d9a-1121da1 191->198 198->158 199 1121da3-1121da6 198->199 199->158 200 1121da8-1121df8 CreateThread * 2 199->200 202 1121e00-1121e05 200->202 202->160
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: Create$Thread$Heap
        • String ID: iP+
        • API String ID: 1054751041-51890417
        • Opcode ID: cf2ce30ea219674eb12de4e5a02e896239f1aaebb65970fad36a83100eea2f65
        • Instruction ID: 485d400d9c394f801202f85406bb1fa6b91b92db61b6a800a80bf034797144a1
        • Opcode Fuzzy Hash: cf2ce30ea219674eb12de4e5a02e896239f1aaebb65970fad36a83100eea2f65
        • Instruction Fuzzy Hash: 7691AF30618A198FDF5CEF28DC826A573E6FBA8300B180179DC4ECB156EB30D561CB96

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: File$AttributesCreateTime
        • String ID:
        • API String ID: 1986686026-0
        • Opcode ID: 608125a8aa1bce6175559d74748fb29477d2e5ca9ccfc86ce4b79151e6103723
        • Instruction ID: 2272900b51e941227ffa45d25110043ea5975c1fce08a1088c15a612b06e35be
        • Opcode Fuzzy Hash: 608125a8aa1bce6175559d74748fb29477d2e5ca9ccfc86ce4b79151e6103723
        • Instruction Fuzzy Hash: 2821063071CA484FDF64EF58948879E76E2FBDC705F10456DA85EC7245DA34DA058782

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 212 1123d1c-1123d33 213 1123dd3-1123dec 212->213 214 1123d39-1123d4b CreateToolhelp32Snapshot 212->214 215 1123dbb-1123dcd SleepEx 214->215 216 1123d4d-1123d63 Process32First 214->216 215->213 215->214 217 1123dae-1123db0 216->217 218 1123db2-1123db3 217->218 219 1123d65-1123d7c call 11251d8 217->219 218->215 222 1123d7e-1123d80 219->222 223 1123d82-1123d90 222->223 224 1123d94-1123d9b call 112483c 222->224 223->222 226 1123d92 223->226 227 1123da0-1123da6 224->227 226->227 227->217
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: CreateFirstProcess32SleepSnapshotToolhelp32
        • String ID:
        • API String ID: 2331296625-0
        • Opcode ID: 39ba45db73bafd81c11e774f87e0f4933b4a983672c3a76259ecfbbd9f04089f
        • Instruction ID: 82d97e5b9aec95cdce152b2a2b9293aef27532da0662af86d490a4dc8bed0488
        • Opcode Fuzzy Hash: 39ba45db73bafd81c11e774f87e0f4933b4a983672c3a76259ecfbbd9f04089f
        • Instruction Fuzzy Hash: C321E430224A0D8FEB5CEF28C0887AE76E2FB8C315F580A3ED95FDA185DB3894558751

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 228 11240a4-11240e5 229 11240e7-11240e9 228->229 230 11240ee-1124134 call 1125450 call 112539c call 112455c 228->230 231 11244c4-11244de 229->231 238 1124142-1124148 230->238 239 1124136-1124140 230->239 240 112414a-1124158 238->240 239->240 242 11244b6-11244c2 call 11253f4 240->242 243 112415e-1124195 240->243 242->231 248 11244ab-11244ac 243->248 249 112419b-11241c6 243->249 248->242 249->248 251 11241cc-11241e1 249->251 252 11241e3-11241e5 251->252 253 1124237-112423c 251->253 254 11241e7-1124203 call 1125044 252->254 255 112423f-1124278 252->255 253->255 259 1124221-1124235 call 1125044 254->259 260 1124205-112421c call 11250f0 254->260 261 1124478-1124485 255->261 262 112427e-1124284 255->262 259->255 260->259 274 1124492-1124495 261->274 275 1124487-112448d call 11253f4 261->275 265 11242a6-11242b0 262->265 266 1124286-11242a3 262->266 267 11242b6-11242c1 265->267 268 112435b-1124381 265->268 266->265 272 11242c3 267->272 273 11242c8-1124353 call 1125044 call 1125450 call 11254ac call 1125044 call 11244e8 call 11253f4 * 3 267->273 283 1124387-1124398 268->283 284 112445a-112446b 268->284 272->273 273->268 278 11244a2-11244a8 274->278 279 1124497-112449d call 11253f4 274->279 275->274 278->248 279->278 283->284 291 112439e-11243c9 RtlAllocateHeap 283->291 284->261 289 112446d-1124473 call 11253f4 284->289 289->261 294 11243cb-11243d5 291->294 295 11243d7-11243f3 RtlReAllocateHeap 294->295 296 11243f5-1124413 294->296 295->296 301 1124417-112441c 296->301 302 1124415 296->302 301->294 304 112441e-1124429 301->304 302->301 306 112444a-1124452 304->306 307 112442b-1124431 call 1125490 304->307 306->284 311 1124436-1124440 307->311 311->306
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2a8d4c325c00e7065d788230daaf221fb62076a87581a91d4545f0ee69f183fa
        • Instruction ID: 6310f2aa7da547b4085bcfcd8ce9c7307603f5df3e4aff5b374f061cad178000
        • Opcode Fuzzy Hash: 2a8d4c325c00e7065d788230daaf221fb62076a87581a91d4545f0ee69f183fa
        • Instruction Fuzzy Hash: B4D19230718B598FDB68EF6CD4456AEB7E2FB98701F10452DE44AC3241DF74E8128B86

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 316 1124f28-1124f71 call 1125044 320 1124f77 316->320 321 1124ffb-112502a call 11253f4 ObtainUserAgentString 316->321 323 1124f79-1124fbb call 1125044 RegQueryValueExA 320->323 327 112502b call 11253f4 323->327 328 1124fbd-1124fdc call 11253f4 call 1125204 323->328 331 1125030-1125035 327->331 328->331 337 1124fde-1124fef 328->337 334 1124ff1-1124ff2 331->334 335 1125037 331->335 334->321 335->323 337->334
        APIs
        • RegQueryValueExA.KERNEL32 ref: 01124FAD
        • ObtainUserAgentString.URLMON ref: 01125016
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: AgentObtainQueryStringUserValue
        • String ID:
        • API String ID: 4107646653-0
        • Opcode ID: 1ee60c0f534f3764a8b7c02e3106e8c1bbbc8228cd7f8668cbf5d1b2e0d7aa71
        • Instruction ID: 5d59932bab8964ad69013e6dd3936854996a7e8d9f541111199d65f07ad2d5c7
        • Opcode Fuzzy Hash: 1ee60c0f534f3764a8b7c02e3106e8c1bbbc8228cd7f8668cbf5d1b2e0d7aa71
        • Instruction Fuzzy Hash: 5631D23160CA198FDB1CEF6CD8896EA77D2FB98324F00027AE84AC7541EF74981247D1

        Control-flow Graph

        APIs
          • Part of subcall function 01124DB8: GetVolumeInformationA.KERNEL32 ref: 01124E25
        • CreateMutexExA.KERNEL32 ref: 01121F27
        • CreateFileMappingA.KERNEL32 ref: 01121FD9
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: Create$FileInformationMappingMutexVolume
        • String ID:
        • API String ID: 3260430491-0
        • Opcode ID: 9e9a34ea7cb298080777c61faf39ef342cf239ea35ae18d0dbcb535cd23d3ff0
        • Instruction ID: 3a35d93f0af88f1c9966e12c53d404f3fe6dfd3d035c1b20d2e6a0c21a55f99b
        • Opcode Fuzzy Hash: 9e9a34ea7cb298080777c61faf39ef342cf239ea35ae18d0dbcb535cd23d3ff0
        • Instruction Fuzzy Hash: 2141A630718F1D8FEB68EB3880587AE76D2EFA8716F50492DC05FD6240CF7496169786

        Control-flow Graph

        APIs
        • GetTokenInformation.KERNELBASE ref: 01124BBC
        • GetTokenInformation.KERNELBASE ref: 01124BF3
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: InformationToken
        • String ID:
        • API String ID: 4114910276-0
        • Opcode ID: 02c84281bba87b7899f42c3c535edb1c0a1e289461f07f6c867dc8d7767b6b06
        • Instruction ID: 6da89904b503bebeaa42c9931c1fe9b5d5890405da667744b653e51593039823
        • Opcode Fuzzy Hash: 02c84281bba87b7899f42c3c535edb1c0a1e289461f07f6c867dc8d7767b6b06
        • Instruction Fuzzy Hash: C1213130608A198FC754EF28D49866AB7E2FFD9315B004A6EE59AC7264DB30E8459B81

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 390 1123df8-1123e08 391 1123e0a-1123e2c EnumWindows SleepEx 390->391 392 1123e2e-1123e3c 390->392 391->391 391->392
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: EnumSleepWindows
        • String ID:
        • API String ID: 498413330-0
        • Opcode ID: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
        • Instruction ID: e34513531bc6722e9aeac1a7e3e9480ee9b6e549aa989ba9e42d3f883ba13328
        • Opcode Fuzzy Hash: bcd33d68b26800d53c1a0055312e6970b5242bc1254dfeb745dd1bbf27494588
        • Instruction Fuzzy Hash: D9E04F305146198FFB6CAFA5C0DCBB036A1FB18206F14017ADC1EDD286CB7A4959C720

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 393 1123414-1123467 CreateFileW 394 1123469-1123479 393->394 395 11234dd-11234e0 393->395 402 11234d4-11234d5 394->402 403 112347b-11234cb call 1125450 call 11250f0 394->403 396 11234e2-11234e5 395->396 397 1123548-1123549 395->397 396->397 399 11234e7-1123509 call 1125450 call 1125044 396->399 398 112354b-1123564 397->398 409 112350b-112352e 399->409 402->395 403->402 418 11234cd-11234ce 403->418 413 1123530-1123546 call 11253f4 * 2 409->413 413->398 418->402
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: ce663faf5a716b1ca10baa4e22fa9f7e4c3774f53785b3b9c2244f163c36e0eb
        • Instruction ID: 3033bcda1a95237475414cd84cd25f04dfda752de4a11812a01ec3e6da6c6744
        • Opcode Fuzzy Hash: ce663faf5a716b1ca10baa4e22fa9f7e4c3774f53785b3b9c2244f163c36e0eb
        • Instruction Fuzzy Hash: AF41D63071CF1D4FD79CAA2C98993B9B6C2FB98615F10022ED5AFC3241DF28981243C2

        Control-flow Graph

        APIs
        • GetVolumeInformationA.KERNEL32 ref: 01124E25
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: InformationVolume
        • String ID:
        • API String ID: 2039140958-0
        • Opcode ID: b1dc968a53a67113d9f19c608549fb198ed32c9322c33b77876c40581a868fca
        • Instruction ID: d909d82e2cb133bf53e6d8728de6194812a39a1b91a051389e92d3c97f5caa84
        • Opcode Fuzzy Hash: b1dc968a53a67113d9f19c608549fb198ed32c9322c33b77876c40581a868fca
        • Instruction Fuzzy Hash: C1315A30618A4C8FD7A4EF28C4486EA77E1FBE8315F10466ED84EC7264DF34D9458781

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 452 1121aa8-1121abc call 1121af8 455 1121ad5-1121adf 452->455 456 1121abe 452->456 457 1121ac3-1121ad1 SleepEx 456->457 457->457 458 1121ad3-1121aeb call 11222ec call 1121eb4 457->458 463 1121af0 458->463
        APIs
          • Part of subcall function 01121AF8: RtlCreateHeap.NTDLL ref: 01121C0F
        • SleepEx.KERNEL32(?,?,?,?,?,?,?,01121A9B), ref: 01121AC8
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID: CreateHeapSleep
        • String ID:
        • API String ID: 221814145-0
        • Opcode ID: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
        • Instruction ID: a7204cdd326bb3131d7e178815fba19e9ae264339b38d5feb0900770c5ab4ed9
        • Opcode Fuzzy Hash: 9adc8d4cde1f516ddaa5c4750073014e5650bc8f10d33b0d75f43d3a0b67238f
        • Instruction Fuzzy Hash: C2E0DF10304F592BEB9DFBB8C4C472D20D0EB98250F50057DE90EC6285DA35C8A04322
        Memory Dump Source
        • Source File: 00000002.00000002.3268206888.0000000001121000.00000020.80000000.00040000.00000000.sdmp, Offset: 01121000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_1121000_explorer.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 0fac0ba0fd63c2bd3756d508b4e923d710e7c255c2520c70d3ed946f0b978393
        • Instruction ID: 47b52ccc9f5ed65d03d944af78f0cb9a6ab55e6f1751c0fc5d0380fc65c16aec
        • Opcode Fuzzy Hash: 0fac0ba0fd63c2bd3756d508b4e923d710e7c255c2520c70d3ed946f0b978393
        • Instruction Fuzzy Hash: AFD18F30718F198FDB6CEF6C84982AEB6E2EBA8305F50052ED44EC3255DF74E9168785