Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2.exe

Overview

General Information

Sample name:2.exe
Analysis ID:1505859
MD5:3937b96df9c086a15f955e2feb629397
SHA1:9cbf88cf76091b4f800a269d93681d331c0bc215
SHA256:162369d0214b810259c9654c2f740eefaddd2d8d287128cfdfe2b121f99a4736
Tags:exe
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • 2.exe (PID: 5736 cmdline: "C:\Users\user\Desktop\2.exe" MD5: 3937B96DF9C086A15F955E2FEB629397)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "joifjfjopv.duckdns.org", "Ports": "1010", "Version": "| Edit by Vinom Rat", "Autorun": "false", "Install_Folder": "TDA5WTZ6VGw0dGdXTmN6cHZzMXNrOUNnc29hUUg2OHA=", "Install_File": "XFgc05+2DOkOK91Q51ZE4B0Hfd2xmkGDLBmi7Pol9KIARMqaUUmXtwNqVqyeKCn8MZHcq7SXkwHwzFY87q/uBZLpiaMUWM3UVUM/Tnh5lJk=", "AES_key": "L09Y6zTl4tgWNczpvs1sk9CgsoaQH68p", "Mutex": "TBC2UYLW/AgKw1ZuqgloxojTTnWeyZKdKFOAIhGN/QwT2N6T/JLd4E+JyfBXPmNu30UMW5KUXhEHUtvTeY7GuJrPZ/6DjbjdKfQrhN5ZY56qui5V2Hk12/x/XdC9zreODHamOitft07WT4ctUEMZfolChW+f9KDsMuffTuXYUiQhWI2lbxN7YmX6RYps3dbzPT/lPAv7unyxVUcFJ1bd7a7IHfSQcl+xr2MBhdkcwjl53ljVuvugPVNrxyaNbatjqDIOMpXEMMWhDe7ORCconegsKI345Yn/CvI5foT0/TUM20Cx+Y+Ds2ZbyiC5kamlKb8qncyKvIIStio/sd3MV3tZpBaVXFIvd+Jz5zGLNj62Xcwzeail8/Wcjn+rsUKskbE7RmYueD8RRUBMJy8R97Vc2sjnWfT0wMoVQXHGrFkx26eZTMj9zAXVLeQvF8NIbwPX5S0RTUAKekGbbzHsFOk6VQ1NK1icIoKTDz2em0Z9DyvO/tBgdNn5JEGHil8QquDeO7Lldqc5YALk5yt0bOwFd6RCQpZYkFjzH4nu14EwUKddyafcMzTt1eb3yVAE6AJcGnE4xN9+5Qyk1rcRbXnbaJEU3EkBm2dQGma7lx+8+W2Gikzc7KBylhiDcfOAkCylyhevSI+xQg9efIWfgBOuhBLgDt9DLTw2B4u4H/g=", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
SourceRuleDescriptionAuthorStrings
2.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    2.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      2.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xc54c:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xf438:$a2: Stub.exe
      • 0xf4c8:$a2: Stub.exe
      • 0x8fd8:$a3: get_ActivatePong
      • 0xc764:$a4: vmware
      • 0xc5dc:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x9ed3:$a6: get_SslClient
      2.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xc5de:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xc3de:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        00000000.00000002.4518541658.00000000014E8000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x35cfb:$x1: AsyncRAT
        • 0x35d39:$x1: AsyncRAT
        Process Memory Space: 2.exe PID: 5736JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: 2.exe PID: 5736INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x24c1d:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.2.exe.e20000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.2.exe.e20000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.0.2.exe.e20000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0xc54c:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0xf438:$a2: Stub.exe
              • 0xf4c8:$a2: Stub.exe
              • 0x8fd8:$a3: get_ActivatePong
              • 0xc764:$a4: vmware
              • 0xc5dc:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x9ed3:$a6: get_SslClient
              0.0.2.exe.e20000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0xc5de:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.exeAvira: detected
              Source: 2.exeMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "joifjfjopv.duckdns.org", "Ports": "1010", "Version": "| Edit by Vinom Rat", "Autorun": "false", "Install_Folder": "TDA5WTZ6VGw0dGdXTmN6cHZzMXNrOUNnc29hUUg2OHA=", "Install_File": "XFgc05+2DOkOK91Q51ZE4B0Hfd2xmkGDLBmi7Pol9KIARMqaUUmXtwNqVqyeKCn8MZHcq7SXkwHwzFY87q/uBZLpiaMUWM3UVUM/Tnh5lJk=", "AES_key": "L09Y6zTl4tgWNczpvs1sk9CgsoaQH68p", "Mutex": "TBC2UYLW/AgKw1ZuqgloxojTTnWeyZKdKFOAIhGN/QwT2N6T/JLd4E+JyfBXPmNu30UMW5KUXhEHUtvTeY7GuJrPZ/6DjbjdKfQrhN5ZY56qui5V2Hk12/x/XdC9zreODHamOitft07WT4ctUEMZfolChW+f9KDsMuffTuXYUiQhWI2lbxN7YmX6RYps3dbzPT/lPAv7unyxVUcFJ1bd7a7IHfSQcl+xr2MBhdkcwjl53ljVuvugPVNrxyaNbatjqDIOMpXEMMWhDe7ORCconegsKI345Yn/CvI5foT0/TUM20Cx+Y+Ds2ZbyiC5kamlKb8qncyKvIIStio/sd3MV3tZpBaVXFIvd+Jz5zGLNj62Xcwzeail8/Wcjn+rsUKskbE7RmYueD8RRUBMJy8R97Vc2sjnWfT0wMoVQXHGrFkx26eZTMj9zAXVLeQvF8NIbwPX5S0RTUAKekGbbzHsFOk6VQ1NK1icIoKTDz2em0Z9DyvO/tBgdNn5JEGHil8QquDeO7Lldqc5YALk5yt0bOwFd6RCQpZYkFjzH4nu14EwUKddyafcMzTt1eb3yVAE6AJcGnE4xN9+5Qyk1rcRbXnbaJEU3EkBm2dQGma7lx+8+W2Gikzc7KBylhiDcfOAkCylyhevSI+xQg9efIWfgBOuhBLgDt9DLTw2B4u4H/g=", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
              Source: 2.exeReversingLabs: Detection: 76%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 2.exeJoe Sandbox ML: detected
              Source: 2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Malware configuration extractorURLs: joifjfjopv.duckdns.org
              Source: unknownDNS query: name: joifjfjopv.duckdns.org
              Source: Yara matchFile source: 2.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.5:49704 -> 216.105.171.163:1010
              Source: Joe Sandbox ViewASN Name: DEDICATEDUS DEDICATEDUS
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: joifjfjopv.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 2.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR
              Source: 2.exe, LimeLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: 2.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 2.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000000.00000002.4518541658.00000000014E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\2.exeCode function: 0_2_0147E0480_2_0147E048
              Source: 2.exe, 00000000.00000000.2060354830.0000000000E32000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs 2.exe
              Source: 2.exe, 00000000.00000002.4520043856.0000000005BF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 2.exe
              Source: 2.exeBinary or memory string: OriginalFilenameStub.exe" vs 2.exe
              Source: 2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 2.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 2.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000000.00000002.4518541658.00000000014E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 2.exe, Settings.csBase64 encoded string: 'r0zheVW0uywoDgg2tUu/HCLSaZG/bO1LbmZXV00BSyUaK1p+A3wtUNLXc7cGl962pStjldOei9GwOo2NDhVEGKoSHKZy+HwxVRdDg5GUHso=', 'GU1LR2RvIyvK7fKjJnkLo5QdFbAdsrUbCmZhM4V6NfWGX22QiovrwmXgDCmNKjG5WqYyxX/R9H5yz9VAFy9mAQ==', 'XFgc05+2DOkOK91Q51ZE4B0Hfd2xmkGDLBmi7Pol9KIARMqaUUmXtwNqVqyeKCn8MZHcq7SXkwHwzFY87q/uBZLpiaMUWM3UVUM/Tnh5lJk=', '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', 'MFXOxEPWkR7EJAQS7kmOY/olExlLAKGjOlmOPJ085nt2i5/JCFXRMNbQdUcy9NhlpwF27EADAEBLo4r4b4JO1Q==', 'VImjgx56Ozbn7hEQXt+R3S/KFJOi4ewrMMTK/7vUnTCiZKtM1VJhRRlfz9CK5IYiOVeKWXfyO4/p9aWrCUW8ww==', 'KxYq4NvOfkqcr885cRIX2uc9V/BDySYOu5aQ61rWwPZDRdsVKT3xrK7LmfpXxHG8ehINJCn4vBtQcR9/DG4ECA=='
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@5/1
              Source: C:\Users\user\Desktop\2.exeMutant created: NULL
              Source: C:\Users\user\Desktop\2.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
              Source: 2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 2.exeReversingLabs: Detection: 76%
              Source: C:\Users\user\Desktop\2.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\2.exeSection loaded: schannel.dllJump to behavior
              Source: 2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: 2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: 2.exe, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])

              Boot Survival

              barindex
              Source: Yara matchFile source: 2.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 2.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR
              Source: 2.exeBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\2.exeMemory allocated: 1470000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\2.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\2.exeMemory allocated: 2FF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\2.exeWindow / User API: threadDelayed 9704Jump to behavior
              Source: C:\Users\user\Desktop\2.exe TID: 6576Thread sleep count: 283 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2.exe TID: 6576Thread sleep time: -283000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2.exe TID: 6576Thread sleep count: 9704 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2.exe TID: 6576Thread sleep time: -9704000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: 2.exeBinary or memory string: vmware
              Source: 2.exe, 00000000.00000002.4518541658.000000000156E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: 2.exe, 00000000.00000002.4518541658.000000000156E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj
              Source: C:\Users\user\Desktop\2.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\2.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\2.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\2.exeQueries volume information: C:\Users\user\Desktop\2.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 2.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              2
              Virtualization/Sandbox Evasion
              1
              Input Capture
              11
              Security Software Discovery
              Remote Services1
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
              Obfuscated Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Software Packing
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture21
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets13
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              2.exe76%ReversingLabsByteCode-MSIL.Trojan.AsyncRATMarte
              2.exe100%AviraTR/Dropper.Gen
              2.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              joifjfjopv.duckdns.org0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              joifjfjopv.duckdns.org
              216.105.171.163
              truetrue
                unknown
                171.39.242.20.in-addr.arpa
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  joifjfjopv.duckdns.orgtrue
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  216.105.171.163
                  joifjfjopv.duckdns.orgUnited States
                  63018DEDICATEDUStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1505859
                  Start date and time:2024-09-07 00:14:06 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 3s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:2.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@1/0@5/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 9
                  • Number of non-executed functions: 1
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • VT rate limit hit for: 2.exe
                  TimeTypeDescription
                  18:15:36API Interceptor9310855x Sleep call for process: 2.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  DEDICATEDUSdKMlbDZXP3.elfGet hashmaliciousMiraiBrowse
                  • 216.52.183.163
                  build.htaGet hashmaliciousQuasarBrowse
                  • 64.42.179.59
                  build.exeGet hashmaliciousQuasarBrowse
                  • 64.42.179.59
                  Replace.exeGet hashmaliciousUnknownBrowse
                  • 74.201.73.52
                  x1b5bmJgLm.elfGet hashmaliciousUnknownBrowse
                  • 200.220.163.225
                  0FnrrE8B6Y.elfGet hashmaliciousMiraiBrowse
                  • 168.81.61.232
                  D2M15lCoQK.elfGet hashmaliciousMiraiBrowse
                  • 45.74.57.45
                  CGlwOBF2cH.elfGet hashmaliciousUnknownBrowse
                  • 45.74.57.32
                  SecuriteInfo.com.Win32.Trojan.CobaltStrike.4EYNH5.5772.17622.dllGet hashmaliciousCobaltStrikeBrowse
                  • 64.42.181.227
                  VlkShT2TjD.elfGet hashmaliciousGafgytBrowse
                  • 172.83.131.72
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.386988475119671
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:2.exe
                  File size:64'512 bytes
                  MD5:3937b96df9c086a15f955e2feb629397
                  SHA1:9cbf88cf76091b4f800a269d93681d331c0bc215
                  SHA256:162369d0214b810259c9654c2f740eefaddd2d8d287128cfdfe2b121f99a4736
                  SHA512:875c66aa6d0c79d657629d1a8a8582e5dddf4c115e5a8f524d529099e2eff13a17a91077ed1ff486cbeafd7919bb56990e64527afc08b495bb6815fd7bb10b71
                  SSDEEP:1536:j2wukvF1ak9gcKu5UYFJhYHpis5bkAPHimhmrmTGZx:j2dkvF1ak9Ku5UYFJ2Z5bkAiXEix
                  TLSH:3953E7013BE88025F3BE8FB469F6618546FAF5AF2D12C55D1CC911CE0632B869941BBF
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d............................~.... ... ....@.. .......................`............`................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x410e7e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x64A6F687 [Thu Jul 6 17:14:47 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x10e280x53.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x7ff.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xee840xf00022032850253aab343473c157b893b0b1False0.4554036458333333data5.42360399357216IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x120000x7ff0x80033cdbc5c50f34a35b4f0e61582ac7f11False0.41650390625data4.884866150337139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x140000xc0x2003594c0caf93ad3066a48296acd47304eFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x120a00x2ccdata0.43575418994413406
                  RT_MANIFEST0x1236c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 7, 2024 00:15:04.513489008 CEST497041010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:04.520085096 CEST101049704216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:04.520203114 CEST497041010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:04.532042980 CEST497041010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:04.537134886 CEST101049704216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:25.873338938 CEST101049704216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:25.873405933 CEST497041010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:30.889966965 CEST497041010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:30.890863895 CEST497101010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:30.897320032 CEST101049704216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:30.898248911 CEST101049710216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:30.898325920 CEST497101010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:30.898632050 CEST497101010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:30.905186892 CEST101049710216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:52.252633095 CEST101049710216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:52.253467083 CEST497101010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:57.263210058 CEST497101010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:57.269246101 CEST101049710216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:57.376576900 CEST648681010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:57.381437063 CEST101064868216.105.171.163192.168.2.5
                  Sep 7, 2024 00:15:57.381520033 CEST648681010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:57.381798983 CEST648681010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:15:57.386600971 CEST101064868216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:18.754740953 CEST101064868216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:18.754918098 CEST648681010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:23.763487101 CEST648681010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:23.766022921 CEST648691010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:23.768454075 CEST101064868216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:23.770908117 CEST101064869216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:23.771008968 CEST648691010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:23.771919012 CEST648691010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:23.776671886 CEST101064869216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:45.124301910 CEST101064869216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:45.124439001 CEST648691010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:50.138163090 CEST648691010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:50.140104055 CEST648701010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:50.145745993 CEST101064869216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:50.146637917 CEST101064870216.105.171.163192.168.2.5
                  Sep 7, 2024 00:16:50.146734953 CEST648701010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:50.147243023 CEST648701010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:16:50.153507948 CEST101064870216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:11.534806967 CEST101064870216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:11.535029888 CEST648701010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:16.544306993 CEST648701010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:16.550741911 CEST101064870216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:16.664506912 CEST648711010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:16.670660973 CEST101064871216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:16.674376011 CEST648711010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:16.674376011 CEST648711010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:16.680885077 CEST101064871216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:38.031565905 CEST101064871216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:38.031653881 CEST648711010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:43.045722961 CEST648711010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:43.050353050 CEST648721010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:43.050590038 CEST101064871216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:43.055255890 CEST101064872216.105.171.163192.168.2.5
                  Sep 7, 2024 00:17:43.055881977 CEST648721010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:43.055881977 CEST648721010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:17:43.060658932 CEST101064872216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:04.441956997 CEST101064872216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:04.442048073 CEST648721010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:09.450659037 CEST648721010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:09.451811075 CEST648731010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:09.455455065 CEST101064872216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:09.456808090 CEST101064873216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:09.457225084 CEST648731010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:09.457751036 CEST648731010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:09.462515116 CEST101064873216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:30.851795912 CEST101064873216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:30.854145050 CEST648731010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:35.856939077 CEST648731010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:35.863821983 CEST101064873216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:35.973458052 CEST648741010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:35.978509903 CEST101064874216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:35.978610992 CEST648741010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:35.979253054 CEST648741010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:18:35.984100103 CEST101064874216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:57.382392883 CEST101064874216.105.171.163192.168.2.5
                  Sep 7, 2024 00:18:57.382525921 CEST648741010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:19:02.388221025 CEST648741010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:19:02.389055014 CEST648751010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:19:02.393266916 CEST101064874216.105.171.163192.168.2.5
                  Sep 7, 2024 00:19:02.393822908 CEST101064875216.105.171.163192.168.2.5
                  Sep 7, 2024 00:19:02.393892050 CEST648751010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:19:02.394191980 CEST648751010192.168.2.5216.105.171.163
                  Sep 7, 2024 00:19:02.398956060 CEST101064875216.105.171.163192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 7, 2024 00:15:04.402089119 CEST5765753192.168.2.51.1.1.1
                  Sep 7, 2024 00:15:04.510544062 CEST53576571.1.1.1192.168.2.5
                  Sep 7, 2024 00:15:33.319205999 CEST5350285162.159.36.2192.168.2.5
                  Sep 7, 2024 00:15:33.801639080 CEST6114353192.168.2.51.1.1.1
                  Sep 7, 2024 00:15:33.810992002 CEST53611431.1.1.1192.168.2.5
                  Sep 7, 2024 00:15:57.264113903 CEST5220653192.168.2.51.1.1.1
                  Sep 7, 2024 00:15:57.375852108 CEST53522061.1.1.1192.168.2.5
                  Sep 7, 2024 00:17:16.545283079 CEST5831353192.168.2.51.1.1.1
                  Sep 7, 2024 00:17:16.658795118 CEST53583131.1.1.1192.168.2.5
                  Sep 7, 2024 00:18:35.858100891 CEST5334353192.168.2.51.1.1.1
                  Sep 7, 2024 00:18:35.972421885 CEST53533431.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Sep 7, 2024 00:15:04.402089119 CEST192.168.2.51.1.1.10xa75dStandard query (0)joifjfjopv.duckdns.orgA (IP address)IN (0x0001)false
                  Sep 7, 2024 00:15:33.801639080 CEST192.168.2.51.1.1.10x8df3Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                  Sep 7, 2024 00:15:57.264113903 CEST192.168.2.51.1.1.10x6818Standard query (0)joifjfjopv.duckdns.orgA (IP address)IN (0x0001)false
                  Sep 7, 2024 00:17:16.545283079 CEST192.168.2.51.1.1.10x5969Standard query (0)joifjfjopv.duckdns.orgA (IP address)IN (0x0001)false
                  Sep 7, 2024 00:18:35.858100891 CEST192.168.2.51.1.1.10x78b4Standard query (0)joifjfjopv.duckdns.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Sep 7, 2024 00:15:04.510544062 CEST1.1.1.1192.168.2.50xa75dNo error (0)joifjfjopv.duckdns.org216.105.171.163A (IP address)IN (0x0001)false
                  Sep 7, 2024 00:15:33.810992002 CEST1.1.1.1192.168.2.50x8df3Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                  Sep 7, 2024 00:15:57.375852108 CEST1.1.1.1192.168.2.50x6818No error (0)joifjfjopv.duckdns.org216.105.171.163A (IP address)IN (0x0001)false
                  Sep 7, 2024 00:17:16.658795118 CEST1.1.1.1192.168.2.50x5969No error (0)joifjfjopv.duckdns.org216.105.171.163A (IP address)IN (0x0001)false
                  Sep 7, 2024 00:18:35.972421885 CEST1.1.1.1192.168.2.50x78b4No error (0)joifjfjopv.duckdns.org216.105.171.163A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:18:14:59
                  Start date:06/09/2024
                  Path:C:\Users\user\Desktop\2.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\2.exe"
                  Imagebase:0xe20000
                  File size:64'512 bytes
                  MD5 hash:3937B96DF9C086A15F955E2FEB629397
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.4518541658.00000000014E8000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:7.3%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:48
                    Total number of Limit Nodes:5
                    execution_graph 13448 14784e0 13449 147850e 13448->13449 13452 1477ac0 13449->13452 13451 147852e 13451->13451 13453 1477acb 13452->13453 13454 1478e2b 13453->13454 13456 147a8e0 13453->13456 13454->13451 13458 147a901 13456->13458 13457 147a925 13457->13454 13458->13457 13461 147aa81 13458->13461 13465 147aa90 13458->13465 13462 147aa8c 13461->13462 13463 147aad6 13462->13463 13469 1478cfc 13462->13469 13463->13457 13466 147aa9d 13465->13466 13467 147aad6 13466->13467 13468 1478cfc KiUserCallbackDispatcher 13466->13468 13467->13457 13468->13467 13470 1478d05 13469->13470 13472 147ab6f 13470->13472 13473 1478d30 13470->13473 13472->13463 13474 1478d3b 13473->13474 13477 1478d40 13474->13477 13476 147abb7 13476->13470 13478 1478d4b 13477->13478 13483 147bb6c 13478->13483 13480 147c138 13480->13476 13481 147a8e0 KiUserCallbackDispatcher 13481->13480 13482 147bf10 13482->13480 13482->13481 13484 147bb77 13483->13484 13485 147d31a 13484->13485 13487 147d368 13484->13487 13485->13482 13488 147d3bb 13487->13488 13489 147d3c6 KiUserCallbackDispatcher 13488->13489 13490 147d3f0 13488->13490 13489->13490 13490->13485 13491 1477c80 13492 1477cc6 GetCurrentProcess 13491->13492 13494 1477d11 13492->13494 13495 1477d18 GetCurrentThread 13492->13495 13494->13495 13496 1477d55 GetCurrentProcess 13495->13496 13497 1477d4e 13495->13497 13498 1477d8b 13496->13498 13497->13496 13499 1477db3 GetCurrentThreadId 13498->13499 13500 1477de4 13499->13500 13501 14729c8 13502 14729c9 SetWindowsHookExW 13501->13502 13504 1472a52 13502->13504 13505 1477ec8 DuplicateHandle 13506 1477f5e 13505->13506

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 138 1477c73-1477c7d 139 1477cf2-1477d0f GetCurrentProcess 138->139 140 1477c7f-1477cf0 138->140 141 1477d11-1477d17 139->141 142 1477d18-1477d4c GetCurrentThread 139->142 140->139 141->142 143 1477d55-1477d89 GetCurrentProcess 142->143 144 1477d4e-1477d54 142->144 146 1477d92-1477dad call 1477e50 143->146 147 1477d8b-1477d91 143->147 144->143 152 1477db3-1477de2 GetCurrentThreadId 146->152 147->146 153 1477de4-1477dea 152->153 154 1477deb-1477e4d 152->154 153->154
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 01477CFE
                    • GetCurrentThread.KERNEL32 ref: 01477D3B
                    • GetCurrentProcess.KERNEL32 ref: 01477D78
                    • GetCurrentThreadId.KERNEL32 ref: 01477DD1
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: bee5edc0906dae9e3191cff1fa6244af8428f5852f4ebb1300a22a1a37d72150
                    • Instruction ID: 802ed647c405f91bc811350e6b778cb04f4d6b07c5654e69415cbebae5985dc8
                    • Opcode Fuzzy Hash: bee5edc0906dae9e3191cff1fa6244af8428f5852f4ebb1300a22a1a37d72150
                    • Instruction Fuzzy Hash: A25183B090030A8FDB18CFA9D448BEEBFF1EF48315F24846AE509A7361C7349845CB62

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 162 1477c80-1477d0f GetCurrentProcess 167 1477d11-1477d17 162->167 168 1477d18-1477d4c GetCurrentThread 162->168 167->168 169 1477d55-1477d89 GetCurrentProcess 168->169 170 1477d4e-1477d54 168->170 171 1477d92-1477dad call 1477e50 169->171 172 1477d8b-1477d91 169->172 170->169 176 1477db3-1477de2 GetCurrentThreadId 171->176 172->171 177 1477de4-1477dea 176->177 178 1477deb-1477e4d 176->178 177->178
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 01477CFE
                    • GetCurrentThread.KERNEL32 ref: 01477D3B
                    • GetCurrentProcess.KERNEL32 ref: 01477D78
                    • GetCurrentThreadId.KERNEL32 ref: 01477DD1
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: ceb43a7bfc886a627fda5682c00a38ef1f7ee59531f735eb85979489e2e04e3d
                    • Instruction ID: db0869632df554e856c179e85b61247f2011b46b317714bd148c3310ab9bdddd
                    • Opcode Fuzzy Hash: ceb43a7bfc886a627fda5682c00a38ef1f7ee59531f735eb85979489e2e04e3d
                    • Instruction Fuzzy Hash: 675154B09002098FDB18CFAAD448BEEBBF5EB48315F24845AE509A7360D7355945CB66

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 367 1477ec0-1477f5c DuplicateHandle 368 1477f65-1477f82 367->368 369 1477f5e-1477f64 367->369 369->368
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01477F4F
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 179fcd27260e3c15ff29d37a9a85125638471e3fc5a61bba65a6d3bd190b32e7
                    • Instruction ID: c6246663bd6cc8f216a17fce413a06cd9e635439d768c7c5d2f9662c38193f7a
                    • Opcode Fuzzy Hash: 179fcd27260e3c15ff29d37a9a85125638471e3fc5a61bba65a6d3bd190b32e7
                    • Instruction Fuzzy Hash: 8521E0B5D002499FDB10CFA9D984AEEBFF5EB48320F14841AE918A7310D374A954CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 372 1477ec8-1477f5c DuplicateHandle 373 1477f65-1477f82 372->373 374 1477f5e-1477f64 372->374 374->373
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01477F4F
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 214271257cf241c4888c5d089201f2debc5a338fb616fab548a38f3a1bb4e231
                    • Instruction ID: c9a9f4624fed182a2b7a45fe8ec715551d1bf351a1d2d0306ecc7c48d9528b93
                    • Opcode Fuzzy Hash: 214271257cf241c4888c5d089201f2debc5a338fb616fab548a38f3a1bb4e231
                    • Instruction Fuzzy Hash: 9921C2B5D002499FDB10CFAAD984ADEBFF8EB48320F14841AE918A3350D375A954CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 377 14729c0-14729c6 378 14729c9-1472a12 377->378 379 14729c8 377->379 381 1472a14 378->381 382 1472a1e-1472a50 SetWindowsHookExW 378->382 379->378 385 1472a1c 381->385 383 1472a52-1472a58 382->383 384 1472a59-1472a7e 382->384 383->384 385->382
                    APIs
                    • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 01472A43
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: d0b56b034f51c1ff9078e10fc0abb4a932d4b8a80de16001ab1d61394ae93b10
                    • Instruction ID: 074e3217bf83b3f9553d5c6fbd582640533abc1fb0d0211d994e6fecafea7c8d
                    • Opcode Fuzzy Hash: d0b56b034f51c1ff9078e10fc0abb4a932d4b8a80de16001ab1d61394ae93b10
                    • Instruction Fuzzy Hash: 482125B5D002499FDB14DFAAD844BEEBBF4AB88320F14842AD419A7250C774A945CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 389 14729c8-1472a12 392 1472a14 389->392 393 1472a1e-1472a50 SetWindowsHookExW 389->393 396 1472a1c 392->396 394 1472a52-1472a58 393->394 395 1472a59-1472a7e 393->395 394->395 396->393
                    APIs
                    • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 01472A43
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: ec39ee5f82c332a1db83b722fe5283cb714ad42f1fa32ea8a8a73bd7818ca4cf
                    • Instruction ID: 112777fdfbc21aa278262034f9ffb21ba4bae67cee7e2b50651fcc5e180723ab
                    • Opcode Fuzzy Hash: ec39ee5f82c332a1db83b722fe5283cb714ad42f1fa32ea8a8a73bd7818ca4cf
                    • Instruction Fuzzy Hash: 5E2115B5D002098FDB14DFAAD844BDEFBF5AB88310F10841AD519A7250C774A945CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 400 147d368-147d3c4 402 147d3c6-147d3ee KiUserCallbackDispatcher 400->402 403 147d412-147d42b 400->403 404 147d3f7-147d40b 402->404 405 147d3f0-147d3f6 402->405 404->403 405->404
                    APIs
                    • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0147D3DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID: CallbackDispatcherUser
                    • String ID:
                    • API String ID: 2492992576-0
                    • Opcode ID: 6fc0686b21fef51f825cb1e7ff15c745c1d1b9657496605a83c34dbd27c15a67
                    • Instruction ID: bc4966bc2321f58c51ea9ceabeb2c04e2167a227d9d3d877b622be56678711b3
                    • Opcode Fuzzy Hash: 6fc0686b21fef51f825cb1e7ff15c745c1d1b9657496605a83c34dbd27c15a67
                    • Instruction Fuzzy Hash: 2221D274C0539A8FCB21CFA9D4047EABFF4EF46321F14809AD084A7652C3395504CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518347321.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_142d000_2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 02e05c699ab640b4f521efa2dbd053f22d52b625087f9ffeb828d42522be7060
                    • Instruction ID: dcdebabdccb3089d4893ef5bba35e3195c8c1a5466ee7fd988c56e1d88208640
                    • Opcode Fuzzy Hash: 02e05c699ab640b4f521efa2dbd053f22d52b625087f9ffeb828d42522be7060
                    • Instruction Fuzzy Hash: D52137B1904200DFDB05DF58D9C4B36BBA5FB88314F74C56ED8094B7A6C336D486CA61
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518347321.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_142d000_2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                    • Instruction ID: cb5fd165634890d5f356bd1c76db592268e3aca81f025c84cb0f423fd9c5d20d
                    • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                    • Instruction Fuzzy Hash: 9311D075904240CFDB06CF54D9C4B26BF71FB44314F24C6AAD8494B766C33AD45ACB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.4518489049.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1470000_2.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7e3b3c61ce5bc80b039efb39b7fb40b5b7f74796c22281a71639d2f6395673bb
                    • Instruction ID: a58572f4d9c5c035f83d99a13f55a13dc93baab1f690d211c2733718b417f77f
                    • Opcode Fuzzy Hash: 7e3b3c61ce5bc80b039efb39b7fb40b5b7f74796c22281a71639d2f6395673bb
                    • Instruction Fuzzy Hash: 70524A71A0061ACFCB25CF58C880AEEB7B2FF45304F5585AAE915BB261D770F985CB90