Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
66dcab0bcba58_crypted.exe

Overview

General Information

Sample name:66dcab0bcba58_crypted.exe
Analysis ID:1507479
MD5:751e3d161454b4c4aa4cf9ff902ebe1c
SHA1:25ea26e9037576f135a8f950ba47afe70195b2e9
SHA256:7734438b2296ded96633a8f71fdccc2f4fdcff14c933facac7b44007226d3144
Tags:exe
Infos:

Detection

PureLog Stealer, RedLine, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected zgRAT
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Enables security privileges
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 66dcab0bcba58_crypted.exe (PID: 3760 cmdline: "C:\Users\user\Desktop\66dcab0bcba58_crypted.exe" MD5: 751E3D161454B4C4AA4CF9FF902EBE1C)
    • conhost.exe (PID: 7088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 3984 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • conhost.exe (PID: 2976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.2123504917.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.2115722247.0000000003965000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      Process Memory Space: RegAsm.exe PID: 3984JoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.66dcab0bcba58_crypted.exe.3965570.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          0.2.66dcab0bcba58_crypted.exe.3965570.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.66dcab0bcba58_crypted.exe.3965570.0.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
            • 0x43aad:$s1: file:///
            • 0x43a09:$s2: {11111-22222-10009-11112}
            • 0x43a3d:$s3: {11111-22222-50001-00000}
            • 0x4096b:$s4: get_Module
            • 0x3b155:$s5: Reverse
            • 0x3be05:$s6: BlockCopy
            • 0x3b0d4:$s7: ReadByte
            • 0x43abf:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
            6.2.RegAsm.exe.400000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              6.2.RegAsm.exe.400000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 4 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 66dcab0bcba58_crypted.exeAvira: detected
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 66dcab0bcba58_crypted.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 66dcab0bcba58_crypted.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: RegAsm.exe, 00000006.00000002.2125559890.000000000304C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000006.00000002.2125559890.000000000304C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000006.00000002.2125559890.000000000304C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000006.00000002.2125559890.000000000304C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000006.00000002.2125559890.0000000002FE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                Source: RegAsm.exe, 00000006.00000002.2125559890.0000000002FE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000031F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_f73681f1-b

                System Summary

                barindex
                Source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 66dcab0bcba58_crypted.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 504320
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02E177126_2_02E17712
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02E174686_2_02E17468
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02E1745A6_2_02E1745A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: SecurityJump to behavior
                Source: 66dcab0bcba58_crypted.exe, 00000000.00000000.1391386352.00000000005E0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVQP.exeP vs 66dcab0bcba58_crypted.exe
                Source: 66dcab0bcba58_crypted.exe, 00000000.00000002.2115148915.00000000009CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 66dcab0bcba58_crypted.exe
                Source: 66dcab0bcba58_crypted.exe, 00000000.00000002.2115722247.0000000003965000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCopita.exe" vs 66dcab0bcba58_crypted.exe
                Source: 66dcab0bcba58_crypted.exeBinary or memory string: OriginalFilenameVQP.exeP vs 66dcab0bcba58_crypted.exe
                Source: 66dcab0bcba58_crypted.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 66dcab0bcba58_crypted.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.evad.winEXE@5/2@0/0
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\66dcab0bcba58_crypted.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2976:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7088:120:WilError_03
                Source: 66dcab0bcba58_crypted.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 66dcab0bcba58_crypted.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\66dcab0bcba58_crypted.exe "C:\Users\user\Desktop\66dcab0bcba58_crypted.exe"
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: textshaping.dllJump to behavior
                Source: 66dcab0bcba58_crypted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 66dcab0bcba58_crypted.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: 66dcab0bcba58_crypted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02E1E390 push eax; ret 6_2_02E1E391
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02E1D040 push 18418B05h; ret 6_2_02E1D2A3
                Source: 66dcab0bcba58_crypted.exeStatic PE information: section name: .text entropy: 7.997924750654594
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory allocated: F50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2E10000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2F80000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4F80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exe TID: 2740Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeCode function: 0_2_029624B1 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_029624B1
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 456000Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 10EB008Jump to behavior
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000031F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                Source: RegAsm.exe, 00000006.00000002.2125559890.00000000031F8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                Source: C:\Users\user\Desktop\66dcab0bcba58_crypted.exeQueries volume information: C:\Users\user\Desktop\66dcab0bcba58_crypted.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: 66dcab0bcba58_crypted.exe, 00000000.00000002.2115148915.0000000000A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
                Source: 66dcab0bcba58_crypted.exe, 00000000.00000002.2115148915.0000000000A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVP.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2123504917.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2115722247.0000000003965000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3984, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.raw.unpack, type: UNPACKEDPE

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2123504917.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2115722247.0000000003965000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3984, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.66dcab0bcba58_crypted.exe.3965570.0.raw.unpack, type: UNPACKEDPE
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                412
                Process Injection
                1
                Masquerading
                11
                Input Capture
                111
                Security Software Discovery
                Remote Services11
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Junk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
                Process Injection
                NTDS12
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                66dcab0bcba58_crypted.exe100%AviraHEUR/AGEN.1351932
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                https://api.ip.s0%Avira URL Cloudsafe
                https://api.ip.sb/ip0%Avira URL Cloudsafe
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                https://api.ip.sb/ipRegAsm.exe, 00000006.00000002.2125559890.0000000002FE5000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.ip.sRegAsm.exe, 00000006.00000002.2125559890.0000000002FE5000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://discord.com/api/v9/users/RegAsm.exe, 00000006.00000002.2125559890.00000000030B2000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1507479
                Start date and time:2024-09-08 14:55:43 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 48s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:10
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:66dcab0bcba58_crypted.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@5/2@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 19
                • Number of non-executed functions: 2
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: 66dcab0bcba58_crypted.exe
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\66dcab0bcba58_crypted.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):42
                Entropy (8bit):4.0050635535766075
                Encrypted:false
                SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                MD5:84CFDB4B995B1DBF543B26B86C863ADC
                SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                Malicious:true
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1119
                Entropy (8bit):5.345080863654519
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                MD5:88593431AEF401417595E7A00FE86E5F
                SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.993186332092758
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:66dcab0bcba58_crypted.exe
                File size:513'536 bytes
                MD5:751e3d161454b4c4aa4cf9ff902ebe1c
                SHA1:25ea26e9037576f135a8f950ba47afe70195b2e9
                SHA256:7734438b2296ded96633a8f71fdccc2f4fdcff14c933facac7b44007226d3144
                SHA512:3e474ea0b0511e8361d80fafc52f0f27f5c8659bc7a40dd31168ea79595c68ab0162295d0fea7b6af4746e4b48279644b93281c094d17c271afe4b4f44029435
                SSDEEP:12288:YgdDFJgZ6borc+sShC9ptpLW7XNiib+iXrNnkVr49/R/Qyj1KG6xL:PmZnL0ptc7XNiiaiXBkRc14
                TLSH:A0B423401ACA89FDF4A7D9B3CD3FD2108B267F44613C108BC69E589F90E9E5434A76A7
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ........@.. .......................@............`................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x47e8ae
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x66DCA411 [Sat Sep 7 19:05:53 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x7e8580x53.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x800000x610.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x820000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x7e7200x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x7c8b40x7ca00e9ba6a9d797e4f488cf436801295c939False0.9967794007021064data7.997924750654594IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x800000x6100x800691e3885d6b03f247d1ff3db7d7cf280False0.34716796875data3.415794247909268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x820000xc0x200428bc1e1bfabad22ef6f9fcbbcf213feFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x800a00x37cdata0.4551569506726457
                RT_MANIFEST0x804200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                DLLImport
                mscoree.dll_CorExeMain
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:08:56:36
                Start date:08/09/2024
                Path:C:\Users\user\Desktop\66dcab0bcba58_crypted.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\66dcab0bcba58_crypted.exe"
                Imagebase:0x560000
                File size:513'536 bytes
                MD5 hash:751E3D161454B4C4AA4CF9FF902EBE1C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2115722247.0000000003965000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:08:56:36
                Start date:08/09/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6ee680000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:6
                Start time:08:57:49
                Start date:08/09/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Imagebase:0xe30000
                File size:65'440 bytes
                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.2123504917.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:7
                Start time:08:57:49
                Start date:08/09/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6ee680000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:48.2%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:30.4%
                  Total number of Nodes:23
                  Total number of Limit Nodes:1

                  Callgraph

                  Control-flow Graph

                  APIs
                  • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02962423,02962413), ref: 02962620
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02962633
                  • Wow64GetThreadContext.KERNEL32(000002F8,00000000), ref: 02962651
                  • ReadProcessMemory.KERNELBASE(000002F4,?,02962467,00000004,00000000), ref: 02962675
                  • VirtualAllocEx.KERNELBASE(000002F4,?,?,00003000,00000040), ref: 029626A0
                  • WriteProcessMemory.KERNELBASE(000002F4,00000000,?,?,00000000,?), ref: 029626F8
                  • WriteProcessMemory.KERNELBASE(000002F4,00400000,?,?,00000000,?,00000028), ref: 02962743
                  • WriteProcessMemory.KERNELBASE(000002F4,?,?,00000004,00000000), ref: 02962781
                  • Wow64SetThreadContext.KERNEL32(000002F8,00BE0000), ref: 029627BD
                  • ResumeThread.KERNELBASE(000002F8), ref: 029627CC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2115685023.0000000002962000.00000040.00000800.00020000.00000000.sdmp, Offset: 02962000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2962000_66dcab0bcba58_crypted.jbxd
                  Similarity
                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                  • API String ID: 2687962208-1257834847
                  • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                  • Instruction ID: 6adb1b7a9bf685b6e800a49956092fe44902478b9254ca4004347032738e7b40
                  • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                  • Instruction Fuzzy Hash: 14B1D67664024AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA51CB94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 24 296280e Wow64SetThreadContext ResumeThread
                  APIs
                  • Wow64SetThreadContext.KERNEL32(000002F8,00BE0000), ref: 029627BD
                  • ResumeThread.KERNELBASE(000002F8), ref: 029627CC
                  Memory Dump Source
                  • Source File: 00000000.00000002.2115685023.0000000002962000.00000040.00000800.00020000.00000000.sdmp, Offset: 02962000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2962000_66dcab0bcba58_crypted.jbxd
                  Similarity
                  • API ID: Thread$ContextResumeWow64
                  • String ID:
                  • API String ID: 1826235168-0
                  • Opcode ID: 2a031f14ae9a89ed3386bac3b4d03e4953c3f85682a8834f0a4965134a61e3a9
                  • Instruction ID: 25313f1756dc25f659fb2fe162e36a9200c0a76eba31830aace5e952311ffcda
                  • Opcode Fuzzy Hash: 2a031f14ae9a89ed3386bac3b4d03e4953c3f85682a8834f0a4965134a61e3a9
                  • Instruction Fuzzy Hash: 09D0C271648289ABCF70DF99DCD0FEE73E8BF4D320F401451AA1D8B615D6316B009B20

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 26 f50b28-f50b6c 30 f50b6e-f50b7c 26->30 32 f50b82-f50ba2 30->32 33 f50d88-f50e29 VirtualProtectEx 30->33 32->33 34 f50ba8-f50bb3 32->34 39 f50e30-f50e44 33->39 40 f50e2b 33->40 34->33 35 f50bb9-f50bc4 34->35 35->30 38 f50bc6-f50bcb 35->38 41 f50bce-f50bd3 38->41 40->39 41->33 42 f50bd9-f50be6 41->42 42->33 43 f50bec-f50bf8 42->43 44 f50c01-f50c06 43->44 45 f50bfa-f50c00 43->45 44->33 46 f50c0c-f50c13 44->46 45->44 46->33 47 f50c19-f50c1f 46->47 47->33 48 f50c25-f50c30 47->48 48->41 49 f50c32-f50c41 48->49 50 f50c47-f50c4e 49->50 51 f50d7e-f50d85 49->51 52 f50c50-f50c57 50->52 53 f50c58-f50c60 50->53 52->53 53->33 54 f50c66-f50c72 53->54 55 f50c74-f50c7a 54->55 56 f50c7b-f50c80 54->56 55->56 56->33 57 f50c86-f50c8d 56->57 57->33 58 f50c93-f50c99 57->58 58->33 59 f50c9f-f50cb5 58->59 60 f50cb7-f50cbe 59->60 61 f50cbf-f50ccd 59->61 60->61 62 f50cd4-f50cf8 61->62 64 f50d07-f50d11 62->64 65 f50cfa-f50cff 62->65 64->33 66 f50d13-f50d1c 64->66 65->64 66->33 67 f50d1e-f50d3d 66->67 68 f50d4c-f50d56 67->68 69 f50d3f-f50d44 67->69 68->33 70 f50d58-f50d5d 68->70 69->68 70->33 71 f50d5f-f50d78 70->71 71->50 71->51
                  APIs
                  • VirtualProtectEx.KERNELBASE(?,03963594,?,?,?), ref: 00F50E1C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2115561646.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f50000_66dcab0bcba58_crypted.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: dda720ce6088de49ae3d4eeaa7eb9fc642e137f6d257e681e807bde34b7ddd2e
                  • Instruction ID: 42a5331752c2e6cdee4324b3cd4f36016f6b02e6a477a9a870bff1bda616011f
                  • Opcode Fuzzy Hash: dda720ce6088de49ae3d4eeaa7eb9fc642e137f6d257e681e807bde34b7ddd2e
                  • Instruction Fuzzy Hash: 09A1CE309042658FCB11DFA8C880AADFFF1FF49314F598669E959AB352C734AC45CBA4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 72 f504b0-f50e29 VirtualProtectEx 75 f50e30-f50e44 72->75 76 f50e2b 72->76 76->75
                  APIs
                  • VirtualProtectEx.KERNELBASE(?,03963594,?,?,?), ref: 00F50E1C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2115561646.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_f50000_66dcab0bcba58_crypted.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 43258aa4d60ce5adf56f001f4291d9e1138b7e765b8b475fa5b602433a152bd1
                  • Instruction ID: 603ef38ef65bfc3dd6733cc4f7991c6fd68ce7bc64f70da0a1975e1dc060fe6a
                  • Opcode Fuzzy Hash: 43258aa4d60ce5adf56f001f4291d9e1138b7e765b8b475fa5b602433a152bd1
                  • Instruction Fuzzy Hash: 3A21EFB590025DAFCB10DF9AD885BDEFFB4FB48320F10812AE918A7240C775A954CFA1

                  Execution Graph

                  Execution Coverage:9.9%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:101
                  Total number of Limit Nodes:4
                  execution_graph 14917 2e146c0 14918 2e146d2 14917->14918 14919 2e146de 14918->14919 14923 2e147f8 14918->14923 14928 2e1425c 14919->14928 14924 2e1481d 14923->14924 14932 2e148f8 14924->14932 14936 2e14908 14924->14936 14929 2e14267 14928->14929 14944 2e17150 14929->14944 14931 2e14703 14933 2e14908 14932->14933 14934 2e14a0c 14933->14934 14940 2e1456c 14933->14940 14934->14934 14938 2e1492f 14936->14938 14937 2e14a0c 14937->14937 14938->14937 14939 2e1456c CreateActCtxA 14938->14939 14939->14937 14941 2e15998 CreateActCtxA 14940->14941 14943 2e15a5b 14941->14943 14945 2e1715b 14944->14945 14948 2e17160 14945->14948 14947 2e18b8d 14947->14931 14949 2e1716b 14948->14949 14952 2e17190 14949->14952 14951 2e18c62 14951->14947 14953 2e1719b 14952->14953 14956 2e171c0 14953->14956 14955 2e18d65 14955->14951 14958 2e171cb 14956->14958 14957 2e1a189 14957->14955 14958->14957 14961 2e1e8f8 14958->14961 14966 2e1e8e8 14958->14966 14962 2e1e919 14961->14962 14963 2e1e93d 14962->14963 14971 2e1eaa2 14962->14971 14975 2e1eaa8 14962->14975 14963->14957 14967 2e1e919 14966->14967 14968 2e1e93d 14967->14968 14969 2e1eaa2 KiUserCallbackDispatcher 14967->14969 14970 2e1eaa8 KiUserCallbackDispatcher 14967->14970 14968->14957 14969->14968 14970->14968 14972 2e1eaa8 14971->14972 14973 2e1eaef 14972->14973 14979 2e1e688 14972->14979 14973->14963 14976 2e1eab5 14975->14976 14977 2e1eaef 14976->14977 14978 2e1e688 KiUserCallbackDispatcher 14976->14978 14977->14963 14978->14977 14980 2e1e693 14979->14980 14982 2e1f400 14980->14982 14983 2e1e7b4 14980->14983 14982->14982 14984 2e1e7bf 14983->14984 14985 2e171c0 KiUserCallbackDispatcher 14984->14985 14986 2e1f46f 14985->14986 14989 2e1f8f0 14986->14989 14987 2e1f47e 14987->14982 14990 2e1f91e 14989->14990 14991 2e1f9ea KiUserCallbackDispatcher 14990->14991 14992 2e1f9ef 14990->14992 14991->14992 14993 2e1ebc0 14994 2e1ec06 14993->14994 14998 2e1eda0 14994->14998 15001 2e1ed8f 14994->15001 14995 2e1ecf3 15005 2e1e750 14998->15005 15002 2e1eda0 15001->15002 15003 2e1e750 DuplicateHandle 15002->15003 15004 2e1edce 15003->15004 15004->14995 15006 2e1ee08 DuplicateHandle 15005->15006 15007 2e1edce 15006->15007 15007->14995 15008 2e1c830 15012 2e1c917 15008->15012 15022 2e1c928 15008->15022 15009 2e1c83f 15013 2e1c928 15012->15013 15017 2e1c95c 15013->15017 15032 2e19e7c 15013->15032 15016 2e1c954 15016->15017 15018 2e1cb60 GetModuleHandleW 15016->15018 15017->15009 15019 2e1cb8d 15018->15019 15019->15009 15023 2e1c939 15022->15023 15027 2e1c95c 15022->15027 15024 2e19e7c GetModuleHandleW 15023->15024 15025 2e1c944 15024->15025 15025->15027 15030 2e1cbc0 2 API calls 15025->15030 15031 2e1cbb0 2 API calls 15025->15031 15026 2e1c954 15026->15027 15028 2e1cb60 GetModuleHandleW 15026->15028 15027->15009 15029 2e1cb8d 15028->15029 15029->15009 15030->15026 15031->15026 15033 2e1cb18 GetModuleHandleW 15032->15033 15035 2e1c944 15033->15035 15035->15017 15036 2e1cbb0 15035->15036 15041 2e1cbc0 15035->15041 15037 2e19e7c GetModuleHandleW 15036->15037 15038 2e1cbd4 15036->15038 15037->15038 15040 2e1cbf9 15038->15040 15046 2e1c328 15038->15046 15040->15016 15042 2e19e7c GetModuleHandleW 15041->15042 15043 2e1cbd4 15042->15043 15044 2e1cbf9 15043->15044 15045 2e1c328 LoadLibraryExW 15043->15045 15044->15016 15045->15044 15047 2e1cda0 LoadLibraryExW 15046->15047 15049 2e1ce19 15047->15049 15049->15040

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 807 2e17712-2e17742 809 2e17744 807->809 810 2e17749-2e17844 807->810 809->810 812 2e17fb9-2e17fe1 810->812 813 2e1784a-2e17985 810->813 816 2e186e8-2e186f1 812->816 857 2e17f81-2e17fab 813->857 858 2e1798b-2e179e6 813->858 817 2e186f7-2e1870f 816->817 818 2e17fef-2e17ff9 816->818 820 2e18000-2e180da 818->820 821 2e17ffb 818->821 980 2e180e0 call 2e189d0 820->980 981 2e180e0 call 2e189c2 820->981 821->820 838 2e180e6-2e180f3 840 2e180f5-2e18101 838->840 841 2e1811d 838->841 843 2e18103-2e18109 840->843 844 2e1810b-2e18111 840->844 842 2e18123-2e18143 841->842 849 2e181a3-2e18223 842->849 850 2e18145-2e1819e 842->850 846 2e1811b 843->846 844->846 846->842 870 2e18225-2e18278 849->870 871 2e1827a-2e182be 849->871 862 2e186e5 850->862 868 2e17fb6 857->868 869 2e17fad 857->869 866 2e179e8 858->866 867 2e179eb-2e179f6 858->867 862->816 866->867 872 2e17e95-2e17e9b 867->872 868->812 869->868 894 2e182c9-2e182d2 870->894 871->894 873 2e17ea1-2e17f1e call 2e101e0 872->873 874 2e179fb-2e17a19 872->874 914 2e17f6d-2e17f73 873->914 875 2e17a70-2e17a85 874->875 876 2e17a1b-2e17a1f 874->876 880 2e17a87 875->880 881 2e17a8c-2e17aa2 875->881 876->875 879 2e17a21-2e17a2c 876->879 884 2e17a62-2e17a68 879->884 880->881 887 2e17aa4 881->887 888 2e17aa9-2e17ac0 881->888 891 2e17a6a-2e17a6b 884->891 892 2e17a2e-2e17a32 884->892 887->888 889 2e17ac2 888->889 890 2e17ac7-2e17add 888->890 889->890 897 2e17ae4-2e17aeb 890->897 898 2e17adf 890->898 899 2e17aee-2e17bc6 891->899 895 2e17a34 892->895 896 2e17a38-2e17a50 892->896 902 2e18332-2e18341 894->902 895->896 903 2e17a52 896->903 904 2e17a57-2e17a5f 896->904 897->899 898->897 905 2e17bc8-2e17bca 899->905 906 2e17bfe-2e17c39 899->906 908 2e18343-2e183cb 902->908 909 2e182d4-2e182fc 902->909 903->904 904->884 905->906 907 2e17bcc-2e17bf8 905->907 915 2e17c3b-2e17c47 906->915 916 2e17c4d-2e17d99 906->916 907->906 944 2e18542-2e1854e 908->944 911 2e18303-2e1832c 909->911 912 2e182fe 909->912 911->902 912->911 919 2e17f20-2e17f6a 914->919 920 2e17f75 914->920 915->916 923 2e17d9b-2e17d9f 916->923 924 2e17dfd-2e17e12 916->924 919->914 920->857 923->924 927 2e17da1-2e17db0 923->927 929 2e17e14 924->929 930 2e17e19-2e17e3a 924->930 931 2e17def-2e17df5 927->931 929->930 933 2e17e41-2e17e60 930->933 934 2e17e3c 930->934 938 2e17db2-2e17db6 931->938 939 2e17df7-2e17df8 931->939 935 2e17e62 933->935 936 2e17e67-2e17e87 933->936 934->933 935->936 942 2e17e89 936->942 943 2e17e8e 936->943 940 2e17dc0-2e17de1 938->940 941 2e17db8-2e17dbc 938->941 946 2e17e92 939->946 949 2e17de3 940->949 950 2e17de8-2e17dec 940->950 941->940 942->943 943->946 947 2e183d0-2e183d9 944->947 948 2e18554-2e185b2 944->948 946->872 951 2e183e2-2e18536 947->951 952 2e183db 947->952 965 2e185b4-2e185e7 948->965 966 2e185e9-2e18613 948->966 949->950 950->931 967 2e1853c 951->967 952->951 954 2e18472-2e184b0 952->954 955 2e184b5-2e184f5 952->955 956 2e183e8-2e18428 952->956 957 2e1842d-2e1846d 952->957 954->967 955->967 956->967 957->967 974 2e1861c-2e186af 965->974 966->974 967->944 978 2e186b6-2e186d6 974->978 978->862 980->838 981->838
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c89beadc89a77d184e5d8cbac5c053b48b2416aaf17712179cd85f317e17acc
                  • Instruction ID: 2214037aa0922aee8754e56e24d3961718ccea3d858cf396cb61ea16df3ed85b
                  • Opcode Fuzzy Hash: 3c89beadc89a77d184e5d8cbac5c053b48b2416aaf17712179cd85f317e17acc
                  • Instruction Fuzzy Hash: F5B17675E016198FDB58DF6AC944ADEBBF2BF89300F14D1AAD809A7364DB305A81CF50

                  Control-flow Graph

                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: ec132d5f54e87174de7eb674f39fdd557f2def419b6f64582b56cc927047ec59
                  • Instruction ID: f7d3b1f38e73ec3bb3cf6a680aecd678876984408772b7a7661579af8e8e9655
                  • Opcode Fuzzy Hash: ec132d5f54e87174de7eb674f39fdd557f2def419b6f64582b56cc927047ec59
                  • Instruction Fuzzy Hash: 65715770A40B058FDB24DF6AD05575ABBF1FF88704F10992ED48AD7A50DB34E845CB92

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 60 2e1456c-2e15a59 CreateActCtxA 63 2e15a62-2e15abc 60->63 64 2e15a5b-2e15a61 60->64 71 2e15acb-2e15acf 63->71 72 2e15abe-2e15ac1 63->72 64->63 73 2e15ad1-2e15add 71->73 74 2e15ae0 71->74 72->71 73->74 76 2e15ae1 74->76 76->76
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 02E15A49
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: ca1c86dd1b36883ffdc709d2cdcbdee131f13b62523fe9a36c5a4b83ec2f8b2b
                  • Instruction ID: 66d6f173bcc81067292495abc217cf0a2bfd9f4bb6ddd346b253c5cb637da579
                  • Opcode Fuzzy Hash: ca1c86dd1b36883ffdc709d2cdcbdee131f13b62523fe9a36c5a4b83ec2f8b2b
                  • Instruction Fuzzy Hash: 8F41F1B0C4071DCFDB24DFA9C884B9EBBB5BF88704F60816AD408AB250DB756949CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 77 2e1598c-2e15992 78 2e15998-2e15a59 CreateActCtxA 77->78 80 2e15a62-2e15abc 78->80 81 2e15a5b-2e15a61 78->81 88 2e15acb-2e15acf 80->88 89 2e15abe-2e15ac1 80->89 81->80 90 2e15ad1-2e15add 88->90 91 2e15ae0 88->91 89->88 90->91 93 2e15ae1 91->93 93->93
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 02E15A49
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 292a5d8f8ae461fba126a403ea443a5dcb1b9c367bba7843b55175eec26052d3
                  • Instruction ID: 3a7f23409c5489b71d24994ff1a7094f3548f162bc35b704219cda210a3a6490
                  • Opcode Fuzzy Hash: 292a5d8f8ae461fba126a403ea443a5dcb1b9c367bba7843b55175eec26052d3
                  • Instruction Fuzzy Hash: 8F41E071D40719CFDB24DFA9C884BDEBBB5BF88704F60816AD408AB250DB75694ACF50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 94 2e1e750-2e1ee9c DuplicateHandle 96 2e1eea5-2e1eec2 94->96 97 2e1ee9e-2e1eea4 94->97 97->96
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E1EDCE,?,?,?,?,?), ref: 02E1EE8F
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: a966ead6cd73be1428a57a2cfd9595fe0d9bfa0d52471d3ebf6b0b8ae0b383ec
                  • Instruction ID: 6a639868eb29203e18bcc90f4edeebc1e9324880c579e5e8e464b59833731c58
                  • Opcode Fuzzy Hash: a966ead6cd73be1428a57a2cfd9595fe0d9bfa0d52471d3ebf6b0b8ae0b383ec
                  • Instruction Fuzzy Hash: A321E6B59003499FDB10CF9AD984AEEFFF4EB48710F14842AE914A3310D778A954CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 100 2e1ee00-2e1ee02 101 2e1ee08-2e1ee9c DuplicateHandle 100->101 102 2e1eea5-2e1eec2 101->102 103 2e1ee9e-2e1eea4 101->103 103->102
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E1EDCE,?,?,?,?,?), ref: 02E1EE8F
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 3845582ed8c745d0000d45911abd99c39b11eba85007a6e4ed17e1d46acd3c96
                  • Instruction ID: 180833365335c3b9bc06cf3627dc677d6611bb68493c6c2a75fb2e5a6866fade
                  • Opcode Fuzzy Hash: 3845582ed8c745d0000d45911abd99c39b11eba85007a6e4ed17e1d46acd3c96
                  • Instruction Fuzzy Hash: 7121E6B5D01249AFDB10CF9AD984ADEFFF4EB48320F14841AE914A3310D378A944CF65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 106 2e1c328-2e1cde0 108 2e1cde2-2e1cde5 106->108 109 2e1cde8-2e1ce17 LoadLibraryExW 106->109 108->109 110 2e1ce20-2e1ce3d 109->110 111 2e1ce19-2e1ce1f 109->111 111->110
                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E1CBF9,00000800,00000000,00000000), ref: 02E1CE0A
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 16382ee81aaae04b0d8d5ffd567a17538ac27dbef395cc690e18bb5bf87ab3e0
                  • Instruction ID: 1301c30eb08e057175f0fb854c97308d11265abaccb3a1a0aa5adfa9b08a4d14
                  • Opcode Fuzzy Hash: 16382ee81aaae04b0d8d5ffd567a17538ac27dbef395cc690e18bb5bf87ab3e0
                  • Instruction Fuzzy Hash: 5C1114B69003499FDB10CF9AC844BEEFBF4EB88714F10942EE519A7200C379A545CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 114 2e1cd99-2e1cde0 116 2e1cde2-2e1cde5 114->116 117 2e1cde8-2e1ce17 LoadLibraryExW 114->117 116->117 118 2e1ce20-2e1ce3d 117->118 119 2e1ce19-2e1ce1f 117->119 119->118
                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E1CBF9,00000800,00000000,00000000), ref: 02E1CE0A
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: e7eae7766a6d73ccf41673672ae71cff55646dcf10ec6e7f24844a0d9a3923ea
                  • Instruction ID: abbfc842c7ad25cbb99bfc2003dbeafeb1f7c605e8990e6a1dfeb90f93049c61
                  • Opcode Fuzzy Hash: e7eae7766a6d73ccf41673672ae71cff55646dcf10ec6e7f24844a0d9a3923ea
                  • Instruction Fuzzy Hash: 4A11D0B69003499FDB10CF9AC844B9EFBF5EB88624F14842AE519A7200C779A545CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 122 2e19e7c-2e1cb58 124 2e1cb60-2e1cb8b GetModuleHandleW 122->124 125 2e1cb5a-2e1cb5d 122->125 126 2e1cb94-2e1cba8 124->126 127 2e1cb8d-2e1cb93 124->127 125->124 127->126
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,02E1C944), ref: 02E1CB7E
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 4731c00805a1f8cf572ee77d1d944ad7506aa1664a261856cf0cc102c81472ef
                  • Instruction ID: a3f0a25a8c35141b6daaa5912748a6bb4c4cd1cf36eead57e89ca3e3a75cbc36
                  • Opcode Fuzzy Hash: 4731c00805a1f8cf572ee77d1d944ad7506aa1664a261856cf0cc102c81472ef
                  • Instruction Fuzzy Hash: 931143B5C007498FCB10CF9AD844BDEFBF4EB88624F20D42AD419A7200C379A545CFA2
                  Memory Dump Source
                  • Source File: 00000006.00000002.2124184451.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_141d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab5316bb0d60ee68bd6b91da36528c5980ab2d787272980887908cf1b2e325f1
                  • Instruction ID: 135e41a1dffa232a2d759f108f951cee3642fad32fbd6a7863e5d290b591b180
                  • Opcode Fuzzy Hash: ab5316bb0d60ee68bd6b91da36528c5980ab2d787272980887908cf1b2e325f1
                  • Instruction Fuzzy Hash: 1B2106B1904304DFDB05DF54D9C8B17BF65FB84328F24856AD9090B36AC336D456CBA2
                  Memory Dump Source
                  • Source File: 00000006.00000002.2124225485.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 216567aee30807d00cf84aac69e593318415fc568fe34b5175f3ea0232a402f2
                  • Instruction ID: 92dddcb38d32e47da19f56987e33a72bb4835b8bd49929c7cc366a1771e1b565
                  • Opcode Fuzzy Hash: 216567aee30807d00cf84aac69e593318415fc568fe34b5175f3ea0232a402f2
                  • Instruction Fuzzy Hash: 68212271A04300EFDB05DF94D9C4B26BBA1FB85324F60C6AED8094B362C736D486CA71
                  Memory Dump Source
                  • Source File: 00000006.00000002.2124225485.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 23f17518a3fefe9d7643a2e33f7eb47896b8f5897d76f8fd5642c4d7e28d9b79
                  • Instruction ID: 9a9df7ea1df7686586ff781a0037526ad6da8d58d10c5a2a7a0f603bae8bfb64
                  • Opcode Fuzzy Hash: 23f17518a3fefe9d7643a2e33f7eb47896b8f5897d76f8fd5642c4d7e28d9b79
                  • Instruction Fuzzy Hash: 982142B1A04340DFDB14DF54D884B16BBA1FB84318F60C56ED80A4B366C33AC487CA62
                  Memory Dump Source
                  • Source File: 00000006.00000002.2124225485.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f13f4a8be16a53987c011dc3726e46dda63cafca8a45274dd314e9dedd4747a
                  • Instruction ID: 93ef987288a8cb000761eb4550d9b8b0e0c733c0c84f49733b1bc084dc2afa65
                  • Opcode Fuzzy Hash: 7f13f4a8be16a53987c011dc3726e46dda63cafca8a45274dd314e9dedd4747a
                  • Instruction Fuzzy Hash: 212180755093808FCB12CF24D990716BF71EB46218F28C5DBD8498B667C33A984ACB62
                  Memory Dump Source
                  • Source File: 00000006.00000002.2124184451.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_141d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a22cb2ac7e8ca2eec31ed2fac24db7ed4a2581669a60e4f58f51b4d2525f63fe
                  • Instruction ID: 863bbec6dc660901cd7e29cd0dd6a794330b3ef6a51a1c92bc31e737f1e93a31
                  • Opcode Fuzzy Hash: a22cb2ac7e8ca2eec31ed2fac24db7ed4a2581669a60e4f58f51b4d2525f63fe
                  • Instruction Fuzzy Hash: B411B4B6904240CFCB16CF54D5C4B16BF71FB84324F2485AAD9094B76BC33AD456CBA1
                  Memory Dump Source
                  • Source File: 00000006.00000002.2124225485.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e5598050a76b1bbb03a66d3720a50d8acb638a64c40f8b375dc4a1e083d93ad6
                  • Instruction ID: 978b7d1d16d43e630214f61621f1719ee49fd84a044a7fed922d3b9612161eba
                  • Opcode Fuzzy Hash: e5598050a76b1bbb03a66d3720a50d8acb638a64c40f8b375dc4a1e083d93ad6
                  • Instruction Fuzzy Hash: 3011BB75904280DFDB02CF54C5C0B16BBA1FB85224F28C6AED8494B766C33AD48ACB61
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 83db5ef1e76b7d04fe7c546a6e8e77236baae991619a7375432b702e2b268c22
                  • Instruction ID: 5a0b87b05d7c6fd12e23dff8b3d4b9346c97af7f990afbb8dedb796c6230e43b
                  • Opcode Fuzzy Hash: 83db5ef1e76b7d04fe7c546a6e8e77236baae991619a7375432b702e2b268c22
                  • Instruction Fuzzy Hash: 1D815BB9E052498FD718EF6AE8506A9BFF2FFC8600F54C16AC4049B379EB705846CB51
                  Memory Dump Source
                  • Source File: 00000006.00000002.2125353454.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_6_2_2e10000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 449b25d93e7bc63977ad62914bd296a3a037b97c340482a5149778fcb5a791a8
                  • Instruction ID: ea95776d3c209d6744adfa60a19ec3b155b0ca0b4cf32b5f31f1d0b58b8c974f
                  • Opcode Fuzzy Hash: 449b25d93e7bc63977ad62914bd296a3a037b97c340482a5149778fcb5a791a8
                  • Instruction Fuzzy Hash: 3261EBB4A016098FD71CEF6AE8506AABBF3FFC8600F54C16AD4049B37CEB7058458B51