Edit tour

Windows Analysis Report
INCD-IronSwords-Operation-Guidelines-2024.exe

Overview

General Information

Sample name:INCD-IronSwords-Operation-Guidelines-2024.exe
Analysis ID:1537046
MD5:2e6c607fe67f744a3b596e756933bc54
SHA1:a70a1dcb293a85ea60e00524bd21bcb94fb9ef5f
SHA256:7c585fbcc64c3dcdb5c1562868c97dea3c7f84f4edbf6c6c799834a03766ff65
Tags:exewww-oref-org-iluser-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • INCD-IronSwords-Operation-Guidelines-2024.exe (PID: 7036 cmdline: "C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exe" MD5: 2E6C607FE67F744A3B596E756933BC54)
    • conhost.exe (PID: 2448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: INCD-IronSwords-Operation-Guidelines-2024.exeAvira: detected
Source: INCD-IronSwords-Operation-Guidelines-2024.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: INCD-IronSwords-Operation-Guidelines-2024.exeJoe Sandbox ML: detected
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.oref.org.il
Source: INCD-IronSwords-Operation-Guidelines-2024.exeString found in binary or memory: http://www.videolan.org/x264.html
Source: INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.oref.org.il/
Source: INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.0000000000889000.00000004.00000020.00020000.00000000.sdmp, INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.oref.org.il/alerts/RemainderConfig_eng.json
Source: INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.0000000000889000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.oref.org.il:443/alerts/RemainderConfig_eng.json
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@2/0@1/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2448:120:WilError_03
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: INCD-IronSwords-Operation-Guidelines-2024.exeReversingLabs: Detection: 57%
Source: unknownProcess created: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exe "C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exe"
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeSection loaded: kernel.appcore.dllJump to behavior
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic file information: File size 9798656 > 1048576
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x938a00
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: INCD-IronSwords-Operation-Guidelines-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
Source: INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.0000000000889000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeCode function: 0_2_009E2593 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_009E2593
Source: C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1537046 Sample: INCD-IronSwords-Operation-G... Startdate: 18/10/2024 Architecture: WINDOWS Score: 64 11 www.oref.org.il 2->11 13 fp2e7a.wpc.phicdn.net 2->13 15 fp2e7a.wpc.2be4.phicdn.net 2->15 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Machine Learning detection for sample 2->21 23 AI detected suspicious sample 2->23 7 INCD-IronSwords-Operation-Guidelines-2024.exe 1 2->7         started        signatures3 process4 process5 9 conhost.exe 7->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
INCD-IronSwords-Operation-Guidelines-2024.exe58%ReversingLabsWin32.Trojan.Generic
INCD-IronSwords-Operation-Guidelines-2024.exe100%AviraHEUR/AGEN.1317001
INCD-IronSwords-Operation-Guidelines-2024.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalse
    unknown
    www.oref.org.il
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.oref.org.il:443/alerts/RemainderConfig_eng.jsonINCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.0000000000889000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://www.oref.org.il/alerts/RemainderConfig_eng.jsonINCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.0000000000889000.00000004.00000020.00020000.00000000.sdmp, INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.000000000084E000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://www.oref.org.il/INCD-IronSwords-Operation-Guidelines-2024.exe, 00000000.00000002.2237788038.000000000084E000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://www.videolan.org/x264.htmlINCD-IronSwords-Operation-Guidelines-2024.exefalse
              unknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1537046
              Start date and time:2024-10-18 14:16:14 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 42s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:INCD-IronSwords-Operation-Guidelines-2024.exe
              Detection:MAL
              Classification:mal64.winEXE@2/0@1/0
              EGA Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Excluded IPs from analysis (whitelisted): 2.19.126.154, 2.19.126.151, 20.109.210.53, 13.95.31.18
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, a1254.b.akamai.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, www.oref.org.il.edgesuite.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target INCD-IronSwords-Operation-Guidelines-2024.exe, PID 7036 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: INCD-IronSwords-Operation-Guidelines-2024.exe
              No simulations
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              fp2e7a.wpc.phicdn.netJdHvcxG4Up.exeGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              Setup.exeGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              https://eos.atebasyno.com/Jed4ZO4/#Kinfo@pickprotection.comGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              http://yesdarlings.comGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              iieCxV2b1n.msiGet hashmaliciousRedLineBrowse
              • 192.229.221.95
              https://bino8-7920.twil.io/index4.htmlGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              https://u47461937.ct.sendgrid.net/ls/click?upn=u001.90WJ2x5yie-2F4sdO-2BZ5bb0nufavWldnzsl0KnsmK3hMo-2BHMnWSF3DsxzbvDCWDsdFnegn-2BfWobRZ1kbLGMXgyXcGtyLzQM-2FGP3QHbHRPWVr6D0fLK-2BSNRq-2FVCZMabreIai9D-2BxA6whvHN5s1OqTfwm-2FgZQjeYErjyMYjob5nOcXGpRAG25SYwaNre11j-2BHVoXasoyLNyJtD1tPPwnUAPCOFLp9PDvSbufCeZgma-2FIK98-3Dcm_y_Ukbh-2F8Y2Z4RsyLMh2XL7Wo3yUsBZ9SeqI2Qmy9Bgt19mw9e4WkHPMitoZcq809ebbnmk8C6IJ5c7t29jrnIindsFxuY2R9d234nclZXStC9HmqBttLLojHUGnXdAWF5QJUx33skMns1apjumw9Pw3UfSTdjnlg5PrNNACcyuKpBoq4ETSyFgl4lbha5Mxiy3uArHLEv6ML9dlCYMz2aiMvH1U2BEaexXFmP3HsruDeCB11cOufMst2ySj2lo1MOLQ6aZD-2BJx5wirMGc5AFzol7YsHD-2BfJQUWDmNRvkyRWdsBEj0IMNeL5wqNyxjJ5hFrqTXQmCwpYMQ2bnKr-2BkBvSNUHzpUEqp-2BnPgQfjdKbtF3Z3im1MIzPwzt8NSpo3Gg6TTmqFNZ2ScP-2B7-2FoMepCdwrUSGGaAVc4bnbc7YhyZk1NsGgzWXhuiw5qQURbTlrLrNfUfcY80DFOe7nGqmxieALgNl9N387kxhKpFX-2Fnaawfjy5aLaOcnI1bIrW45QsQlpLgwiJocPCDckAx-2FSSuaxIwXkaLYj-2FPzrmv96ov5y2izrBMhWyBmDCPvZ5WDVvkaVY5wttF199PKn9A3y6nDVW-2BcDvQHCHFjHnYq34GMvKniNSIx5hiSo-2BnAFE75yLesQfb-2FtMOsyAp0aASAHTKj4fiYZ1gy2gQ6aTtm45axQJBOPfoW1XG1ZFy5zgMRuRNvLru7MEMaKlOzOBvYn-2BIMfSSpi7rtbb5t8KWTZg-2Br-2FY0Ad2S34htMKob86jSLvk5Zj3Hait9j-2B0TErriVJ9hutTBGU0IAH7S4LkHhpEYm9x8mvC3Gf2BwyPLHtkXi3HaVRoBV6YloGkBzCRSLnpyl2LhtBuhCV3pZreRfYAQGhh7nnEOGs0Wuw1wnYjV9yfByZ0NgFI-2Bs3XMcHsUMwml5eg-3D-3DGet hashmaliciousHTMLPhisherBrowse
              • 192.229.221.95
              http://plankton-app-xfp49.ondigitalocean.appGet hashmaliciousTechSupportScamBrowse
              • 192.229.221.95
              n5h5BaL8q0.exeGet hashmaliciousSality, XWormBrowse
              • 192.229.221.95
              Y41oVdYohe.exeGet hashmaliciousUnknownBrowse
              • 192.229.221.95
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (console) Intel 80386, for MS Windows
              Entropy (8bit):7.993619037598631
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:INCD-IronSwords-Operation-Guidelines-2024.exe
              File size:9'798'656 bytes
              MD5:2e6c607fe67f744a3b596e756933bc54
              SHA1:a70a1dcb293a85ea60e00524bd21bcb94fb9ef5f
              SHA256:7c585fbcc64c3dcdb5c1562868c97dea3c7f84f4edbf6c6c799834a03766ff65
              SHA512:c7c76cbacce62a1560648daa8aa337cf0fbde458d571168d54fe5b78fd2abe9788647518bc137f18462909bb864862fd571a81dd4e1693159ba4ff59a0ebadde
              SSDEEP:196608:Bh8DsT3M4ViqlXgbXh4wCCe6cXKwgExsgwtfjndALMPvhaoS89Cz3:Bh8DiIqlXA46eNKTEynfDdAwPvC57
              TLSH:F9A63345F3A2C41DDCEBA5B00EB07FC2AB27F8791A519B07C3A2966C2E61FB51D105C2
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......DG._.&...&...&..K^...&..K^...&..K^...&......&&.......&.......&..K^...&...&..U&.......&....1..&.......&..Rich.&.................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x402338
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x65216332 [Sat Oct 7 13:54:58 2023 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:1fb5787bb2dca08ea282c0023bcd0c1c
              Instruction
              call 00007F92F90B2938h
              jmp 00007F92F90B2509h
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push esi
              mov ecx, dword ptr [eax+3Ch]
              add ecx, eax
              movzx eax, word ptr [ecx+14h]
              lea edx, dword ptr [ecx+18h]
              add edx, eax
              movzx eax, word ptr [ecx+06h]
              imul esi, eax, 28h
              add esi, edx
              cmp edx, esi
              je 00007F92F90B26ABh
              mov ecx, dword ptr [ebp+0Ch]
              cmp ecx, dword ptr [edx+0Ch]
              jc 00007F92F90B269Ch
              mov eax, dword ptr [edx+08h]
              add eax, dword ptr [edx+0Ch]
              cmp ecx, eax
              jc 00007F92F90B269Eh
              add edx, 28h
              cmp edx, esi
              jne 00007F92F90B267Ch
              xor eax, eax
              pop esi
              pop ebp
              ret
              mov eax, edx
              jmp 00007F92F90B268Bh
              push esi
              call 00007F92F90B2DF2h
              test eax, eax
              je 00007F92F90B26B2h
              mov eax, dword ptr fs:[00000018h]
              mov esi, 00D58964h
              mov edx, dword ptr [eax+04h]
              jmp 00007F92F90B2696h
              cmp edx, eax
              je 00007F92F90B26A2h
              xor eax, eax
              mov ecx, edx
              lock cmpxchg dword ptr [esi], ecx
              test eax, eax
              jne 00007F92F90B2682h
              xor al, al
              pop esi
              ret
              mov al, 01h
              pop esi
              ret
              push ebp
              mov ebp, esp
              cmp dword ptr [ebp+08h], 00000000h
              jne 00007F92F90B2699h
              mov byte ptr [00D58968h], 00000001h
              call 00007F92F90B2BDDh
              call 00007F92F90B3301h
              test al, al
              jne 00007F92F90B2696h
              xor al, al
              pop ebp
              ret
              call 00007F92F90B9B24h
              test al, al
              jne 00007F92F90B269Ch
              push 00000000h
              call 00007F92F90B3308h
              pop ecx
              jmp 00007F92F90B267Bh
              mov al, 01h
              pop ebp
              ret
              push ebp
              mov ebp, esp
              cmp byte ptr [00D58969h], 00000000h
              je 00007F92F90B2696h
              mov al, 01h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1ed140x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x95a0000x1e0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x95b0000x12c4.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x1df980x38.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1ded80x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x180000x12c.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x16b8a0x16c00eb6a40c5d249ad02722f1e85c07ba09dFalse0.5986435439560439COM executable for DOS6.658229702733383IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x180000x73be0x7400c1b2e8586db13c600556b5d1aedbbc0cFalse0.48016567887931033data5.25161682151725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x200000x9395300x938a00a862ea650d266ef36f0127f066380bffunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x95a0000x1e00x200770db2e47ffb208f2afd44290c666f1eFalse0.533203125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x95b0000x12c40x1400d899a7cc5f8b01aeb2db73bbc1d85a0cFalse0.753515625data6.410558964853972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_MANIFEST0x95a0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
              DLLImport
              KERNEL32.dllSleep, CopyFileA, GetLastError, WriteConsoleW, SetEndOfFile, HeapSize, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, GetCurrentProcess, TerminateProcess, RtlUnwind, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, RaiseException, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetFileType, CloseHandle, HeapReAlloc, GetConsoleOutputCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, ReadFile, ReadConsoleW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, GetProcessHeap, CreateFileW, FlushFileBuffers, DecodePointer
              USER32.dllMessageBoxA
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Download Network PCAP: filteredfull

              TimestampSource PortDest PortSource IPDest IP
              Oct 18, 2024 14:17:09.639127970 CEST5646553192.168.2.61.1.1.1
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 18, 2024 14:17:09.639127970 CEST192.168.2.61.1.1.10x8bc7Standard query (0)www.oref.org.ilA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 18, 2024 14:17:09.647754908 CEST1.1.1.1192.168.2.60x8bc7No error (0)www.oref.org.ilwww.oref.org.il.edgesuite.netCNAME (Canonical name)IN (0x0001)false
              Oct 18, 2024 14:17:24.919292927 CEST1.1.1.1192.168.2.60xe772No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
              Oct 18, 2024 14:17:24.919292927 CEST1.1.1.1192.168.2.60xe772No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
              Target ID:0
              Start time:08:17:08
              Start date:18/10/2024
              Path:C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\INCD-IronSwords-Operation-Guidelines-2024.exe"
              Imagebase:0x9e0000
              File size:9'798'656 bytes
              MD5 hash:2E6C607FE67F744A3B596E756933BC54
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:08:17:08
              Start date:18/10/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff66e660000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly