Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sadfwqefrqw3f.exe

Overview

General Information

Sample name:sadfwqefrqw3f.exe
Analysis ID:1541334
MD5:f57752bb1deef37b1940441f4edddcbe
SHA1:41212eebd65da911210f08d5b0819f2d815a92e5
SHA256:d1f9ccaa3a83a3bb8bf2412f172defee977bfe11c3a5bc8a80c8452d59349cdd
Tags:exeuser-drsilva19852455
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Tries to detect debuggers (CloseHandle check)
Tries to evade analysis by execution special instruction (VM detection)
Checks if the current process is being debugged
Enables debug privileges
Entry point lies outside standard sections
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • sadfwqefrqw3f.exe (PID: 1848 cmdline: "C:\Users\user\Desktop\sadfwqefrqw3f.exe" MD5: F57752BB1DEEF37B1940441F4EDDDCBE)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x617b17:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0x617b83:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: sadfwqefrqw3f.exeAvira: detected
Source: sadfwqefrqw3f.exeReversingLabs: Detection: 44%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: sadfwqefrqw3f.exeJoe Sandbox ML: detected
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_4155e676-9

Compliance

barindex
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeUnpacked PE file: 0.2.sadfwqefrqw3f.exe.140000000.0.unpack
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49979 version: TLS 1.2
Source: Binary string: D:\Shared\HDAudioEnchancer.pdb source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmp
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: noaserver.com
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ocsp.thawte.com0
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://noaserver.com
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560277164.00000000037D2000.00000004.00000020.00020000.00000000.sdmp, sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://noaserver.com/api/sendreport
Source: sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://noaserver.com/api/sendreportP
Source: sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://noaserver.com/api/sendreporti
Source: sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://noaserver.com/api/sendreportk
Source: sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://noaserver.coms
Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49979 version: TLS 1.2

System Summary

barindex
Source: 00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
Source: 00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
Source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs sadfwqefrqw3f.exe
Source: 00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
Source: 00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
Source: classification engineClassification label: mal100.evad.winEXE@1/0@1/2
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: sadfwqefrqw3f.exeReversingLabs: Detection: 44%
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: xinput1_4.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSection loaded: schannel.dllJump to behavior
Source: sadfwqefrqw3f.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: sadfwqefrqw3f.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: sadfwqefrqw3f.exeStatic file information: File size 57968640 > 1048576
Source: sadfwqefrqw3f.exeStatic PE information: Raw size of .sharper is bigger than: 0x100000 < 0x3747200
Source: Binary string: D:\Shared\HDAudioEnchancer.pdb source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeUnpacked PE file: 0.2.sadfwqefrqw3f.exe.140000000.0.unpack
Source: initial sampleStatic PE information: section where entry point is pointing to: .sharper
Source: sadfwqefrqw3f.exeStatic PE information: section name: .sharper
Source: sadfwqefrqw3f.exeStatic PE information: section name: .sharper
Source: sadfwqefrqw3f.exeStatic PE information: section name: .sharper

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeMemory written: PID: 1848 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeMemory written: PID: 1848 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeMemory written: PID: 1848 base: 7FF8C8A6000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeMemory written: PID: 1848 base: 7FF8C891CBC0 value: E9 5A 34 14 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSpecial instruction interceptor: First address: 1465813E8 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSpecial instruction interceptor: First address: 1465813F7 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeFile opened: PhysicalDrive0Jump to behavior
Source: sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000006C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeHandle closed: DEADC0DE
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeProcess token adjusted: DebugJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x14657B8D6Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x14656CA98Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtUnmapViewOfSection: Direct from: 0x143F4D53DJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x1434194C9Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x143F4B83FJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQueryInformationProcess: Direct from: 0x143F53EFBJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x14357FC84Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x1440EF8AAJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Indirect: 0x14339F6A1Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtMapViewOfSection: Direct from: 0x14342A316Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQueryInformationProcess: Direct from: 0x1440E1677Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQueryInformationProcess: Direct from: 0x1440C25B9Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtOpenFile: Direct from: 0x1434212ADJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x143415776Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQueryInformationProcess: Direct from: 0x14412990CJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtSetInformationProcess: Direct from: 0x144126082Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQuerySystemInformation: Direct from: 0x144170E0FJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtClose: Direct from: 0x144120C5F
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x1440E3B8AJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x143F6116CJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQuerySystemInformation: Direct from: 0x1465366F9Jump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtQueryInformationProcess: Direct from: 0x14357E54CJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeNtProtectVirtualMemory: Direct from: 0x143F458ACJump to behavior
Source: C:\Users\user\Desktop\sadfwqefrqw3f.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
22
Virtualization/Sandbox Evasion
1
Credential API Hooking
421
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory22
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Abuse Elevation Control Mechanism
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS113
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sadfwqefrqw3f.exe45%ReversingLabsWin64.Trojan.Barys
sadfwqefrqw3f.exe100%AviraTR/Redcap.xekrt
sadfwqefrqw3f.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
noaserver.com
188.114.96.3
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://curl.se/docs/hsts.htmlsadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpfalse
      unknown
      https://noaserver.com/api/sendreportsadfwqefrqw3f.exe, 00000000.00000002.4560277164.00000000037D2000.00000004.00000020.00020000.00000000.sdmp, sadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005DC000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://curl.se/docs/alt-svc.htmlsadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpfalse
          unknown
          http://crl.thawte.com/ThawteTimestampingCA.crl0sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpfalse
          • URL Reputation: safe
          unknown
          https://curl.se/docs/http-cookies.htmlsadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpfalse
            unknown
            https://noaserver.comsadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://noaserver.com/api/sendreportPsadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://ocsp.thawte.com0sadfwqefrqw3f.exe, 00000000.00000002.4560526963.0000000140299000.00000002.00000001.01000000.00000003.sdmpfalse
                • URL Reputation: safe
                unknown
                https://noaserver.com/api/sendreportksadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://noaserver.comssadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005FE000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://noaserver.com/api/sendreportisadfwqefrqw3f.exe, 00000000.00000002.4559941604.00000000005DC000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      188.114.96.3
                      noaserver.comEuropean Union
                      13335CLOUDFLARENETUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1541334
                      Start date and time:2024-10-24 17:48:14 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 55s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:sadfwqefrqw3f.exe
                      Detection:MAL
                      Classification:mal100.evad.winEXE@1/0@1/2
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target sadfwqefrqw3f.exe, PID 1848 because there are no executed function
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • VT rate limit hit for: sadfwqefrqw3f.exe
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      188.114.96.3rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                      • dddotx.shop/Mine/PWS/fre.php
                      Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                      • paste.ee/d/nwtkd
                      Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                      • www.launchdreamidea.xyz/bd77/
                      PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                      • www.timizoasisey.shop/3p0l/
                      BL.exeGet hashmaliciousFormBookBrowse
                      • www.launchdreamidea.xyz/bd77/
                      w49A5FG3yg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • 733812cm.n9shteam.in/DefaultWordpress.php
                      9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • 733812cm.n9shteam.in/DefaultWordpress.php
                      SecuriteInfo.com.Win32.MalwareX-gen.14607.6011.exeGet hashmaliciousUnknownBrowse
                      • servicetelemetryserver.shop/api/index.php
                      t1zTzS9a3r.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • abdulbek.top/externalvideoprotectdefaultsqlWindowsdlePrivate.php
                      aQdB62N7SB.elfGet hashmaliciousShikitega, XmrigBrowse
                      • main.dsn.ovh/dns/lovely
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSSecuriteInfo.com.Heur.11787.148.exeGet hashmaliciousLummaCBrowse
                      • 172.67.194.239
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 172.67.206.204
                      https://www.canva.com/design/DAGUUU-VdiI/DdL4Z-_loK4X7NMMbGGnJg/view?utm_content=DAGUUU-VdiI&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                      • 104.16.103.112
                      https://www.canva.com/design/DAGUUU-VdiI/DdL4Z-_loK4X7NMMbGGnJg/view?utm_content=DAGUUU-VdiI&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                      • 104.16.103.112
                      https://www.cognitoforms.com/f/dPw6PjKRNEiTBIouwlWxQQ/1Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                      • 104.17.24.14
                      rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                      • 188.114.96.3
                      https://nt3e.com/_1.html?%20send_id=eh&tvi2_RxT=www.networksolutionsemail.com/ntpdkptJegwgUbePDCPPdVkFuvAlhtlBYyzZldVkFuvAlhtlBYyzZlPwcjpjmntpdkptJegwgUbePDCPPdVkFuvAlhtlBYyzZlntpdkptJegwgUbePDCPPdVkFuvAlhtlBYyzZl&e=cnlhbl9ob3dhcmRAb3V0bG9vay5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 172.67.74.152
                      http://url960.aceeduconsult.com/ls/click?upn=u001.LUpianUM71xe7PV7wDA6i1kcuy38W249FfPzE-2Fn4iGArrL0MQBCUZHFEzmfBrwW7hf5h8aNQUml0OSIHqpXf0LMpnaTL-2BzYU1WV-2BSTu4-2FYE-3DnWBx_C2kZwAnfGwUSqF5D87NbxLVpuF-2FUu77KiRgkAhE5NE4LxNdD8Vk-2BBXjUuKxXLIa0fIDZmJqQTdTMUWaKg74qY7H1042trEdUOL1Ty-2B4ikz6aamPgX0YPKifSgbmdnoJ9QNdI7-2Fj5HU9YtlUVfM2hhaIRlcN5LDyRrfABDYCmE6HCezIFJke-2Bw8MgqKR8oZe3x0bNQ5ip4gqKVt9OZvtTXtI2W19VoVZDzbdeDK4WD-2F3HaEv25gNxrltbLRhf8V-2BO7eWR3mjaJT30K-2BcVCwIlJZO7lziFom1TeAFneOePh2rvH67eyoHyRuDs7uhJ58UvSbL-2F5WGOZFqHf1Uoqm5u1BuusL-2F4yIoUS3Zge-2Bhwb2SPTTZrQp-2B3YQW62QJEBscu8XAGBtmCTNO-2FGrj9S-2BwtsmLluvkoUx0cXtIZxgyjwWcDifMxEpsoupBhIu0vHgSwbA5Jlj-2FdPy-2B0yhvKMBxhOgsBuXNzAVSfF8HuZvD5iWXinRKWqhNg1QpvfMK5Why8PnI5FwIsgrY7RxMkEbcDdf0VL1a7dM3RDh9LkpekDjtHu-2F4c-2FsI73UIfVUG4-2BbcH5VEOHzkCenTbIl-2BeYnL2jw9k-2Bt-2BAEZMQZavCq5q7Io2kchrzK3tu9Vj43TTv0K790k8tA4okR0vSuH0WvhSIZBs2e3uKgx9FK2SAr5JJzheB6cW2OXdbGgfDGPwGYkvJqNCBixLi9dWacb8fBed5RjA3p1JUsS79RbxF-2FaSjDqEr3OTeFx3WgBthSzcSYPpiE9ha00gB-2FAVdpFU8eOGGhrdGc6OgU4OZhDsRkN5FNMpRj3pgHOHQ6dkJW4RJx1-2B1Om8bljV3ruWQytV5mwg68-2FvnkkpkZM63omm27kalKxw-3DGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.25.14
                      https://egift.activationshub.com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdL/Get hashmaliciousHTMLPhisherBrowse
                      • 104.26.0.222
                      https://lnk.ie/73BGS/e=?utm_campaign=&utm_medium=email&utm_source=eloqua&utm_content=EMS&elqTrackId=b3e6296b7e034428ab6cf8165586e5f3&elq=f15d0983a3e2469a9348a180a5d34fca&elqaid=2922&elqat=1&elqCampaignId=1792&elqak=8AF50EC23DDB3CA8DB8B1F52080496E6D8BDFEE307A00555CA936F9692C081A369A3Get hashmaliciousUnknownBrowse
                      • 104.18.95.41
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      bd0bf25947d4a37404f0424edf4db9adSecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      SecuriteInfo.com.FileRepMalware.12025.7543.exeGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      SecuriteInfo.com.Heuristic.HEUR.AGEN.1319832.32667.20795.exeGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      ActSet.ps1Get hashmaliciousFredy StealerBrowse
                      • 188.114.96.3
                      ActSet.ps1Get hashmaliciousFredy StealerBrowse
                      • 188.114.96.3
                      SecuriteInfo.com.Win32.CrypterX-gen.13288.14467.dllGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      SecuriteInfo.com.Win32.CrypterX-gen.13288.14467.dllGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      IDMan.exeGet hashmaliciousFredy StealerBrowse
                      • 188.114.96.3
                      IDMan.exeGet hashmaliciousFredy StealerBrowse
                      • 188.114.96.3
                      QZyFrUDVA9.exeGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                      Entropy (8bit):7.980162940228627
                      TrID:
                      • Win64 Executable GUI (202006/5) 92.65%
                      • Win64 Executable (generic) (12005/4) 5.51%
                      • Generic Win/DOS Executable (2004/3) 0.92%
                      • DOS Executable Generic (2002/1) 0.92%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:sadfwqefrqw3f.exe
                      File size:57'968'640 bytes
                      MD5:f57752bb1deef37b1940441f4edddcbe
                      SHA1:41212eebd65da911210f08d5b0819f2d815a92e5
                      SHA256:d1f9ccaa3a83a3bb8bf2412f172defee977bfe11c3a5bc8a80c8452d59349cdd
                      SHA512:d07b3e2e63dde6ae24e91748b2e24bbb7edf381cadb556fd49f5bea7771e77f4bcf471581632d2d2ac882e875b84bb3f7b5d4f2515d575e99acc39c2708c6323
                      SSDEEP:1572864:jnel83MrqAGM/piy57vJREubbeI0wKDvn86uOWw:jn089ADiy90YbRqvnpNV
                      TLSH:36D7339B82C856B9C0C3CB00A147575772D0A73ECAFE1D693ECB2C41794AE1B464EB67
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........#....).v).........\..........@.............................p............ ................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x144168b5c
                      Entrypoint Section:.sharper
                      Digitally signed:false
                      Imagebase:0x140000000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66F5D8A5 [Thu Sep 26 21:56:53 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:5bbe22f51ba0d46f91a90f06c15445df
                      Instruction
                      inc ecx
                      push eax
                      pushfd
                      dec ecx
                      mov eax, 329B6315h
                      aaa
                      xor eax, dword ptr [esi]
                      mov ch, 41h
                      bswap eax
                      inc ebp
                      xor eax, eax
                      call 00007F4750D268E0h
                      out dx, al
                      enter 17E4h, F2h
                      je 00007F4750D95408h
                      jo 00007F4750D9548Dh
                      jle 00007F4750D954B0h
                      sbb al, E6h
                      test al, 2Bh
                      jle 00007F4750D954B0h
                      test byte ptr [esi], bl
                      or byte ptr [ebx], ch
                      jle 00007F4750D954B0h
                      and al, 7Eh
                      and byte ptr [ebx], ch
                      jle 00007F4750D954B0h
                      int3
                      push ss
                      push eax
                      sub edi, dword ptr [esi+4Eh]
                      dec esp
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x33fae100x1a4.sharper
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6b1e2c00x17f10.sharper
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x35787a00x28.sharper
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6b1e1800x140.sharper
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x33ed0000x168.sharper
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x29746e0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x2990000x7b09c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                      .data0x3150000x9bc2dc0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0xcd20000x150f00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
                      .sharper0xce80000x2704a960x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .sharper0x33ed0000x10d80x12007ecadbf6eb5f01ec110ca64d0af7bf54False0.03624131944444445data0.263381869308014IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .sharper0x33ef0000x37471d00x3747200c453c8845eb699fcd4324c54a4692b93unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      DLLImport
                      IPHLPAPI.DLLGetAdaptersAddresses
                      ntdll.dllVerSetConditionMask
                      d3d11.dllD3D11CreateDeviceAndSwapChain
                      D3DCOMPILER_47.dllD3DCompile
                      IMM32.dllImmReleaseContext
                      KERNEL32.dllLoadLibraryA
                      USER32.dllwsprintfW
                      ADVAPI32.dllSetEntriesInAclW
                      SHELL32.dllSHGetSpecialFolderPathW
                      ole32.dllCoInitialize
                      OLEAUT32.dllSysAllocString
                      WINTRUST.dllWinVerifyTrust
                      SHLWAPI.dllStrStrW
                      imagehlp.dllSymInitialize
                      bcrypt.dllBCryptGenRandom
                      XINPUT1_4.dll
                      CRYPT32.dllCertCloseStore
                      WS2_32.dllgetaddrinfo
                      KERNEL32.dllGetSystemTimeAsFileTime
                      KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 24, 2024 17:53:06.293917894 CEST49979443192.168.2.5188.114.96.3
                      Oct 24, 2024 17:53:06.293973923 CEST44349979188.114.96.3192.168.2.5
                      Oct 24, 2024 17:53:06.294104099 CEST49979443192.168.2.5188.114.96.3
                      Oct 24, 2024 17:53:06.310698032 CEST49979443192.168.2.5188.114.96.3
                      Oct 24, 2024 17:53:06.310730934 CEST44349979188.114.96.3192.168.2.5
                      Oct 24, 2024 17:53:07.055295944 CEST44349979188.114.96.3192.168.2.5
                      Oct 24, 2024 17:53:07.055618048 CEST49979443192.168.2.5188.114.96.3
                      Oct 24, 2024 17:53:07.073812962 CEST49979443192.168.2.5188.114.96.3
                      Oct 24, 2024 17:53:07.073829889 CEST44349979188.114.96.3192.168.2.5
                      Oct 24, 2024 17:53:07.073961020 CEST49979443192.168.2.5188.114.96.3
                      Oct 24, 2024 17:53:07.074006081 CEST44349979188.114.96.3192.168.2.5
                      Oct 24, 2024 17:53:07.074074030 CEST49979443192.168.2.5188.114.96.3
                      TimestampSource PortDest PortSource IPDest IP
                      Oct 24, 2024 17:53:06.257527113 CEST6048153192.168.2.51.1.1.1
                      Oct 24, 2024 17:53:06.281286955 CEST53604811.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Oct 24, 2024 17:53:06.257527113 CEST192.168.2.51.1.1.10x1edfStandard query (0)noaserver.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 24, 2024 17:53:06.281286955 CEST1.1.1.1192.168.2.50x1edfNo error (0)noaserver.com188.114.96.3A (IP address)IN (0x0001)false
                      Oct 24, 2024 17:53:06.281286955 CEST1.1.1.1192.168.2.50x1edfNo error (0)noaserver.com188.114.97.3A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:11:49:11
                      Start date:24/10/2024
                      Path:C:\Users\user\Desktop\sadfwqefrqw3f.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\sadfwqefrqw3f.exe"
                      Imagebase:0x140000000
                      File size:57'968'640 bytes
                      MD5 hash:F57752BB1DEEF37B1940441F4EDDDCBE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.4560577450.0000000140315000.00000004.00000001.01000000.00000003.sdmp, Author: unknown
                      Reputation:low
                      Has exited:false

                      No disassembly