Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cHZiG7fsJb.exe

Overview

General Information

Sample name:cHZiG7fsJb.exe
renamed because original name is a hash value
Original sample name:d7d2985f5828632f9c89712a4a194424.exe
Analysis ID:1541862
MD5:d7d2985f5828632f9c89712a4a194424
SHA1:bb138c3d9f957b63662907807b6840ac0d08f0bb
SHA256:bf86d7f3c6ab2587b7b19de58e2e07bae52de1afa7f592e1ae37c557fd5182fa
Tags:32exetrojan
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cHZiG7fsJb.exe (PID: 2804 cmdline: "C:\Users\user\Desktop\cHZiG7fsJb.exe" MD5: D7D2985F5828632F9C89712A4A194424)
  • cleanup
{"Type": "Metasploit Connect", "IP": "212.192.213.56", "Port": 4488}
SourceRuleDescriptionAuthorStrings
cHZiG7fsJb.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    cHZiG7fsJb.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      cHZiG7fsJb.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x8b65:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0xd8:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
          • 0x7b65:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
          00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.0.cHZiG7fsJb.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.0.cHZiG7fsJb.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                0.0.cHZiG7fsJb.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
                • 0x8b65:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
                0.2.cHZiG7fsJb.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                  0.2.cHZiG7fsJb.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: cHZiG7fsJb.exeAvira: detected
                    Source: cHZiG7fsJb.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "212.192.213.56", "Port": 4488}
                    Source: cHZiG7fsJb.exeReversingLabs: Detection: 87%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                    Source: cHZiG7fsJb.exeJoe Sandbox ML: detected
                    Source: cHZiG7fsJb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: cHZiG7fsJb.exe
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 4x nop then pop esp0_2_00401E74
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 4x nop then fxch4 st(6)0_2_00406740
                    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 212.192.213.56:4488
                    Source: Joe Sandbox ViewASN Name: LIVECOMM-ASRespublikanskayastr3k6RU LIVECOMM-ASRespublikanskayastr3k6RU
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.213.56
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00590095 WSASocketA,connect,recv,closesocket,0_2_00590095
                    Source: cHZiG7fsJb.exeString found in binary or memory: http://www.apache.org/
                    Source: cHZiG7fsJb.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: cHZiG7fsJb.exeString found in binary or memory: http://www.zeustech.net/

                    System Summary

                    barindex
                    Source: cHZiG7fsJb.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.0.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.2.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: cHZiG7fsJb.exe, 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs cHZiG7fsJb.exe
                    Source: cHZiG7fsJb.exeBinary or memory string: OriginalFilenameab.exeF vs cHZiG7fsJb.exe
                    Source: cHZiG7fsJb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: cHZiG7fsJb.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.0.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.2.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: cHZiG7fsJb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal96.troj.winEXE@1/0@0/1
                    Source: cHZiG7fsJb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: cHZiG7fsJb.exeReversingLabs: Detection: 87%
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeSection loaded: mswsock.dllJump to behavior
                    Source: cHZiG7fsJb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: cHZiG7fsJb.exe
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00404477 push eax; ret 0_2_0040454E
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_0040B805 push eax; ret 0_2_0040B86E
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00405434 push es; iretd 0_2_00405435
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_004042A8 push 0040EA20h; retf 0_2_004042C8
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00404505 push eax; ret 0_2_0040454E
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00406F1E push 0000005Dh; retn 0014h0_2_00406F2D
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00405721 pushfd ; ret 0_2_00405722
                    Source: C:\Users\user\Desktop\cHZiG7fsJb.exeCode function: 0_2_00406D3F push es; ret 0_2_00406D45
                    Source: cHZiG7fsJb.exeStatic PE information: section name: .text entropy: 7.024280591711365
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: cHZiG7fsJb.exe, 00000000.00000002.2083767995.000000000064E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: cHZiG7fsJb.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    2
                    Software Packing
                    OS Credential Dumping1
                    Security Software Discovery
                    Remote ServicesData from Local System1
                    Non-Standard Port
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    LSASS Memory1
                    System Information Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    cHZiG7fsJb.exe88%ReversingLabsWin32.Backdoor.Swrort
                    cHZiG7fsJb.exe100%AviraTR/Patched.Gen2
                    cHZiG7fsJb.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0cHZiG7fsJb.exefalse
                      unknown
                      http://www.apache.org/cHZiG7fsJb.exefalse
                        unknown
                        http://www.zeustech.net/cHZiG7fsJb.exefalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          212.192.213.56
                          unknownRussian Federation
                          49558LIVECOMM-ASRespublikanskayastr3k6RUtrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1541862
                          Start date and time:2024-10-25 08:58:08 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 1m 51s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:2
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:cHZiG7fsJb.exe
                          renamed because original name is a hash value
                          Original Sample Name:d7d2985f5828632f9c89712a4a194424.exe
                          Detection:MAL
                          Classification:mal96.troj.winEXE@1/0@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 86%
                          • Number of executed functions: 2
                          • Number of non-executed functions: 5
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): dllhost.exe
                          • VT rate limit hit for: cHZiG7fsJb.exe
                          No simulations
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          LIVECOMM-ASRespublikanskayastr3k6RUtsnsd8pOvn.exeGet hashmaliciousBabuk, DjvuBrowse
                          • 92.246.89.93
                          C0XWmZAnYk.exeGet hashmaliciousBabuk, DjvuBrowse
                          • 92.246.89.93
                          A9095F44928219267930271D2AD000C7B2F7F2616DB4AD186E5D3AA283D14764.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                          • 92.246.89.93
                          DE1BEC11380A046D35656CB592A399445A6DEB5934A2892DCD5DAC3D0F61C55E.exeGet hashmaliciousBabuk, Bdaejec, Djvu, ZorabBrowse
                          • 92.246.89.93
                          E9E758383C0F518C4DBD1204A824762F5FAC37375D8C5695C749AD1C36C0F108.exeGet hashmaliciousBabuk, Bdaejec, Djvu, ZorabBrowse
                          • 92.246.89.93
                          LisectAVT_2403002B_290.exeGet hashmaliciousBdaejecBrowse
                          • 92.246.89.93
                          FC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                          • 92.246.89.93
                          F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                          • 92.246.89.93
                          F2E3FA89C1A2C72EA78C4D32446221C08B30C7C3363F8248F04AA9EEE2E15C70.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                          • 92.246.89.93
                          E1BE354A31A340C3EBE7BF14ED0FBBCB788A47190B253D05067E9E8698C25698.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                          • 92.246.89.93
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.326142649318749
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:cHZiG7fsJb.exe
                          File size:73'802 bytes
                          MD5:d7d2985f5828632f9c89712a4a194424
                          SHA1:bb138c3d9f957b63662907807b6840ac0d08f0bb
                          SHA256:bf86d7f3c6ab2587b7b19de58e2e07bae52de1afa7f592e1ae37c557fd5182fa
                          SHA512:c93ff3fbe11f9394a5298f9df93d7a747e93441ad09f2b47971a6271752b82c2ae44538b67e055fd4f0c9120add263e03a0b25b6393df39ccb2e5ac7dcbc4278
                          SSDEEP:1536:I0WALw5l60clqpaTesU5SI6zemBbe1Mb+KR0Nc8QsJq39:tLw5HclleqKCbwe0Nc8QsC9
                          TLSH:C073AE42D8C41426C1A6133E27B13AB2A975F5FA3A05C29A764CCDF5DBD1C70A62B3C7
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L......I...........
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x4095b8
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:
                          Time Stamp:0x49F409EF [Sun Apr 26 07:14:55 2009 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:481f47bbb2c9c21e108d65f52b04c448
                          Instruction
                          inc ebx
                          nop
                          xchg eax, ecx
                          cwde
                          dec eax
                          dec ebx
                          xchg eax, ecx
                          wait
                          inc eax
                          lahf
                          std
                          inc ebx
                          salc
                          aas
                          inc edx
                          nop
                          std
                          daa
                          stc
                          inc ecx
                          nop
                          xchg eax, ecx
                          clc
                          xchg eax, ebx
                          das
                          inc edx
                          aas
                          inc edx
                          dec edx
                          cld
                          xchg eax, ecx
                          cwde
                          salc
                          xchg eax, ebx
                          xchg eax, edx
                          stc
                          aas
                          stc
                          cld
                          daa
                          aaa
                          clc
                          aas
                          clc
                          xchg eax, ecx
                          xchg eax, ecx
                          cld
                          dec eax
                          inc ebx
                          inc ecx
                          cdq
                          dec ebx
                          lahf
                          cld
                          std
                          dec ecx
                          cdq
                          cdq
                          xchg eax, ebx
                          inc ebx
                          inc edx
                          cld
                          aas
                          lahf
                          das
                          das
                          cwde
                          inc ebx
                          nop
                          dec ecx
                          xchg eax, ecx
                          aaa
                          dec eax
                          cld
                          lahf
                          lahf
                          dec edx
                          dec edx
                          dec ebx
                          daa
                          inc ecx
                          inc ebx
                          lahf
                          wait
                          xchg eax, edx
                          xchg eax, edx
                          xchg eax, edx
                          das
                          aaa
                          dec eax
                          lahf
                          dec ecx
                          xchg eax, ebx
                          dec edx
                          inc ecx
                          cdq
                          dec edx
                          das
                          lahf
                          dec eax
                          dec eax
                          dec ebx
                          cmc
                          cwde
                          cld
                          dec ecx
                          wait
                          inc edx
                          das
                          clc
                          inc eax
                          aas
                          cdq
                          clc
                          inc ecx
                          inc edx
                          xchg eax, ecx
                          jmp 00007FB0E8B64B96h
                          or al, CDh
                          sub dword ptr [ebx-3B17AFFAh], ecx
                          std
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000xa9660xb000e4beb951d32ec44403dae9881f40b65aFalse0.8172718394886364data7.024280591711365IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                          DLLImport
                          MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                          KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                          ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                          WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                          WS2_32.dllWSARecv, WSASend
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 25, 2024 08:59:05.039525032 CEST497044488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.045247078 CEST448849704212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.045403004 CEST497044488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.658664942 CEST448849704212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.658727884 CEST497044488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.659154892 CEST497044488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.660171986 CEST497054488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.664439917 CEST448849704212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.665508986 CEST448849705212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.665580988 CEST497054488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.671415091 CEST448849705212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.671474934 CEST497054488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.672049999 CEST497054488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.673028946 CEST497064488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.677450895 CEST448849705212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.678385019 CEST448849706212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.678452969 CEST497064488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.684195995 CEST448849706212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.684253931 CEST497064488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.684617043 CEST497064488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.685553074 CEST497074488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.689977884 CEST448849706212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.691081047 CEST448849707212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.691148043 CEST497074488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.696847916 CEST448849707212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.696904898 CEST497074488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.697263956 CEST497074488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.698678970 CEST497084488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:05.703025103 CEST448849707212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.703991890 CEST448849708212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:05.704060078 CEST497084488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.304014921 CEST448849708212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.304248095 CEST497084488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.304546118 CEST497084488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.305486917 CEST497094488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.309873104 CEST448849708212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.310792923 CEST448849709212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.310878992 CEST497094488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.316586018 CEST448849709212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.316669941 CEST497094488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.317022085 CEST497094488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.317847967 CEST497104488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.322274923 CEST448849709212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.323178053 CEST448849710212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.323255062 CEST497104488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.328790903 CEST448849710212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.328861952 CEST497104488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.335702896 CEST497104488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.339850903 CEST497114488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.344180107 CEST448849710212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.346455097 CEST448849711212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.346553087 CEST497114488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.352184057 CEST448849711212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.352379084 CEST497114488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.352691889 CEST497114488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.353552103 CEST497124488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.357949018 CEST448849711212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.358874083 CEST448849712212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.358959913 CEST497124488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.364664078 CEST448849712212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.364732027 CEST497124488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.365108967 CEST497124488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.365948915 CEST497134488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.370434046 CEST448849712212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.371202946 CEST448849713212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.371274948 CEST497134488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.376755953 CEST448849713212.192.213.56192.168.2.5
                          Oct 25, 2024 08:59:06.376827002 CEST497134488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.377147913 CEST497134488192.168.2.5212.192.213.56
                          Oct 25, 2024 08:59:06.383749962 CEST448849713212.192.213.56192.168.2.5

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:02:59:04
                          Start date:25/10/2024
                          Path:C:\Users\user\Desktop\cHZiG7fsJb.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\cHZiG7fsJb.exe"
                          Imagebase:0x400000
                          File size:73'802 bytes
                          MD5 hash:D7D2985F5828632F9C89712A4A194424
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:2.2%
                            Dynamic/Decrypted Code Coverage:12.8%
                            Signature Coverage:12.8%
                            Total number of Nodes:78
                            Total number of Limit Nodes:3
                            execution_graph 867 408560 868 408580 867->868 871 4088be 868->871 872 4088cc VirtualAlloc 871->872 874 408956 872->874 886 402060 887 40206b 886->887 888 40203e 886->888 889 4020d5 printf 887->889 890 402098 printf 887->890 891 4020e9 889->891 890->889 892 403860 893 403885 892->893 895 40387f 892->895 895->893 897 406700 895->897 896 403960 898 406707 897->898 899 4066fe 897->899 898->896 900 406730 899->900 901 40671f CloseHandle 899->901 900->896 901->900 904 408220 htonl 915 402082 916 4020d5 printf 915->916 917 402098 printf 915->917 918 4020e9 916->918 917->916 905 404ac9 906 404b20 905->906 909 404ba5 905->909 907 404bec 908 404be2 malloc 908->907 909->907 909->908 936 40258b 938 4025a8 936->938 937 40a654 malloc 937->938 938->937 939 40a669 938->939 925 404730 926 404755 925->926 927 404767 fprintf 926->927 928 4047d1 malloc 926->928 930 4047ce 926->930 927->926 929 4047ef 928->929 930->928 940 404790 941 4047d1 malloc 940->941 944 404759 940->944 943 4047ef 941->943 942 4047ce 942->941 944->941 944->942 945 404767 fprintf 944->945 945->944 902 401e74 903 401e89 exit 902->903 923 406915 924 406918 select 923->924 931 4037f6 933 40380b 931->933 932 403810 933->932 934 406700 CloseHandle 933->934 935 403960 934->935 919 4030b8 920 4030c2 919->920 921 4030d4 920->921 922 4030cc exit 920->922 922->921 875 590000 878 590095 875->878 877 590006 877->877 879 5900aa 878->879 880 5900bc WSASocketA 879->880 881 5900d8 connect 880->881 882 5900f1 recv 881->882 884 5900e7 881->884 883 590139 closesocket 882->883 882->884 883->880 883->884 884->881 884->882 884->883 885 590157 884->885 885->877 946 404b9b 949 404bb3 946->949 947 404bec 948 404be2 malloc 948->947 949->947 949->948 910 4066dd 911 4066ef closesocket 910->911 912 4066fb 910->912 911->912 913 406730 912->913 914 40671f CloseHandle 912->914 914->913

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 590095-5900ba 3 5900bc-5900d7 WSASocketA 0->3 4 5900d8-5900e5 connect 3->4 5 5900f1-590101 recv 4->5 6 5900e7-5900ea 4->6 8 590139-590146 closesocket 5->8 9 590103-590117 5->9 6->4 7 5900ec call 590158 6->7 7->5 8->3 10 59014c 8->10 13 590118-590127 9->13 10->7 15 590129-590132 13->15 16 590151-590155 13->16 15->8 16->13 17 590157 16->17
                            APIs
                            • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,88110002,38D5C0D4,0000000A,?,?,5F327377,00003233), ref: 005900D5
                            • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 005900E1
                            • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 005900FC
                            • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 0059013F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, Offset: 00590000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_590000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID: Socketclosesocketconnectrecv
                            • String ID:
                            • API String ID: 2083937939-0
                            • Opcode ID: c21b1b772790008baf633464d85dca1001dd285766e5a7c74703700aa927e521
                            • Instruction ID: 15c6634b26a8941d11c80c4ff46e84222a6c92d5d73113efa1b09c1a6446acd0
                            • Opcode Fuzzy Hash: c21b1b772790008baf633464d85dca1001dd285766e5a7c74703700aa927e521
                            • Instruction Fuzzy Hash: 2A11C4B16802587EF93022669C0BF7B2D1CEF42BA4F100825BB45E90C1C9829C4491FA

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 18 4088be-408943 VirtualAlloc 25 408956-40895b call 408a88 18->25
                            APIs
                            • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040,?,00000000,97145526), ref: 0040893B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2083579351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083608438.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083631512.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 957e235992aaf8a68d336eb7d6cd6c561c265f3b0a9689ea819e274ccd23668e
                            • Instruction ID: aa484920846a2bdc55957c8d6e9e3e8d2f90521f8eb67dfabe62ceb8dc348fde
                            • Opcode Fuzzy Hash: 957e235992aaf8a68d336eb7d6cd6c561c265f3b0a9689ea819e274ccd23668e
                            • Instruction Fuzzy Hash: 26D01762689218E6D00030110A027B59289170EB54EA0A03F62CE7A1C7CCBC9843325F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 86 401e74-401eb7 exit
                            APIs
                            Strings
                            • Total of %d requests completed, xrefs: 00401E7E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2083579351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083608438.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083631512.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID: exit
                            • String ID: Total of %d requests completed
                            • API String ID: 2483651598-2406090271
                            • Opcode ID: 3b3ac5ecc264fece307dd7887639365f5254dee8ae0b0e04e7d972f1d6ef0645
                            • Instruction ID: 3a676e79b8e0e66e935477ba1a0238d5622c95127e487f3c11a77d2d0a906660
                            • Opcode Fuzzy Hash: 3b3ac5ecc264fece307dd7887639365f5254dee8ae0b0e04e7d972f1d6ef0645
                            • Instruction Fuzzy Hash: 5FE0C031408254EFCB017F3C6C468F6FF34EE0B310B002186D44177002C2214403DBA9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2083579351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083608438.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083631512.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 227f76ed0c6daa478ad5405c99b81758856727a179aed69b940e9712f7a7a33a
                            • Instruction ID: 7fe0023c82ac313d00d0246bc454691b7b27b9b8b31918b99061e42762b4d609
                            • Opcode Fuzzy Hash: 227f76ed0c6daa478ad5405c99b81758856727a179aed69b940e9712f7a7a33a
                            • Instruction Fuzzy Hash: CF01F535908744AFCB11CF26C886987FBB8EF46720F44529DD864AB291D771F841CBD1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 28 404730-404757 call 409400 31 404759 28->31 32 404788-4047a1 call 40a0e0 31->32 33 40475b-404782 fprintf 31->33 37 4047d1-4047ed malloc 32->37 38 4047a3-4047cc 32->38 33->32 39 404812-404818 37->39 40 4047ef 37->40 38->31 45 4047ce-4047d0 38->45 43 40481a-40482f 39->43 41 4047f1-404805 40->41 42 404806-404811 40->42 41->42 48 404831-404857 43->48 45->37
                            APIs
                            Strings
                            • ab: Could not stat POST data file (%s): %s, xrefs: 004047BA
                            • ab: Could not read POST data file: %s, xrefs: 00404841
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2083579351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083608438.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083631512.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID: fprintfmalloc
                            • String ID: ab: Could not read POST data file: %s$ab: Could not stat POST data file (%s): %s
                            • API String ID: 1284687346-2069277725
                            • Opcode ID: b20d05454d886d44c0734e81cc6e4f159e08ed2c59359be308fc80991a5fc565
                            • Instruction ID: 77dbb48e8a855a8ed588dba7f4a32a472cae02847074bd715222e2af49727189
                            • Opcode Fuzzy Hash: b20d05454d886d44c0734e81cc6e4f159e08ed2c59359be308fc80991a5fc565
                            • Instruction Fuzzy Hash: B1317DB2504385EBD311DB38DC59E963BB8EF82350B0482BFE945BB293D7349905C799

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 49 402060-402069 50 40206b-402096 49->50 51 40203e-402057 49->51 54 4020d5-4020f6 printf 50->54 55 402098-4020d1 printf 50->55 55->54
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2083579351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083608438.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083631512.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID: printf
                            • String ID: Server Software: %s$tname: %s
                            • API String ID: 3524737521-2115599291
                            • Opcode ID: 055abb61b853257ca7453cf3d680493dbec23f0b0a5e995a80570033d24fc9b2
                            • Instruction ID: 41d97a210c39c83986428eb4b6d8635b38d725e3bb025c7563e66efab7baefdb
                            • Opcode Fuzzy Hash: 055abb61b853257ca7453cf3d680493dbec23f0b0a5e995a80570033d24fc9b2
                            • Instruction Fuzzy Hash: A9117A31A46200DFD3059FE0CD99DE77BF8FF4532072880ABD9856B1A2D3792805CB59

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 59 402082-402096 60 4020d5-4020f6 printf 59->60 61 402098-4020d1 printf 59->61 61->60
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2083579351.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083608438.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083631512.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_cHZiG7fsJb.jbxd
                            Yara matches
                            Similarity
                            • API ID: printf
                            • String ID: Server Software: %s$tname: %s
                            • API String ID: 3524737521-2115599291
                            • Opcode ID: a29ae7b87adad61d7af59acd82f2476853eac24155e4fc2b59e18a9d60f45c14
                            • Instruction ID: 00db61600acb6f8e1f7591cfaec29789a07a982972d6cb5741f733e976174968
                            • Opcode Fuzzy Hash: a29ae7b87adad61d7af59acd82f2476853eac24155e4fc2b59e18a9d60f45c14
                            • Instruction Fuzzy Hash: 1DF0D131A42114EFD304DFD0DD85AEB7BB9EF89760324806BD505A7161D3742844CB98