Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe

Overview

General Information

Sample name:17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe
Analysis ID:1545598
MD5:9dac5d9cb29609f6cb93d4db3200c37f
SHA1:75a46451fa0d4cc57a5d57a83e34b5b968c484fb
SHA256:29c79e7f7a0db8824f4c5000c87d3fddcc223256b2df267e5b9f90fc0424eb05
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE file does not import any functions
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["authorisev.site", "opposezmny.site", "dilemmadu.site", "faulteyotk.site", "contemteny.site", "seallysl.site", "goalyfeastz.site", "servicedny.site"], "Build id": "Yyt5XI--"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["authorisev.site", "opposezmny.site", "dilemmadu.site", "faulteyotk.site", "contemteny.site", "seallysl.site", "goalyfeastz.site", "servicedny.site"], "Build id": "Yyt5XI--"}
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeReversingLabs: Detection: 31%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeJoe Sandbox ML: detected
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: servicedny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: authorisev.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: faulteyotk.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: contemteny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: goalyfeastz.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: opposezmny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: seallysl.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: opposezmny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: Workgroup: -
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeString decryptor: Yyt5XI--
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_00401000
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040111D
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040392F
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_00403933
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h0_2_0040393A
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h0_2_0040D33A

    Networking

    barindex
    Source: Malware configuration extractorURLs: authorisev.site
    Source: Malware configuration extractorURLs: opposezmny.site
    Source: Malware configuration extractorURLs: dilemmadu.site
    Source: Malware configuration extractorURLs: faulteyotk.site
    Source: Malware configuration extractorURLs: contemteny.site
    Source: Malware configuration extractorURLs: seallysl.site
    Source: Malware configuration extractorURLs: goalyfeastz.site
    Source: Malware configuration extractorURLs: servicedny.site
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 0_2_00441AE50_2_00441AE5
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 0_2_0040B17B0_2_0040B17B
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 0_2_0040B1810_2_0040B181
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 224
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5276
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7cae685a-accc-4a65-90c0-ad59df903d9eJump to behavior
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeReversingLabs: Detection: 31%
    Source: unknownProcess created: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe "C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe"
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 224
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeCode function: 0_2_00401525 push dword ptr [edx+eax-77h]; ret 0_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: servicedny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: authorisev.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: faulteyotk.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dilemmadu.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: contemteny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: goalyfeastz.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: opposezmny.site
    Source: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: seallysl.site
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe32%ReversingLabs
    17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      goalyfeastz.sitetrue
        unknown
        servicedny.sitetrue
          unknown
          contemteny.sitetrue
            unknown
            faulteyotk.sitetrue
              unknown
              opposezmny.sitetrue
                unknown
                dilemmadu.sitetrue
                  unknown
                  seallysl.sitetrue
                    unknown
                    authorisev.sitetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1545598
                      Start date and time:2024-10-30 17:54:05 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 17s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe
                      Detection:MAL
                      Classification:mal84.troj.evad.winEXE@2/5@0/0
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 11
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.42.73.29
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe, PID 5276 because there are no executed function
                      • VT rate limit hit for: 17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe
                      TimeTypeDescription
                      12:55:11API Interceptor1x Sleep call for process: WerFault.exe modified
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      s-part-0017.t-0009.t-msedge.netilZhNx3JAc.batGet hashmaliciousAgentTeslaBrowse
                      • 13.107.246.45
                      87M9Y3P4Z7.batGet hashmaliciousAgentTeslaBrowse
                      • 13.107.246.45
                      phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.45
                      https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.45
                      https://jpm-ghana-2024-election-conversation-with-oct-24.open-exchange.net/join-the-call?ml_access_token=eyJjb250ZW50Ijp7ImV4cGlyYXRpb25EYXRlIjoiMjAyNC0xMC0zMVQxNToyMDo1OS4wMDZaIiwiZW1haWwiOiJyZGVpdHpAdnItY2FwaXRhbC5jb20iLCJldmVudElkIjo0MjY3Mn0sInNpZ25hdHVyZSI6Ik1FVUNJQzhaMDJJblVZd0syUk9WRkdjL1pMNHRBbWo4RmwxdW9mQjhwZzRmSjZsMkFpRUE5d25HUFFoa3ZrdkM2MlJkQ3lkM09YbnFJZ0xlQTAwMDIxNlRWbG9Hb0ZjPSJ9Get hashmaliciousUnknownBrowse
                      • 13.107.246.45
                      Derickdermatology.htmlGet hashmaliciousPhisherBrowse
                      • 13.107.246.45
                      https://www.mediafire.com/file/oyfycncwen0a3ue/DSP_Plan_Set.zip/fileGet hashmaliciousUnknownBrowse
                      • 13.107.246.45
                      https://myworkspacec1d73.myclickfunnels.com/onlinereview--9cb35?preview=trueGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      • 13.107.246.45
                      Receipt.htmGet hashmaliciousUnknownBrowse
                      • 13.107.246.45
                      weekly-finances-report.xlsxGet hashmaliciousKnowBe4Browse
                      • 13.107.246.45
                      No context
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.7143136774586946
                      Encrypted:false
                      SSDEEP:96:MBwFEv5HSgtidsD7hA1yDf0QXIDcQzc6CmcE1cw3CuLU+HbHg6ZAX/d5FMT2SlPi:1o7idy0NXf/jEzuiFEZ24IO8j
                      MD5:EA9BD55291D4762914B0BD370DB98432
                      SHA1:74EBA36E847D130B5CA9D3B54B8E263B799843B8
                      SHA-256:0C165081939842CE416B177A43FBBFDD21C02DC0D2095AE3588626369157BC51
                      SHA-512:F1EF7A485EFEE2F8CA0413ADDBFE03B27E2AB26B0DA474DEACD33385CEB1582E95D210C2F964DBFA988CB8D92CCE2383BA059EDCED913DDD5D018EFFDA758AF7
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.7.8.0.9.0.8.1.4.3.8.8.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.7.8.0.9.0.8.4.2.5.1.0.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.8.f.a.9.9.9.a.-.3.2.0.7.-.4.8.4.9.-.9.e.2.a.-.a.0.9.1.b.a.d.3.3.c.f.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.7.7.a.b.1.9.-.5.c.4.0.-.4.c.0.8.-.9.0.0.d.-.8.4.8.3.1.3.8.b.9.e.d.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.3.0.7.1.8.8.9.c.d.3.8.b.6.1.e.c.1.3.2.9.1.8.f.0.6.5.1.a.d.a.6.c.8.b.d.4.c.d.3.d.0.3.2.6.e.6.5.7.1.a.3.1.e.9.0.4.3.0.8.b.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.9.c.-.0.0.0.1.-.0.0.1.5.-.f.d.a.e.-.8.2.7.9.e.c.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.b.1.c.7.9.a.b.8.c.d.d.d.3.6.5.a.4.8.1.8.5.8.e.e.4.1.3.6.c.4.8.0.0.0.0.f.f.f.f.!.0.0.0.0.7.5.a.4.6.4.5.1.f.a.0.d.4.c.c.5.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Wed Oct 30 16:55:08 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):19618
                      Entropy (8bit):2.0527282415228214
                      Encrypted:false
                      SSDEEP:96:5U8APqBiZWQ6C0ZZv/i7nydrKVkjS68LWx4WqzJ0joY9WI/WItIIZMvqn:Fvq6C0nO5OsKMCn
                      MD5:E70207C829B70D1523CEF5926EF24BBD
                      SHA1:F6A60B6AF0925DEA1E2029E782FCF1A6D80CED50
                      SHA-256:0CBAA4B5F5F78C4A530EFB52809AE36DA230907BE8825FE64A80D6EF5AC010AE
                      SHA-512:A48F811004917E5F0EBA33D5929A341E9CEA13E34E93BA5E5E6E7580E0ACE4A771520C2CF6EB8FDA4978BA1FA55C2209D064D6F5A1B95A288E27AAEDDE505B57
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... ........d"g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T............d"g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8544
                      Entropy (8bit):3.700951748605665
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJU26ADI6Y2DNSUAgmfcJPWO5px789bbUsfzJm:R6lXJd6AM6YgSUAgmfcJPWO6bHfQ
                      MD5:E3C4E0D6643A0281A02815D5CBCEB9B0
                      SHA1:3C71D50333A91D905988A05AA0BFF67D4C673D07
                      SHA-256:6A5F65F00708A854B450E228B0993A524AF77950E1AE2AF92AC29E758F3EF92D
                      SHA-512:917F0F33E689CBCE3E2F3C5FC40D29E6F7BDC28838C5A36F6CF60E15C278C9802212158376D5A1E23D27DFE3C559C3084E52BBD7579C8C68C30D2E6D76B69236
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.7.6.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4893
                      Entropy (8bit):4.551663096904772
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsKJg77aI9sPWpW8VYyoYm8M4JIpAgpEKFK+q8vp7X1MQp9+p90d:uIjfYI7Ge7V1FJkAs2Ur1M89i90d
                      MD5:41453494C9E5FB84AEF4882196C32980
                      SHA1:361C6D8C7F195ED1BF532752F9FC7A996A581535
                      SHA-256:BF32E1ED470A191269358F1585448E99FC272CCB4949D091BE3BE566828B489F
                      SHA-512:0645825D4BC9143EF48FE30D32CEAB0158E24C4A92E202438604C55AE40DAE0B8F805B21A14C43484151D75B3A42874A5CCA0701F5F460F626886D8D20CD2E96
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="566397" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.469123892548014
                      Encrypted:false
                      SSDEEP:6144:dzZfpi6ceLPx9skLmb0fbZWSP3aJG8nAgeiJRMMhA2zX4WABluuNLjDH5S:1ZHtbZWOKnMM6bFpFj4
                      MD5:2CB6EFFE79E2B8AC560955E75AA24823
                      SHA1:E5314089379A76FC11B76E833133F45C6F30A700
                      SHA-256:E9DF4423718E81A1995A5D43E6ACDBFF2517C69A654685EC95AFAE883FC4B506
                      SHA-512:42C968789D5F3F9C65E6E31002C6F73D3A3A2E61EEC4EA939A14F470AF89CACE2D8AF451B1BD4ECE5CF35999BDA056DEAB2185872245BBA89DF36A98FDFC36A2
                      Malicious:false
                      Reputation:low
                      Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.M.y.*.................................................................................................................................................................................................................................................................................................................................................M........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.79812846335561
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe
                      File size:352'809 bytes
                      MD5:9dac5d9cb29609f6cb93d4db3200c37f
                      SHA1:75a46451fa0d4cc57a5d57a83e34b5b968c484fb
                      SHA256:29c79e7f7a0db8824f4c5000c87d3fddcc223256b2df267e5b9f90fc0424eb05
                      SHA512:61d9ad3cf185f68c4232581efa9c7c211aae4acc0eaf67042d105ff13a25bfaa4425ea67ffc5e45a63ead8ea0e894f0448004098a19da0511ecb1f6d9046bcbf
                      SSDEEP:6144:7dGH3aV6ldgUHXAvgYi8w2HewuhLJcm7S3AXLyRmx6qA8gF/3dee:7yqV6ldgUHXRi4JcwKJRmx6H8ylH
                      TLSH:A4748D05EB7380A1CCC78C7561DEB77F997A6A0447384ED7CB5CDEA428A36D13839906
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......g.................D........................@.......................................@.................................R......
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x40d0b0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6715CDA7 [Mon Oct 21 03:42:31 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      nop
                      nop
                      nop
                      nop
                      nop
                      add eax, dword ptr [esp+edx*4+34h]
                      add eax, eax
                      mov dword ptr [esp+edx*4+0000093Ch], eax
                      add eax, dword ptr [esp+edx*4+38h]
                      add eax, eax
                      mov dword ptr [esp+edx*4+00000940h], eax
                      add edx, 02h
                      cmp ebx, edx
                      jne 00007FA7F4BAEDB2h
                      loopne 00007FA7F4BAEE30h
                      mov bh, 83h
                      retn F602h
                      rol dword ptr [ecx], FFFFFF8Bh
                      mov word ptr [eax+ecx*8], fs
                      adc eax, 0D740000h
                      add eax, dword ptr [esp+edx*4+2Ch]
                      add eax, eax
                      mov dword ptr [esp+edx*4+00000934h], eax
                      test ecx, ecx
                      jng 00007FA7F4BAEEB3h
                      xor eax, eax
                      mov edx, dword ptr [esp+20h]
                      lea edi, dword ptr [edx+edx*8]
                      mov dword ptr [esi], ecx
                      add al, EBh
                      jp 00007FA7F4BAEDA3h
                      loop 00007FA7F4BAEDE7h
                      mov esi, dword ptr [esp+10h]
                      add edx, esi
                      shl edi, 06h
                      add edi, esi
                      mov dword ptr [esp+04h], edi
                      jmp 00007FA7F4BAEE0Ah
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      mov ecx, dword ptr [esp+04h]
                      mov word ptr [ecx+eax*2+00008852h], di
                      mov ecx, dword ptr [esp+000015C8h]
                      inc eax
                      cmp eax, ecx
                      add al, ah
                      dec esi
                      mov bh, 84h
                      xchg byte ptr [eax], al
                      add byte ptr [eax], al
                      add al, ah
                      dec esi
                      mov bh, B6h
                      pushfd
                      adc byte ptr [edx], dl
                      pop dword ptr [eax]
                      add byte ptr [ebp-74148B25h], al
                      mov word ptr [esp+esi-72FFFFF7h], ds
                      jns 00007FA7F4BAEDE3h
                      mov dword ptr [esp+ebx*4+00000934h], edi
                      xor eax, esi
                      loopne 00007FA7F4BAEE30h
                      mov bh, 80h
                      push cs
                      add al, EBh
                      jnp 00007FA7F4BAEDE6h
                      jc 00007FA7F4BAEE21h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4b80.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x4819c0xbc.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x442b80x444002cd4ae25ebdaee6c85ce1315e56eabcfFalse0.5441170157967034data6.641637773832036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x460000x25270x26009175939b333ffddb8594b46408474ea6False0.6291118421052632data6.741066085511267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x490000xf5180x62005dcad0ccac36fcd9239b11441d138ecdFalse0.5071348852040817data6.803513101730595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x590000x4b800x4c00155d78560b0a79f1f694bfbcf31380faFalse0.527086759868421data6.221406643507071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Oct 30, 2024 17:55:05.943190098 CET1.1.1.1192.168.2.60x73c7No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Oct 30, 2024 17:55:05.943190098 CET1.1.1.1192.168.2.60x73c7No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:55:07
                      Start date:30/10/2024
                      Path:C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a2fbd988.dat-decoded.exe"
                      Imagebase:0x400000
                      File size:352'809 bytes
                      MD5 hash:9DAC5D9CB29609F6CB93D4DB3200C37F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:4
                      Start time:12:55:08
                      Start date:30/10/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 224
                      Imagebase:0x1b0000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                        • Instruction ID: 50ea3f66718b9f0aec2dde1cafbd8e4c0de0bc4ea73b4abfd2f3b225e7e50961
                        • Opcode Fuzzy Hash: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                        • Instruction Fuzzy Hash: AC515CB16047418FD32A8F28C8947A67F96EF62305F1941AFD0825B3A1D7B89E4AC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                        • Instruction ID: f7c5b6151606094664de1af60f9128b8343ad51cb9d90a512a25ca090a2e4e3f
                        • Opcode Fuzzy Hash: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                        • Instruction Fuzzy Hash: 333109B15047419FD32A8F24889862B7F57AB62305B1982BFC4511B3E2D3F8DA19C7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                        • Instruction ID: 8d1535539f6c5361cf9dca1fd3e7e74b7c3d02e9c21871ba0092eb5ffd02d52e
                        • Opcode Fuzzy Hash: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                        • Instruction Fuzzy Hash: 6131A3B1A047115ED32A8F14889862BBE97AB62315F1982BBC0516B3E1D3F8DA1DC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                        • Instruction ID: 667a8602ed86c8e57a971cd8e4128e82d883590cc2420ca462f20316beda6c97
                        • Opcode Fuzzy Hash: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                        • Instruction Fuzzy Hash: 8A31B2B19047115ED32A8F14889872BBE57AB62315F1982BBC0516B3E1D3F89A1DC7C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: $ $ $ $ $ $
                        • API String ID: 0-935225467
                        • Opcode ID: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                        • Instruction ID: a3f89da26ddce334d935fd876fc161bfabed00f9a58923f1678de83345a9f44d
                        • Opcode Fuzzy Hash: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                        • Instruction Fuzzy Hash: 1E015EF25113008FC32E8F41D8D493BBF27A6B2314326A2AFC0402B261D3B5C62DCB88
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: ;:54
                        • API String ID: 0-2887251705
                        • Opcode ID: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                        • Instruction ID: c9837bf11cf4ad60dd6dd8dd9122ae42f90ca62632c53ad74a67825a83bc24ac
                        • Opcode Fuzzy Hash: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                        • Instruction Fuzzy Hash: F5A1BE72B153809FE715DA29DC807A6BF93EB96300F1D84AFD481DB322E6399C81C345
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                        • Instruction ID: b7764c4af62fa0c2d5b5ef5cd1ab6a06a14ec5ca4f1d67a2cca15874c182747d
                        • Opcode Fuzzy Hash: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                        • Instruction Fuzzy Hash: 64414D7110D3809FD3258B68884065FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                        • Instruction ID: 15271058e7cda56ff3f9a36a900eb8e385046b1bc0e6906e50e720d0b9c466b1
                        • Opcode Fuzzy Hash: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                        • Instruction Fuzzy Hash: 6F414C7110D3808FD3158B6C884165FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                        • Instruction ID: 4efda905ac7a41cadf9716579617f48ebd0f1d3c79b6496c68504865d56f4ba9
                        • Opcode Fuzzy Hash: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                        • Instruction Fuzzy Hash: 7F11023390635087EB144B7258912BEB7629BBE310F4D116FC851277C3D26A8C41C3C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: I$K$L$N$V$V$X$Y$Y$]$_$q
                        • API String ID: 0-2073889574
                        • Opcode ID: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                        • Instruction ID: 43827593aa6497e58040c952b9477bc89a4bd2f44540a878b620f7f54beaff88
                        • Opcode Fuzzy Hash: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                        • Instruction Fuzzy Hash: A8613C7150C3C18FD3219F2888843AABFD19B57324F185AAFD4D54B382C67D894B9797
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3469965610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3469949845.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3469998626.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470012960.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470029623.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3470047496.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_17303071889cd38b61ec132918f0651ada6c8bd4cd3d0326e6571a31e904308bcee26a.jbxd
                        Similarity
                        • API ID:
                        • String ID: 9tWU$<194$JHz~$UW$^
                        • API String ID: 0-831947292
                        • Opcode ID: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                        • Instruction ID: 3abd27d06bb50cb3e07a1f710ed1dcbcc1a7b5c52bb8c7ac571728cc573a4b06
                        • Opcode Fuzzy Hash: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                        • Instruction Fuzzy Hash: CB4119311083919FD726CF25885076BBFE0AFA7304F084DAED4D65B392D739891AC766