Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bxUX6ztvg2.exe

Overview

General Information

Sample name:bxUX6ztvg2.exe
renamed because original name is a hash value
Original sample name:e2b4b1d4add1c34c77c6c717c4797dbd.exe
Analysis ID:1545927
MD5:e2b4b1d4add1c34c77c6c717c4797dbd
SHA1:053076e52714f2b7a3857acfc8f4a1bb7176a44e
SHA256:6608b3f74aa3ca49c2ba346ca3c842c43e2e47b0433a4205b6454f078a20c89f
Tags:32exe
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected DcRat
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • bxUX6ztvg2.exe (PID: 1768 cmdline: "C:\Users\user\Desktop\bxUX6ztvg2.exe" MD5: E2B4B1D4ADD1C34C77C6C717C4797DBD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "hicham157484.ddns.net", "Ports": "1995", "Version": "1.0.7 - modded by last", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "mxbtbWYTMLYT1fyOHeb8VPGWw24p2JuE", "Mutex": "885HDG564F5FGFG5DF400", "Certificate": "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", "ServerSignature": "Fi3dO3pXNbOSE8h9j6/HpDnw2ziCNp4GNtDWb2Tev2Y5YnJ5IMpzSjIOY3+smBIHBYCI1/i+AhUSAN9Py4zAGSwnxv7YlmLWjm+5izg9UsDpYKwuOg54erRyhEfpBQOI52FxX7VNjKyo5Ta2n2dKYqdQYBS48XHbSr2ar5bF7bo=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
bxUX6ztvg2.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    bxUX6ztvg2.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0xd150:$q1: Select * from Win32_CacheMemory
    • 0xd190:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0xd1de:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0xd22c:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    bxUX6ztvg2.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xd78c:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000002.2497616285.00000248A0505000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x5032c:$b2: DcRat By qwqdanchun1
      00000000.00000002.2498713896.00000248A20C1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x54c0:$b1: DcRatByqwqdanchun
      • 0x29de7c:$b2: DcRat By qwqdanchun1
      Process Memory Space: bxUX6ztvg2.exe PID: 1768JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Process Memory Space: bxUX6ztvg2.exe PID: 1768JoeSecurity_DcRat_2Yara detected DcRatJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.bxUX6ztvg2.exe.248a0380000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.0.bxUX6ztvg2.exe.248a0380000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
            • 0xd150:$q1: Select * from Win32_CacheMemory
            • 0xd190:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
            • 0xd1de:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
            • 0xd22c:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
            0.0.bxUX6ztvg2.exe.248a0380000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
            • 0xd78c:$s1: DcRatBy
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: bxUX6ztvg2.exeAvira: detected
            Source: bxUX6ztvg2.exeMalware Configuration Extractor: AsyncRAT {"Server": "hicham157484.ddns.net", "Ports": "1995", "Version": "1.0.7 - modded by last", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "mxbtbWYTMLYT1fyOHeb8VPGWw24p2JuE", "Mutex": "885HDG564F5FGFG5DF400", "Certificate": "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", "ServerSignature": "Fi3dO3pXNbOSE8h9j6/HpDnw2ziCNp4GNtDWb2Tev2Y5YnJ5IMpzSjIOY3+smBIHBYCI1/i+AhUSAN9Py4zAGSwnxv7YlmLWjm+5izg9UsDpYKwuOg54erRyhEfpBQOI52FxX7VNjKyo5Ta2n2dKYqdQYBS48XHbSr2ar5bF7bo=", "BDOS": "null", "External_config_on_Pastebin": "false"}
            Source: bxUX6ztvg2.exeReversingLabs: Detection: 78%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: bxUX6ztvg2.exeJoe Sandbox ML: detected
            Source: bxUX6ztvg2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Malware configuration extractorURLs: hicham157484.ddns.net
            Source: unknownDNS query: name: hicham157484.ddns.net
            Source: global trafficTCP traffic: 192.168.2.7:49701 -> 45.74.34.32:1995
            Source: Joe Sandbox ViewASN Name: M247GB M247GB
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: hicham157484.ddns.net
            Source: bxUX6ztvg2.exe, 00000000.00000002.2498713896.00000248A247E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: bxUX6ztvg2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR

            System Summary

            barindex
            Source: bxUX6ztvg2.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: bxUX6ztvg2.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 00000000.00000002.2497616285.00000248A0505000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.2498713896.00000248A20C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeCode function: 0_2_00007FFAACCC343E NtProtectVirtualMemory,0_2_00007FFAACCC343E
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeCode function: 0_2_00007FFAACCC343E0_2_00007FFAACCC343E
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeCode function: 0_2_00007FFAACCC06200_2_00007FFAACCC0620
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeCode function: 0_2_00007FFAACCC3CD10_2_00007FFAACCC3CD1
            Source: bxUX6ztvg2.exe, 00000000.00000000.1242314850.00000248A0392000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs bxUX6ztvg2.exe
            Source: bxUX6ztvg2.exeBinary or memory string: OriginalFilenameClient.exe" vs bxUX6ztvg2.exe
            Source: bxUX6ztvg2.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: bxUX6ztvg2.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 00000000.00000002.2497616285.00000248A0505000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.2498713896.00000248A20C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: bxUX6ztvg2.exe, Settings.csBase64 encoded string: 'TjRkU67/d5wQS1SHsZR/2Lcd6N7XQau7sVhMZfzEb3ycrHELLaDZ/9X5q+GROsRKNaM1ixvmwMHytSNW+cvgqrrfuQxButJOv5Pi7OJldHQ=', 'yLg0Q4qOKjhXk6gl/4ajeIfC0eJLa91CiYczmqtP7VtqsxkMS6zVPdrMmg3I+/c+VGXIPLbJtE19UxKzUEx4nc/1wxj+aAOTCAQPtyWp7vw=', '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', 'oqKJ3LBuMSNHAejwL0Dr+12Hc/ZAPq0J+BILzPTsusaPG/uS2J4bsC6aIGxElK2evmU+K3Uf6krZi2vRosPuKg==', 'nQv63h7eULfx8FNgHK+iktpU1TqvVgMNecJrQfOZ0oeBgFlaKgDQlMCR0sidoUYFECcOoVEVYrbrznOi5lhR/w==', 'W6pZ/lSbhWe6OX7HayDUI0ODDKDFuH4cF9XjBeFxLhbzr1NrsW/EILOXNY6e0NJkTpIRjHHmQIdH11JaoaEB3Q=='
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@3/1
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeMutant created: NULL
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeMutant created: \Sessions\1\BaseNamedObjects\885HDG564F5FGFG5DF400
            Source: bxUX6ztvg2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: bxUX6ztvg2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: bxUX6ztvg2.exeReversingLabs: Detection: 78%
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeSection loaded: schannel.dllJump to behavior
            Source: bxUX6ztvg2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: bxUX6ztvg2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeCode function: 0_2_00007FFAACCC1DE2 push ecx; iretd 0_2_00007FFAACCC1DF4

            Boot Survival

            barindex
            Source: Yara matchFile source: bxUX6ztvg2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: bxUX6ztvg2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR
            Source: bxUX6ztvg2.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeMemory allocated: 248A06C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeMemory allocated: 248BA0C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exe TID: 7104Thread sleep time: -90000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: bxUX6ztvg2.exe, 00000000.00000002.2498606049.00000248A1F90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeQueries volume information: C:\Users\user\Desktop\bxUX6ztvg2.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\bxUX6ztvg2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: bxUX6ztvg2.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.bxUX6ztvg2.exe.248a0380000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR
            Source: bxUX6ztvg2.exe, 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
            Source: bxUX6ztvg2.exe, 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
            Source: bxUX6ztvg2.exe, 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: bxUX6ztvg2.exe PID: 1768, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            2
            Virtualization/Sandbox Evasion
            OS Credential Dumping111
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager13
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Obfuscated Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture21
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            bxUX6ztvg2.exe79%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
            bxUX6ztvg2.exe100%AviraHEUR/AGEN.1307453
            bxUX6ztvg2.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            hicham157484.ddns.net
            45.74.34.32
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              hicham157484.ddns.nettrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebxUX6ztvg2.exe, 00000000.00000002.2498713896.00000248A247E000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.74.34.32
                hicham157484.ddns.netUnited States
                9009M247GBtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1545927
                Start date and time:2024-10-31 10:31:06 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 3m 58s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:bxUX6ztvg2.exe
                renamed because original name is a hash value
                Original Sample Name:e2b4b1d4add1c34c77c6c717c4797dbd.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/0@3/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 3
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: bxUX6ztvg2.exe
                No simulations
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                hicham157484.ddns.netrain.batGet hashmaliciousAsyncRATBrowse
                • 41.214.187.35
                crack.batGet hashmaliciousUnknownBrowse
                • 41.214.187.35
                klbisQNtgP.exeGet hashmaliciousAsyncRAT, PhoenixRATBrowse
                • 172.111.149.2
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                M247GBnOrden_de_Compra___0001245.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 185.236.203.101
                wZU2edEGL3.elfGet hashmaliciousUnknownBrowse
                • 38.203.241.135
                8v2IShmMos.elfGet hashmaliciousUnknownBrowse
                • 154.17.76.69
                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                • 38.202.225.97
                Bjl3geiFEK.exeGet hashmaliciousPhorpiexBrowse
                • 91.202.233.141
                la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                • 38.95.109.107
                la.bot.arm.elfGet hashmaliciousUnknownBrowse
                • 38.207.55.140
                nklppc.elfGet hashmaliciousUnknownBrowse
                • 213.109.189.112
                nabarm5.elfGet hashmaliciousUnknownBrowse
                • 178.171.80.195
                nklarm7.elfGet hashmaliciousUnknownBrowse
                • 154.17.76.90
                No context
                No context
                No created / dropped files found
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):5.820505718213444
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Generic Win/DOS Executable (2004/3) 0.01%
                File name:bxUX6ztvg2.exe
                File size:64'512 bytes
                MD5:e2b4b1d4add1c34c77c6c717c4797dbd
                SHA1:053076e52714f2b7a3857acfc8f4a1bb7176a44e
                SHA256:6608b3f74aa3ca49c2ba346ca3c842c43e2e47b0433a4205b6454f078a20c89f
                SHA512:618b7eb85d5b0aa2b7e23e9f2165eb8ee601a7fd26ea585d3f57ebbf88266fab61d324f878060e29bbef9de029a0bf8b86ff871823571079b27ebbc3613f35ce
                SSDEEP:1536:QhYBLTM3UfcEcUVWalZ4FuGbbDwhEfGztpqKmY7:QhYBLTM3UfciVjT4EGbbDk2z
                TLSH:EB536C003798CEA5E2AE4AF8ACF2550106B5D5372102DB5E7CC814CB9B9FFC649166EF
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...E..b................................. ... ....@.. .......................`............`................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x4109ae
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x62DAC845 [Fri Jul 22 15:54:45 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x109540x57.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000xdb5.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000xe9b40xea005b45801163066dd83e22cd656031bd1eFalse0.4923544337606838data5.86032666163759IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x120000xdb50xe005ab9f3816116c3c27c494582aaee5d55False0.40066964285714285data5.023708300672874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x140000xc0x200b1388e694154bf6e19835a68482b6ee3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x120a00x2d4data0.4350828729281768
                RT_MANIFEST0x123740xa41XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.4114285714285714
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Oct 31, 2024 10:32:04.324858904 CET497011995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:04.605154037 CET19954970145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:04.605262995 CET497011995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:04.723906994 CET497011995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:04.728982925 CET19954970145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:05.289103031 CET19954970145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:05.289182901 CET497011995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:10.314074993 CET497011995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:10.314862013 CET497021995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:10.318984032 CET19954970145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:10.319756985 CET19954970245.74.34.32192.168.2.7
                Oct 31, 2024 10:32:10.319848061 CET497021995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:10.320112944 CET497021995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:10.324954987 CET19954970245.74.34.32192.168.2.7
                Oct 31, 2024 10:32:10.991560936 CET19954970245.74.34.32192.168.2.7
                Oct 31, 2024 10:32:10.991660118 CET497021995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:16.006397009 CET497021995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:16.007633924 CET497231995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:16.011347055 CET19954970245.74.34.32192.168.2.7
                Oct 31, 2024 10:32:16.012617111 CET19954972345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:16.012712955 CET497231995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:16.013072014 CET497231995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:16.018162012 CET19954972345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:16.694426060 CET19954972345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:16.694488049 CET497231995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:21.709606886 CET497231995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:21.710391998 CET497611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:21.714668036 CET19954972345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:21.715548038 CET19954976145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:21.715637922 CET497611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:21.715955973 CET497611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:21.721236944 CET19954976145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:22.382560015 CET19954976145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:22.385788918 CET497611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:27.397021055 CET497611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:27.397862911 CET497951995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:27.401844025 CET19954976145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:27.402784109 CET19954979545.74.34.32192.168.2.7
                Oct 31, 2024 10:32:27.402861118 CET497951995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:27.403213024 CET497951995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:27.407984972 CET19954979545.74.34.32192.168.2.7
                Oct 31, 2024 10:32:28.074234009 CET19954979545.74.34.32192.168.2.7
                Oct 31, 2024 10:32:28.074346066 CET497951995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:33.084506035 CET497951995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:33.085567951 CET498281995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:33.089394093 CET19954979545.74.34.32192.168.2.7
                Oct 31, 2024 10:32:33.090466022 CET19954982845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:33.090562105 CET498281995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:33.090923071 CET498281995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:33.095729113 CET19954982845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:33.776113033 CET19954982845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:33.776200056 CET498281995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:38.787823915 CET498281995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:38.788992882 CET498611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:38.792926073 CET19954982845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:38.793880939 CET19954986145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:38.793947935 CET498611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:38.794204950 CET498611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:38.799416065 CET19954986145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:39.495672941 CET19954986145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:39.495728970 CET498611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:44.506536961 CET498611995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:44.507638931 CET498931995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:44.511491060 CET19954986145.74.34.32192.168.2.7
                Oct 31, 2024 10:32:44.512531996 CET19954989345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:44.512619019 CET498931995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:44.512953997 CET498931995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:44.517823935 CET19954989345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:45.188813925 CET19954989345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:45.188929081 CET498931995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:50.202995062 CET498931995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:50.204432964 CET499261995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:50.207866907 CET19954989345.74.34.32192.168.2.7
                Oct 31, 2024 10:32:50.209392071 CET19954992645.74.34.32192.168.2.7
                Oct 31, 2024 10:32:50.209544897 CET499261995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:50.209958076 CET499261995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:50.214818001 CET19954992645.74.34.32192.168.2.7
                Oct 31, 2024 10:32:50.887800932 CET19954992645.74.34.32192.168.2.7
                Oct 31, 2024 10:32:50.887873888 CET499261995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:55.896987915 CET499261995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:55.897831917 CET499581995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:55.902980089 CET19954992645.74.34.32192.168.2.7
                Oct 31, 2024 10:32:55.903907061 CET19954995845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:55.903978109 CET499581995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:55.904274940 CET499581995192.168.2.745.74.34.32
                Oct 31, 2024 10:32:55.909162998 CET19954995845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:56.615905046 CET19954995845.74.34.32192.168.2.7
                Oct 31, 2024 10:32:56.615986109 CET499581995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:01.632071018 CET499581995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:01.633064985 CET499821995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:01.638034105 CET19954995845.74.34.32192.168.2.7
                Oct 31, 2024 10:33:01.638051033 CET19954998245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:01.638139009 CET499821995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:01.639811993 CET499821995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:01.646842003 CET19954998245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:02.341212988 CET19954998245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:02.341389894 CET499821995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:07.350333929 CET499821995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:07.355400085 CET19954998245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:07.363075018 CET499831995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:07.368498087 CET19954998345.74.34.32192.168.2.7
                Oct 31, 2024 10:33:07.368588924 CET499831995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:07.369107962 CET499831995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:07.377367973 CET19954998345.74.34.32192.168.2.7
                Oct 31, 2024 10:33:08.041795015 CET19954998345.74.34.32192.168.2.7
                Oct 31, 2024 10:33:08.041943073 CET499831995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:13.053416967 CET499831995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:13.054419041 CET499841995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:13.058284998 CET19954998345.74.34.32192.168.2.7
                Oct 31, 2024 10:33:13.059243917 CET19954998445.74.34.32192.168.2.7
                Oct 31, 2024 10:33:13.059319973 CET499841995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:13.059773922 CET499841995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:13.064539909 CET19954998445.74.34.32192.168.2.7
                Oct 31, 2024 10:33:13.734188080 CET19954998445.74.34.32192.168.2.7
                Oct 31, 2024 10:33:13.734411001 CET499841995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:18.741413116 CET499841995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:18.745647907 CET499851995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:18.746541023 CET19954998445.74.34.32192.168.2.7
                Oct 31, 2024 10:33:18.750531912 CET19954998545.74.34.32192.168.2.7
                Oct 31, 2024 10:33:18.750741959 CET499851995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:18.751032114 CET499851995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:18.755819082 CET19954998545.74.34.32192.168.2.7
                Oct 31, 2024 10:33:19.429466009 CET19954998545.74.34.32192.168.2.7
                Oct 31, 2024 10:33:19.429543018 CET499851995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:24.444269896 CET499851995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:24.445923090 CET499861995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:24.449280977 CET19954998545.74.34.32192.168.2.7
                Oct 31, 2024 10:33:24.450814009 CET19954998645.74.34.32192.168.2.7
                Oct 31, 2024 10:33:24.450932980 CET499861995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:24.451672077 CET499861995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:24.456557035 CET19954998645.74.34.32192.168.2.7
                Oct 31, 2024 10:33:25.123394966 CET19954998645.74.34.32192.168.2.7
                Oct 31, 2024 10:33:25.123548985 CET499861995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:30.131681919 CET499861995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:30.133404016 CET499871995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:30.136900902 CET19954998645.74.34.32192.168.2.7
                Oct 31, 2024 10:33:30.138365984 CET19954998745.74.34.32192.168.2.7
                Oct 31, 2024 10:33:30.138494015 CET499871995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:30.138825893 CET499871995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:30.143587112 CET19954998745.74.34.32192.168.2.7
                Oct 31, 2024 10:33:30.802512884 CET19954998745.74.34.32192.168.2.7
                Oct 31, 2024 10:33:30.802577972 CET499871995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:35.803776026 CET499871995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:35.804867983 CET499881995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:35.808657885 CET19954998745.74.34.32192.168.2.7
                Oct 31, 2024 10:33:35.809758902 CET19954998845.74.34.32192.168.2.7
                Oct 31, 2024 10:33:35.809843063 CET499881995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:35.810161114 CET499881995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:35.815052032 CET19954998845.74.34.32192.168.2.7
                Oct 31, 2024 10:33:36.510824919 CET19954998845.74.34.32192.168.2.7
                Oct 31, 2024 10:33:36.510915995 CET499881995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:41.522326946 CET499881995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:41.523643970 CET499891995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:41.527228117 CET19954998845.74.34.32192.168.2.7
                Oct 31, 2024 10:33:41.528512001 CET19954998945.74.34.32192.168.2.7
                Oct 31, 2024 10:33:41.528613091 CET499891995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:41.528971910 CET499891995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:41.533796072 CET19954998945.74.34.32192.168.2.7
                Oct 31, 2024 10:33:42.218734980 CET19954998945.74.34.32192.168.2.7
                Oct 31, 2024 10:33:42.218960047 CET499891995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:47.225366116 CET499891995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:47.226320982 CET499901995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:47.230418921 CET19954998945.74.34.32192.168.2.7
                Oct 31, 2024 10:33:47.231235981 CET19954999045.74.34.32192.168.2.7
                Oct 31, 2024 10:33:47.231332064 CET499901995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:47.231697083 CET499901995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:47.236519098 CET19954999045.74.34.32192.168.2.7
                Oct 31, 2024 10:33:47.921183109 CET19954999045.74.34.32192.168.2.7
                Oct 31, 2024 10:33:47.921339989 CET499901995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:52.929996014 CET499901995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:52.930943966 CET499911995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:52.934938908 CET19954999045.74.34.32192.168.2.7
                Oct 31, 2024 10:33:52.935771942 CET19954999145.74.34.32192.168.2.7
                Oct 31, 2024 10:33:52.935899019 CET499911995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:52.936407089 CET499911995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:52.941191912 CET19954999145.74.34.32192.168.2.7
                Oct 31, 2024 10:33:53.612211943 CET19954999145.74.34.32192.168.2.7
                Oct 31, 2024 10:33:53.612308979 CET499911995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:58.616277933 CET499911995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:58.617187023 CET499921995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:58.621324062 CET19954999145.74.34.32192.168.2.7
                Oct 31, 2024 10:33:58.622184992 CET19954999245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:58.622271061 CET499921995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:58.622654915 CET499921995192.168.2.745.74.34.32
                Oct 31, 2024 10:33:58.627520084 CET19954999245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:59.320169926 CET19954999245.74.34.32192.168.2.7
                Oct 31, 2024 10:33:59.320291042 CET499921995192.168.2.745.74.34.32
                Oct 31, 2024 10:34:04.334716082 CET499921995192.168.2.745.74.34.32
                Oct 31, 2024 10:34:04.335752010 CET499931995192.168.2.745.74.34.32
                Oct 31, 2024 10:34:04.339593887 CET19954999245.74.34.32192.168.2.7
                Oct 31, 2024 10:34:04.340590954 CET19954999345.74.34.32192.168.2.7
                Oct 31, 2024 10:34:04.340707064 CET499931995192.168.2.745.74.34.32
                Oct 31, 2024 10:34:04.340998888 CET499931995192.168.2.745.74.34.32
                Oct 31, 2024 10:34:04.345835924 CET19954999345.74.34.32192.168.2.7
                Oct 31, 2024 10:34:05.039822102 CET19954999345.74.34.32192.168.2.7
                Oct 31, 2024 10:34:05.039901018 CET499931995192.168.2.745.74.34.32
                TimestampSource PortDest PortSource IPDest IP
                Oct 31, 2024 10:32:02.912883997 CET5782353192.168.2.71.1.1.1
                Oct 31, 2024 10:32:03.928088903 CET5782353192.168.2.71.1.1.1
                Oct 31, 2024 10:32:04.313786030 CET53578231.1.1.1192.168.2.7
                Oct 31, 2024 10:32:04.606466055 CET53578231.1.1.1192.168.2.7
                Oct 31, 2024 10:33:07.351110935 CET5704153192.168.2.71.1.1.1
                Oct 31, 2024 10:33:07.362329006 CET53570411.1.1.1192.168.2.7
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 31, 2024 10:32:02.912883997 CET192.168.2.71.1.1.10x39efStandard query (0)hicham157484.ddns.netA (IP address)IN (0x0001)false
                Oct 31, 2024 10:32:03.928088903 CET192.168.2.71.1.1.10x39efStandard query (0)hicham157484.ddns.netA (IP address)IN (0x0001)false
                Oct 31, 2024 10:33:07.351110935 CET192.168.2.71.1.1.10xcaeeStandard query (0)hicham157484.ddns.netA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 31, 2024 10:32:04.313786030 CET1.1.1.1192.168.2.70x39efNo error (0)hicham157484.ddns.net45.74.34.32A (IP address)IN (0x0001)false
                Oct 31, 2024 10:32:04.606466055 CET1.1.1.1192.168.2.70x39efNo error (0)hicham157484.ddns.net45.74.34.32A (IP address)IN (0x0001)false
                Oct 31, 2024 10:33:07.362329006 CET1.1.1.1192.168.2.70xcaeeNo error (0)hicham157484.ddns.net45.74.34.32A (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:0
                Start time:05:31:58
                Start date:31/10/2024
                Path:C:\Users\user\Desktop\bxUX6ztvg2.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\bxUX6ztvg2.exe"
                Imagebase:0x248a0380000
                File size:64'512 bytes
                MD5 hash:E2B4B1D4ADD1C34C77C6C717C4797DBD
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1242297996.00000248A0382000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2497616285.00000248A0505000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.2498713896.00000248A20C1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:20.5%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:100%
                  Total number of Nodes:5
                  Total number of Limit Nodes:1
                  execution_graph 2880 7ffaaccc343e 2881 7ffaaccc346f 2880->2881 2882 7ffaaccc35db 2881->2882 2883 7ffaaccc3764 NtProtectVirtualMemory 2881->2883 2884 7ffaaccc37a5 2883->2884

                  Control-flow Graph

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2502082729.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffaaccc0000_bxUX6ztvg2.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0&$r6$/
                  • API String ID: 0-3557759449
                  • Opcode ID: 14373a74d52d196077f81121658c340fd5abab3dcb3ebf3e803f5a2d52e2607d
                  • Instruction ID: b250232ef2d2826919e89a39585670b559a36db72cf673dd0f314db5cf76f53a
                  • Opcode Fuzzy Hash: 14373a74d52d196077f81121658c340fd5abab3dcb3ebf3e803f5a2d52e2607d
                  • Instruction Fuzzy Hash: 29F10B70A1E5498FE759EB7C84656B9BBE1FF5A310B4445FDD08EC72D2CE289846C380

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 139 7ffaaccc3cd1-7ffaaccc3d1f 141 7ffaaccc3d21-7ffaaccc3d54 139->141 144 7ffaaccc3d5e-7ffaaccc3d7f 141->144 146 7ffaaccc3db8-7ffaaccc3dd6 144->146 147 7ffaaccc3d81-7ffaaccc3d91 144->147 152 7ffaaccc3dd7-7ffaaccc3e0a 146->152 148 7ffaaccc3ff7-7ffaaccc403a call 7ffaaccc1d90 147->148 149 7ffaaccc3d97-7ffaaccc3da6 147->149 160 7ffaaccc4047-7ffaaccc4048 148->160 161 7ffaaccc403c-7ffaaccc4045 148->161 151 7ffaaccc3da8-7ffaaccc3dad 149->151 149->152 151->146 165 7ffaaccc3e0c-7ffaaccc3e38 152->165 166 7ffaaccc3e3b-7ffaaccc3e46 152->166 163 7ffaaccc4050-7ffaaccc4068 160->163 161->163 167 7ffaaccc41ee-7ffaaccc4204 163->167 165->166 176 7ffaaccc3f16 166->176 177 7ffaaccc3e4c-7ffaaccc3e63 166->177 169 7ffaaccc420a-7ffaaccc42bc call 7ffaaccc1dc0 call 7ffaaccc1dd0 167->169 170 7ffaaccc4570-7ffaaccc4583 167->170 207 7ffaaccc4319-7ffaaccc4332 169->207 208 7ffaaccc42be-7ffaaccc4312 169->208 181 7ffaaccc3f1b-7ffaaccc3f42 176->181 179 7ffaaccc3e65-7ffaaccc3e93 177->179 180 7ffaaccc3e94-7ffaaccc3ec7 177->180 179->180 195 7ffaaccc3ec9-7ffaaccc3ef5 180->195 196 7ffaaccc3ef8-7ffaaccc3f03 180->196 205 7ffaaccc3f44-7ffaaccc3f52 181->205 195->196 196->176 206 7ffaaccc3f05-7ffaaccc3f10 196->206 216 7ffaaccc3f58-7ffaaccc3f59 205->216 217 7ffaaccc3fd6-7ffaaccc3ff2 205->217 206->181 209 7ffaaccc3f12-7ffaaccc3f14 206->209 211 7ffaaccc4338-7ffaaccc4353 207->211 208->176 226 7ffaaccc4318 208->226 209->205 218 7ffaaccc3f61-7ffaaccc3f72 216->218 217->167 218->167 221 7ffaaccc3f78-7ffaaccc3fb6 218->221 222 7ffaaccc3fb8 221->222 223 7ffaaccc3fbd-7ffaaccc3fcf 221->223 222->167 223->221 225 7ffaaccc3fd1 223->225 225->167 226->207
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2502082729.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffaaccc0000_bxUX6ztvg2.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0&$r6$/
                  • API String ID: 0-3557759449
                  • Opcode ID: e5b40d7fe920ce3b8b83b363e4ba26f028619eab7bb5dd02841e573080dd1292
                  • Instruction ID: 54f21b3006ea504bd8d8e1833f9c0f9268f37c0279e404b0483f27f1940aec61
                  • Opcode Fuzzy Hash: e5b40d7fe920ce3b8b83b363e4ba26f028619eab7bb5dd02841e573080dd1292
                  • Instruction Fuzzy Hash: 50D10970A1E58A4FE75ADB7884656B97FD1EF9A310B0845FDD08EC72D3CE289846C380

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2502082729.00007FFAACCC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffaaccc0000_bxUX6ztvg2.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 90fe29e112a130bfff3c71e6c04a7a90b339b1d3335c13a2deb244432db48bdf
                  • Instruction ID: e7d52e2d4e4b0092893f93945975588a7e1362c87f59578de889c947b83f4322
                  • Opcode Fuzzy Hash: 90fe29e112a130bfff3c71e6c04a7a90b339b1d3335c13a2deb244432db48bdf
                  • Instruction Fuzzy Hash: EBC13D7190CB498FE71DEB78D8565FA7BE5EF96310F0445BED08AC3193DE28A8068781