Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
g5tO58gHku.exe

Overview

General Information

Sample name:g5tO58gHku.exe
renamed because original name is a hash value
Original sample name:0fc1be13a029ec3ce80bbe25da7a4362.exe
Analysis ID:1546533
MD5:0fc1be13a029ec3ce80bbe25da7a4362
SHA1:8538fda0583e0502e2b56129f7a52fdffbe7b041
SHA256:96c411467b43f8c459e77c0f9bc8566b92cefa8f7d2e9e44c8f64950b4bc59c3
Tags:32exe
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • g5tO58gHku.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\g5tO58gHku.exe" MD5: 0FC1BE13A029EC3CE80BBE25DA7A4362)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "hicham157484.ddns.net", "Ports": "1994", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "jJ4thDBK9Sumwie02zZJNABmSbGp1YqA", "Mutex": "DETDSVSEFF555_6SSDFSDF", "Certificate": "MIIE8jCCAtqgAwIBAgIQALBkRuNCTqKtgapRE9OFfzANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjEwOTA4MTcxOTA2WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIUy6LUKGJiU+zs5YT6bYIiVfLqLpcI+LU0E4VJAwp9P6glbx/vcYicyK5/XI6drbESmiYtKXn2Sh0Qwbl0h1dPP86ERt3Oayv5s3Dtf7XPFEUCY9we26TXl47RYC9G5lYcYdgt2fmkUHC+rPAgRu4lfvbTyxNapCF8CJdJEP2cfwjpoP1/N78cAJ6PBIJ6ZcP1cUspWc+FgDtgcVYsB4rnIt7dePE12akzXJcWqlSf8tjNy0ES/9yx1s3tY6wStFcUP6ryDqQ27yccvByOm0i7SkvFfGsLibJOBY2akPF3Um8lBiHQz8qEYWXGT6m2KwFu5LeBx1/X2cuhXydVo9ZGUUZnISy/s1MX1KJeoqQqf9r167cEmbfakQ/3hbCgqbGt9MV/g89QDSiEHcyA0KPmwRs+VL9BJTw/wEOPLKsDJ4/prE81E8uYN6AFywO5dsxDucwCxGacrpG06yXjfR1/Iujp3NIEEKcOszIwq9Bi4qhdKOeou9KAJA96CqFvbYuVWNKE6m8T9bJsn6821WfDpD4gsZNnDkYau4ItntnuOs+xwkKKpfEDQKPKYrKq0Mz+/jOkdAyiS2vctNJFEDYrgte4C/tlQkzBsuwxYI46XGuO1ikkHvEFGqmEMcK/qJTKDlgUsEdifqhzKPKXWFi3FhhS7dacNUfJwV9yJD2XHAgMBAAGjMjAwMB0GA1UdDgQWBBSFEWXeyCCkXd6OtMBwLZX6CcP1DzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQBqRKAN8/YvlUBBLoaeygiKyrZ9wu4OJ1v31PPDtTKLtmj8IxL+IaCf0+3ZogM3y/UvMh5ikVZlkvOEI7UzzIhOGrsZ2Q6Y4mhh5MJh9nWSvZaPIxhz4a/tkPBTvlUElJ56qi+QKEgBVMDj3cN/diRzvvVky0budt9MNCmjKR5rctO1cdK5nXdiDRP+/Znkmnwqg4ljb/68TXeqg822z8N83PStp4PwgOXV0YTfvqsrzfKmg1JB+VkCwZr8Kt8xRvroVc0gqLgPwO19FcL+R978QmmHa50PYiPUbCUAfC5uW/X/ZoyPaJ3T/tRRm4J8hF3F7FO+SgKbhCz2gM1atS61O8ASUo93+k0r+q2tuFiqZHXcPNfZ3yQ9N9wUQecvQh+zVqt6C4AlUQKs8HsPHYJ6CtX3Ch7aPy5s2qpIQWrbekxugMHqhMvoPveOI7NavHjJycSRc1/bQDmD/Q34nJ5xxaL1U2tPhKFYyjJoi0AMql2J3jwdywvaSy0cztxBvi7wQzL8bzxEQV7PmdmRQgXGwN6V0aH1EqwNpeRmpMVt4LkdI8hwlRrc8sTqUOYErECospldCssXHJHefxJcz6mjOvYfN0qMl2k/yVvM2HslSLi+gsqgk0WdN3AmibthRSY8D+VIW0AKz6DsXs/2Viz7xi6W+pFvuseOttr3U4lCAA==", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
SourceRuleDescriptionAuthorStrings
g5tO58gHku.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    g5tO58gHku.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      g5tO58gHku.exeWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xa2c7:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xb638:$a2: Stub.exe
      • 0xb6c8:$a2: Stub.exe
      • 0x6f4c:$a3: get_ActivatePong
      • 0xa4df:$a4: vmware
      • 0xa357:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7d0c:$a6: get_SslClient
      g5tO58gHku.exeINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xa359:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
        • 0xa0c7:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0xc238:$a2: Stub.exe
        • 0xc2c8:$a2: Stub.exe
        • 0x6d4c:$a3: get_ActivatePong
        • 0xa2df:$a4: vmware
        • 0xa157:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
        • 0x7b0c:$a6: get_SslClient
        00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
        • 0xa159:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
        00000000.00000002.2913332670.000000000155D000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xbcb3:$x1: AsyncRAT
        • 0xbcf1:$x1: AsyncRAT
        00000000.00000002.2914216223.0000000003291000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x1d9d7:$x1: AsyncRAT
        • 0x1da15:$x1: AsyncRAT
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        0.0.g5tO58gHku.exe.f60000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.g5tO58gHku.exe.f60000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.0.g5tO58gHku.exe.f60000.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xa2c7:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xb638:$a2: Stub.exe
            • 0xb6c8:$a2: Stub.exe
            • 0x6f4c:$a3: get_ActivatePong
            • 0xa4df:$a4: vmware
            • 0xa357:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x7d0c:$a6: get_SslClient
            0.0.g5tO58gHku.exe.f60000.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xa359:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-01T04:44:16.777439+010020229301A Network Trojan was detected52.149.20.212443192.168.2.449731TCP
            2024-11-01T04:44:56.699460+010020229301A Network Trojan was detected172.202.163.200443192.168.2.451321TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: g5tO58gHku.exeAvira: detected
            Source: g5tO58gHku.exeMalware Configuration Extractor: AsyncRAT {"Server": "hicham157484.ddns.net", "Ports": "1994", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "jJ4thDBK9Sumwie02zZJNABmSbGp1YqA", "Mutex": "DETDSVSEFF555_6SSDFSDF", "Certificate": "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", "ServerSignature": "Zs5sWlK/R8AIYVLG/bLdF6Ag9JjXlA4sLXRYj25FWb2ivC7g7EMtlpNrFvjaQFBeHNvvqpelss+k05ZN62Hj/zH8xIOiXkMLSmwzrTWo0i+JAxDFS9oAO3Y3zX93IZ5uHtwdAxjqayaq2kumIb4sCjV+kGXkRt++Hj45PyKSVf9JmmBpGoGV8ptmMUj95f1gBiI9wxY9G9bFecNxzeury+qVBW9pkEFAjhmmdR4CwLgiwgJGmI/ayxYeHgy5RgEJ3XdA9GprFiyDm2VvkT1GdaRQKlva7uJYe6aPlYQu20Y9reWAcZsbmv2snMfIVO703722h1EOcbrKbzK8e8SCy7ojcsL6NVjfdOkzmzf/XzNfVzNhDOQm0Sh/z+9oHZSqOcuBqVNI31i6aNyyhAyy4lTL35pBk1H6U9xp5dfGTjGCBN+3b+RTeqLoykvy7bwrJoQGdaxjyHTd4la7z3Alpt1o+a7KUcY7tl9dpYNBkDkKkrLWmcYjTUin+IatqAwnl+XoXX4YVe77jiLysIzG3JqDK4cIfmNrBGLxgL+wYa65bEZKiryyy4j5rfwSPQup6s/JSgzbveJ6WtHfm/h56El47zHFRP0AUg1Mq8ltjDHvbYi5Xi6z18Km4kfIsDEd/ENoc/vlPUjrgSJs4/jOnCzBo9tLfBCEvZuVhl7ZGHo=", "BDOS": "false", "External_config_on_Pastebin": "null"}
            Source: hicham157484.ddns.netVirustotal: Detection: 8%Perma Link
            Source: hicham157484.ddns.netVirustotal: Detection: 8%Perma Link
            Source: g5tO58gHku.exeReversingLabs: Detection: 86%
            Source: g5tO58gHku.exeVirustotal: Detection: 80%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: g5tO58gHku.exeJoe Sandbox ML: detected
            Source: g5tO58gHku.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: g5tO58gHku.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Malware configuration extractorURLs: hicham157484.ddns.net
            Source: unknownDNS query: name: hicham157484.ddns.net
            Source: Yara matchFile source: g5tO58gHku.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPE
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 45.74.34.32:1994
            Source: Joe Sandbox ViewASN Name: M247GB M247GB
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.4:49731
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:51321
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: hicham157484.ddns.net

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: g5tO58gHku.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTR

            System Summary

            barindex
            Source: g5tO58gHku.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: g5tO58gHku.exe, type: SAMPLEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000002.2913332670.000000000155D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.2914216223.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: g5tO58gHku.exe, 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStub.exe" vs g5tO58gHku.exe
            Source: g5tO58gHku.exeBinary or memory string: OriginalFilenameStub.exe" vs g5tO58gHku.exe
            Source: g5tO58gHku.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: g5tO58gHku.exe, type: SAMPLEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: g5tO58gHku.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000002.2913332670.000000000155D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.2914216223.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: g5tO58gHku.exe, uuJguqNBkt.csBase64 encoded string: 'wXVQoCsf5HlA5KLSC6svPqkNYRDV04j3/uat00BMJiHdQp9fZH00DEj9TOroLx62PV7pTyMotl+yHeMqQbn5MA==', 'SLahgxO4mgId/WSbcqGlmObu2jUUMED2GnbhsPSV2GsCTDPBPhFwuH8JeezbULhaMlaerNi5WcAUo/MZJpwkXA==', 'MRjF9uKhMKOGTQW9eS4xwEiQ5Z3pg8Di1weKZlHiNBowWCZYiVWj/4eAcIM0gutNtDbelyA+zeYRfUr4qvOxhQeGulP8zWcc0YRE2Pmlz8s=', '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', 'QXF7oKzB62+F/rC6O2myfOH5PTRR3qRk2JDogjRXT6UP/ewOoVAnKxDRiX19Ft1fKoTFr9oNiV0rshkDC0u/x3ri/5X7JwzzQ1NOcNimoj82dadd6OVd5uohNihz8jG9N0//SEqWtfX4so034gu85kOUsQ4jmv1qFr5RCmqC0+z2CKXeLjQsRMYUcMnL+NC6CL0qDgpDAJtn39qa0nEla1GI6EEMt8j6ou37IbJqXg8+0W+blBCTwtkzqHaGTUh+XaEx9yOUzWDzIU3LrTYU5CPImPTmYk9Gva8mxey5r/e299FkJY1JsxZsrebKXihkLwtKJsbqBizq+3lt/gvwVU5Hxo+y9X5
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/1
            Source: C:\Users\user\Desktop\g5tO58gHku.exeMutant created: NULL
            Source: C:\Users\user\Desktop\g5tO58gHku.exeMutant created: \Sessions\1\BaseNamedObjects\DETDSVSEFF555_6SSDFSDF
            Source: g5tO58gHku.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: g5tO58gHku.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\g5tO58gHku.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: g5tO58gHku.exeReversingLabs: Detection: 86%
            Source: g5tO58gHku.exeVirustotal: Detection: 80%
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeSection loaded: schannel.dllJump to behavior
            Source: g5tO58gHku.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: g5tO58gHku.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: g5tO58gHku.exe, UEEQjljDnMAmdU.csHigh entropy of concatenated method names: 'zxVMFHwJRCAkE', 'rAQAwYjrswzkw', 'PHjybnldWPF', 'oYnTfUHZxktNL', 'cmRIaMNQYTR', 'ZklGLMATLyywZ', 'IdZcStpZYJmagK', 'bynGmBXYGfMe', 'vdGKaQZyFOgOOeC', 'ZldBPExDCQYvgtX'

            Boot Survival

            barindex
            Source: Yara matchFile source: g5tO58gHku.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTR
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: g5tO58gHku.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTR
            Source: g5tO58gHku.exeBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\g5tO58gHku.exeMemory allocated: 1690000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeMemory allocated: 3290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeMemory allocated: 5290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exe TID: 7412Thread sleep time: -35000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\g5tO58gHku.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: g5tO58gHku.exeBinary or memory string: vmware
            Source: g5tO58gHku.exe, 00000000.00000002.2913332670.0000000001574000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\g5tO58gHku.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeQueries volume information: C:\Users\user\Desktop\g5tO58gHku.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\g5tO58gHku.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: g5tO58gHku.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.g5tO58gHku.exe.f60000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: g5tO58gHku.exe PID: 7408, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            2
            Virtualization/Sandbox Evasion
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager13
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive21
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Obfuscated Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            g5tO58gHku.exe87%ReversingLabsByteCode-MSIL.Backdoor.AsyncRat
            g5tO58gHku.exe81%VirustotalBrowse
            g5tO58gHku.exe100%AviraTR/Dropper.Gen
            g5tO58gHku.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            hicham157484.ddns.net8%VirustotalBrowse
            SourceDetectionScannerLabelLink
            hicham157484.ddns.net8%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            hicham157484.ddns.net
            45.74.34.32
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            hicham157484.ddns.nettrueunknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.74.34.32
            hicham157484.ddns.netUnited States
            9009M247GBtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1546533
            Start date and time:2024-11-01 04:43:06 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 44s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:g5tO58gHku.exe
            renamed because original name is a hash value
            Original Sample Name:0fc1be13a029ec3ce80bbe25da7a4362.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/0@2/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 18
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target g5tO58gHku.exe, PID 7408 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            45.74.34.32bxUX6ztvg2.exeGet hashmaliciousAsyncRAT, DcRatBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              hicham157484.ddns.netbxUX6ztvg2.exeGet hashmaliciousAsyncRAT, DcRatBrowse
              • 45.74.34.32
              rain.batGet hashmaliciousAsyncRATBrowse
              • 41.214.187.35
              crack.batGet hashmaliciousUnknownBrowse
              • 41.214.187.35
              klbisQNtgP.exeGet hashmaliciousAsyncRAT, PhoenixRATBrowse
              • 172.111.149.2
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              M247GBharm5.elfGet hashmaliciousUnknownBrowse
              • 213.182.204.57
              harm4.elfGet hashmaliciousUnknownBrowse
              • 213.182.204.57
              mips.elfGet hashmaliciousUnknownBrowse
              • 213.182.204.57
              arm4.elfGet hashmaliciousUnknownBrowse
              • 213.182.204.57
              bxUX6ztvg2.exeGet hashmaliciousAsyncRAT, DcRatBrowse
              • 45.74.34.32
              nOrden_de_Compra___0001245.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • 185.236.203.101
              wZU2edEGL3.elfGet hashmaliciousUnknownBrowse
              • 38.203.241.135
              8v2IShmMos.elfGet hashmaliciousUnknownBrowse
              • 154.17.76.69
              la.bot.sparc.elfGet hashmaliciousUnknownBrowse
              • 38.202.225.97
              Bjl3geiFEK.exeGet hashmaliciousPhorpiexBrowse
              • 91.202.233.141
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.572248898230603
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:g5tO58gHku.exe
              File size:48'640 bytes
              MD5:0fc1be13a029ec3ce80bbe25da7a4362
              SHA1:8538fda0583e0502e2b56129f7a52fdffbe7b041
              SHA256:96c411467b43f8c459e77c0f9bc8566b92cefa8f7d2e9e44c8f64950b4bc59c3
              SHA512:60a61f58cd1cb5f72b482e72469643288fe412b1e3e804bae2bee7d4584bd3cbdbf9aa9c53650109e82799188c41b7bfceaad3eefd3fa4018625cb40aab42178
              SSDEEP:768:uu/6ZTgoiziWUUM9rmo2qreq3itKvyEPIKTEb7GdY0bPoW9/Jf152O5wjYBDZwx:uu/6ZTgle2SUDKpdTbPoOxf15PwKdwx
              TLSH:20232A002BE9C126F2BE4F78A9F362058576F2673603D54E2CC851DB5B13FC69A025FA
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..^................................. ........@.. ....................... ............@................................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x40d0ae
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x5EB79023 [Sun May 10 05:24:51 2020 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xd0600x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000x7ff.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xb0b40xb200497a883590dc0d6ea466ea4621f0e4ffFalse0.5427931882022472data5.630092870972295IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xe0000x7ff0x8000f68ce4dd77ed0bb9c1e6b31f6995d94False0.41748046875data4.88506844918463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x100000xc0x200e58fd12d1b53873afe54bb7ef6c1a465False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0xe0a00x2ccdata0.43575418994413406
              RT_MANIFEST0xe36c0x493exported SGML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.43381725021349277
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-11-01T04:44:16.777439+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.449731TCP
              2024-11-01T04:44:56.699460+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.451321TCP
              TimestampSource PortDest PortSource IPDest IP
              Nov 1, 2024 04:44:01.578514099 CET497301994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:01.584250927 CET19944973045.74.34.32192.168.2.4
              Nov 1, 2024 04:44:01.584326982 CET497301994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:01.596244097 CET497301994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:01.601123095 CET19944973045.74.34.32192.168.2.4
              Nov 1, 2024 04:44:10.058857918 CET19944973045.74.34.32192.168.2.4
              Nov 1, 2024 04:44:10.058954954 CET497301994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:15.080399036 CET497301994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:15.081415892 CET497321994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:15.085278034 CET19944973045.74.34.32192.168.2.4
              Nov 1, 2024 04:44:15.086265087 CET19944973245.74.34.32192.168.2.4
              Nov 1, 2024 04:44:15.086345911 CET497321994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:15.086632967 CET497321994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:15.091438055 CET19944973245.74.34.32192.168.2.4
              Nov 1, 2024 04:44:23.562299967 CET19944973245.74.34.32192.168.2.4
              Nov 1, 2024 04:44:23.562386990 CET497321994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:28.600229979 CET497321994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:28.601001024 CET513181994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:28.605133057 CET19944973245.74.34.32192.168.2.4
              Nov 1, 2024 04:44:28.605916977 CET19945131845.74.34.32192.168.2.4
              Nov 1, 2024 04:44:28.606098890 CET513181994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:28.606446981 CET513181994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:28.611563921 CET19945131845.74.34.32192.168.2.4
              Nov 1, 2024 04:44:37.094018936 CET19945131845.74.34.32192.168.2.4
              Nov 1, 2024 04:44:37.094233990 CET513181994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:42.109937906 CET513181994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:42.110994101 CET513191994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:42.312037945 CET19945131845.74.34.32192.168.2.4
              Nov 1, 2024 04:44:42.312055111 CET19945131945.74.34.32192.168.2.4
              Nov 1, 2024 04:44:42.312144041 CET513191994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:42.312941074 CET513191994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:42.317658901 CET19945131945.74.34.32192.168.2.4
              Nov 1, 2024 04:44:50.796600103 CET19945131945.74.34.32192.168.2.4
              Nov 1, 2024 04:44:50.796722889 CET513191994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:55.797619104 CET513191994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:55.799412966 CET513221994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:55.802464008 CET19945131945.74.34.32192.168.2.4
              Nov 1, 2024 04:44:55.804222107 CET19945132245.74.34.32192.168.2.4
              Nov 1, 2024 04:44:55.804337025 CET513221994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:55.805027008 CET513221994192.168.2.445.74.34.32
              Nov 1, 2024 04:44:55.809822083 CET19945132245.74.34.32192.168.2.4
              Nov 1, 2024 04:45:04.277018070 CET19945132245.74.34.32192.168.2.4
              Nov 1, 2024 04:45:04.277076006 CET513221994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:09.281804085 CET513221994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:09.286618948 CET19945132245.74.34.32192.168.2.4
              Nov 1, 2024 04:45:09.291425943 CET513961994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:09.296207905 CET19945139645.74.34.32192.168.2.4
              Nov 1, 2024 04:45:09.296293020 CET513961994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:09.296566010 CET513961994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:09.301450014 CET19945139645.74.34.32192.168.2.4
              Nov 1, 2024 04:45:17.777497053 CET19945139645.74.34.32192.168.2.4
              Nov 1, 2024 04:45:17.777578115 CET513961994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:22.781820059 CET513961994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:22.782779932 CET514711994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:22.786607981 CET19945139645.74.34.32192.168.2.4
              Nov 1, 2024 04:45:22.787516117 CET19945147145.74.34.32192.168.2.4
              Nov 1, 2024 04:45:22.787579060 CET514711994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:22.787892103 CET514711994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:22.792743921 CET19945147145.74.34.32192.168.2.4
              Nov 1, 2024 04:45:31.272602081 CET19945147145.74.34.32192.168.2.4
              Nov 1, 2024 04:45:31.273180962 CET514711994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:36.281862974 CET514711994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:36.282766104 CET515471994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:36.286667109 CET19945147145.74.34.32192.168.2.4
              Nov 1, 2024 04:45:36.287616968 CET19945154745.74.34.32192.168.2.4
              Nov 1, 2024 04:45:36.287693024 CET515471994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:36.287918091 CET515471994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:36.292659998 CET19945154745.74.34.32192.168.2.4
              Nov 1, 2024 04:45:44.767616987 CET19945154745.74.34.32192.168.2.4
              Nov 1, 2024 04:45:44.767682076 CET515471994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:49.781897068 CET515471994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:49.782741070 CET515901994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:49.786864042 CET19945154745.74.34.32192.168.2.4
              Nov 1, 2024 04:45:49.787686110 CET19945159045.74.34.32192.168.2.4
              Nov 1, 2024 04:45:49.787755966 CET515901994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:49.788006067 CET515901994192.168.2.445.74.34.32
              Nov 1, 2024 04:45:49.793652058 CET19945159045.74.34.32192.168.2.4
              Nov 1, 2024 04:45:58.270529985 CET19945159045.74.34.32192.168.2.4
              Nov 1, 2024 04:45:58.270617962 CET515901994192.168.2.445.74.34.32
              TimestampSource PortDest PortSource IPDest IP
              Nov 1, 2024 04:44:01.567389965 CET6208553192.168.2.41.1.1.1
              Nov 1, 2024 04:44:01.576601982 CET53620851.1.1.1192.168.2.4
              Nov 1, 2024 04:44:18.867836952 CET53522621.1.1.1192.168.2.4
              Nov 1, 2024 04:45:09.282433033 CET6216653192.168.2.41.1.1.1
              Nov 1, 2024 04:45:09.290901899 CET53621661.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 1, 2024 04:44:01.567389965 CET192.168.2.41.1.1.10xa03aStandard query (0)hicham157484.ddns.netA (IP address)IN (0x0001)false
              Nov 1, 2024 04:45:09.282433033 CET192.168.2.41.1.1.10xb67aStandard query (0)hicham157484.ddns.netA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 1, 2024 04:44:01.576601982 CET1.1.1.1192.168.2.40xa03aNo error (0)hicham157484.ddns.net45.74.34.32A (IP address)IN (0x0001)false
              Nov 1, 2024 04:45:09.290901899 CET1.1.1.1192.168.2.40xb67aNo error (0)hicham157484.ddns.net45.74.34.32A (IP address)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:23:43:56
              Start date:31/10/2024
              Path:C:\Users\user\Desktop\g5tO58gHku.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\g5tO58gHku.exe"
              Imagebase:0xf60000
              File size:48'640 bytes
              MD5 hash:0FC1BE13A029EC3CE80BBE25DA7A4362
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000000.1666285450.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2913332670.000000000155D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2914216223.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:false

              Reset < >
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: a^q$ a^q$,$xbq
                • API String ID: 0-2180861429
                • Opcode ID: b21e1b6bf3b730c5d601cd6aec4f38affd432a633858ca4a3fa838e48d94a541
                • Instruction ID: 0172dee6c1cc0da45998350d1ef069e264106f8d261a8fe432ec3d43ddb449f9
                • Opcode Fuzzy Hash: b21e1b6bf3b730c5d601cd6aec4f38affd432a633858ca4a3fa838e48d94a541
                • Instruction Fuzzy Hash: 12029C707002019FDB15DF28D984B2EBBE6FB89314F248969E4069B3A9DF74DC85CB81
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: a^q$ a^q$xbq
                • API String ID: 0-2081302502
                • Opcode ID: 77875b3796014fc2c6da8bdd927003f0be61a7fb913ee783ff6f8b7281eeeb37
                • Instruction ID: 1ffbdddbfd5fea6fa916711be83982e8dfb0d328d4c3f6b399f1b5f319b47d34
                • Opcode Fuzzy Hash: 77875b3796014fc2c6da8bdd927003f0be61a7fb913ee783ff6f8b7281eeeb37
                • Instruction Fuzzy Hash: 28619C707402008FD714DF28D944B2E7BE6FB99718F248929E5059F3A8DFB5ED898B81
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: (bq$Te^q
                • API String ID: 0-2856382362
                • Opcode ID: 107cc839b27c0bfc370f86f821b05f1b526c81d5f15870a55804653710ed76ab
                • Instruction ID: 14d6a351cdd8243e3c631dd4e2f35c7edffad6f093969c67967356aae5e8e9d9
                • Opcode Fuzzy Hash: 107cc839b27c0bfc370f86f821b05f1b526c81d5f15870a55804653710ed76ab
                • Instruction Fuzzy Hash: E8516970B101159FCB54DF6DC458AADBBF6FF89710F2581AAE806DB3A5CA71DC018B80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: Hbq$dLdq
                • API String ID: 0-411705877
                • Opcode ID: 7e93f0f609bcdf3178a22c1b8bd12cf0fa69a4761345d7b57f4c9b04b5bfd4a0
                • Instruction ID: 7720a7c6695845ec54f8d16f1218ead2c44ec2ed888567bb3ab9139e0801c91b
                • Opcode Fuzzy Hash: 7e93f0f609bcdf3178a22c1b8bd12cf0fa69a4761345d7b57f4c9b04b5bfd4a0
                • Instruction Fuzzy Hash: A151CE31B002048FCB14CF6DD854AAEBBFABF88304F1445AAE405EB3A6CB759C45CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: LR^q
                • API String ID: 0-2625958711
                • Opcode ID: fd0c62ba85c7d87b2c89966c1345cdf11891f868b47c575f527ed0f8009dfbee
                • Instruction ID: 552846233ed7d43caa3e59cee1f2a0c1dbe0a0a3206d9d46a304cc74edda85ad
                • Opcode Fuzzy Hash: fd0c62ba85c7d87b2c89966c1345cdf11891f868b47c575f527ed0f8009dfbee
                • Instruction Fuzzy Hash: 76312674F002168FCB04AB7C985456EBBFAFFC5224B14456ED54ADB3A4DE30CC028792
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: dLdq
                • API String ID: 0-3390252261
                • Opcode ID: fc778f030399fde22899d1278ef44d1fc4901159fc7dfa174882ceb22d055257
                • Instruction ID: 1ccf37a8cb4db33783e2d73dd0b1e785158c998fc4cb6689bddfd9cc55ad0d31
                • Opcode Fuzzy Hash: fc778f030399fde22899d1278ef44d1fc4901159fc7dfa174882ceb22d055257
                • Instruction Fuzzy Hash: 03319075A002058FDB14CF69C448BAEBBF6FF88300F148569E405AB361CB74ED45CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID: Hbq
                • API String ID: 0-1245868
                • Opcode ID: 5cbd96133f18c1a0e016ae663bcdf9cc5187d64aa539978199060f4e40c6e6f2
                • Instruction ID: 857e340334084d208a540a8fd3caf5544e09ba6499077397f00f212003a8f1ef
                • Opcode Fuzzy Hash: 5cbd96133f18c1a0e016ae663bcdf9cc5187d64aa539978199060f4e40c6e6f2
                • Instruction Fuzzy Hash: CC01F4307042904FC3959B3D94144AE3BE7BFCA22032504FAD049CB3A6CE388C068351
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 501f2328cf75febb917f92ad334266d81d763c153da90234472136eb92db7632
                • Instruction ID: f44fea0a871480237f7a89b8cf59b47f40fbf3f29cefa7cab3d83eb26dee7d0a
                • Opcode Fuzzy Hash: 501f2328cf75febb917f92ad334266d81d763c153da90234472136eb92db7632
                • Instruction Fuzzy Hash: 8151C374600205CFC795EF28F58895AB776FB8C3857508669D806CB368DF39AD8ACF80
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 825b262df7721f2bd0c9e53bb21f944f1d38643502d6086f50fed680a794cad6
                • Instruction ID: ee21e91ce76ce2e29265c35637dd589d50b024854460bad08b79bb08c0760a24
                • Opcode Fuzzy Hash: 825b262df7721f2bd0c9e53bb21f944f1d38643502d6086f50fed680a794cad6
                • Instruction Fuzzy Hash: 5F41B2B0F00209AFCB44EFB9C94466EBBFAFF89310F24856AD449D7355DA319D428B91
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 356d810e16bbd9f196e800cf057335995867c4be236ab07804d24f6c0d441585
                • Instruction ID: cfe2e202fd45212ad216948af84dc1b4408a71228a53ab839a15f79eb71ce5c0
                • Opcode Fuzzy Hash: 356d810e16bbd9f196e800cf057335995867c4be236ab07804d24f6c0d441585
                • Instruction Fuzzy Hash: 45213734B001059FEB14DF69C994BAE7BE6BF89724F248059E906EB3A5CB719C00CB80
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 58e0650986a6b1c7821de1bfe3fe79648afc931544f29271d797f2306e238515
                • Instruction ID: f5136d2d15f53c99db4492beae1930e4e923d519b7783b2e6b54f4967302594d
                • Opcode Fuzzy Hash: 58e0650986a6b1c7821de1bfe3fe79648afc931544f29271d797f2306e238515
                • Instruction Fuzzy Hash: 48213170B002429FDFB59B7CAD1867E3BACBF48245714562DBC07C5266EB288941CB95
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 369083147dcdc2d6f878da8fcb8bff387b0d4fcb51ed7cca4553e9a4b8a713eb
                • Instruction ID: 21a554980dc01e8a2abadb0ad0823d99447f42fc01cf80ad16769ffc7d4018be
                • Opcode Fuzzy Hash: 369083147dcdc2d6f878da8fcb8bff387b0d4fcb51ed7cca4553e9a4b8a713eb
                • Instruction Fuzzy Hash: 582145707102028FDF75AB7DAD1862E3AACAF08245700452DBD07CA256EF288901C7D5
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6bd864a0eca5ecdf438bba8edd01268650408b66b051ae535404a21aa9e4237a
                • Instruction ID: 2f6932f5a76a7a2ee3423bbc431c80cb77d58c0003b6f7cf73b2ed2b111e6bf6
                • Opcode Fuzzy Hash: 6bd864a0eca5ecdf438bba8edd01268650408b66b051ae535404a21aa9e4237a
                • Instruction Fuzzy Hash: E4117C70B01205DFCB94DBBCD90866A77FAEF8D65571104BAD506CB361EB348C52CB90
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 20f15bebffd5de23142482ba8b32668e901b26f7d965b79c50f01496bace2811
                • Instruction ID: 5da69389a8049d312ba2e53bad50b33f4a1292f6a70042cc605bf4495598cf02
                • Opcode Fuzzy Hash: 20f15bebffd5de23142482ba8b32668e901b26f7d965b79c50f01496bace2811
                • Instruction Fuzzy Hash: A9116170B01205DFCB54DBBDD908A6A7BEAEF8D65572004B9D409DB354EE35DC41CB90
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1a5888f97dd0225a42034de1ae8e9d9f3a662489c0829cce01c63bdedd9ef5b7
                • Instruction ID: b4fc317178e9e6d5b3f6171b76673a361eddf6829bb0aa88bfbfcb24722d14f7
                • Opcode Fuzzy Hash: 1a5888f97dd0225a42034de1ae8e9d9f3a662489c0829cce01c63bdedd9ef5b7
                • Instruction Fuzzy Hash: 4D019A70B41222CFDFA4DFA8E8957BE37B8EF49614B18406DD9059B300EB304C02CB96
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6b054344d48c40c54c4076e9049000806b4f18027c51369267663014db85e567
                • Instruction ID: 2d51c96f65caab604371bc59926af169eb2b8ef395828a6c2a17d13e38bf97ff
                • Opcode Fuzzy Hash: 6b054344d48c40c54c4076e9049000806b4f18027c51369267663014db85e567
                • Instruction Fuzzy Hash: 67E0C2323002045F8344963EF88885BB7DBEFC853432408B9F10DCB325DD60CC014390
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c3e2fc287bc65d8e014e7a8c4a08ab9548f337c421795a4e71aeae6cb96b2a7e
                • Instruction ID: 28d350a3f16e84a6826563f395fa6701059e0435656499ca5ad0850de2158d34
                • Opcode Fuzzy Hash: c3e2fc287bc65d8e014e7a8c4a08ab9548f337c421795a4e71aeae6cb96b2a7e
                • Instruction Fuzzy Hash: 26C08C2054514ACFDF3027B4D90CA2C3A1CAB80301F04021AB5030C47B8E7C08428B9A
                Memory Dump Source
                • Source File: 00000000.00000002.2913844588.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1690000_g5tO58gHku.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 428abf17ead904d48f784a3e2665cbfcfdbf49b3725d7c65b8c2a3edcbd75c39
                • Instruction ID: f4ed7bd9bbeea02183727253312da2a3075efbffbba1c94531116b721a8f8744
                • Opcode Fuzzy Hash: 428abf17ead904d48f784a3e2665cbfcfdbf49b3725d7c65b8c2a3edcbd75c39
                • Instruction Fuzzy Hash: F3C08C20545107CFDB3027B4D90CA2C3A1CAF80301F040215B9030C47B8E7C08024B9A