Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe

Overview

General Information

Sample name:17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
Analysis ID:1546879
MD5:ea189587eda182b5edcb3b4977dbe529
SHA1:35ecab87e17c8bac42598118745c92f1bff46a43
SHA256:bd0e792d8bccec62065711552deb0a997ff4132e4050f03e9a4adb4811e611cf
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected DcRat
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "sostener2024.duckdns.org", "Ports": "2020", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "Y87JSKg9gyY3j2G4q5kD4EQDhAzJbMPX", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "gCqxGN2XFz6m+Z9HeZmzkjMv3rqhTklv/R54m+q9IzJOC1WTeGYnTBHgEHP7RHOPDvHLdwCV0GVcEsyIPaFaTupUdTnKkBRj+0aQMfGKtySDBV7dakDsnQtcDzDhokI1I3dazs2Mc/vloCurAZcnNwgO0XThq+f26gcPFC/czS8=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x65f7:$a1: havecamera
    • 0x9ae8:$a2: timeout 3 > NUL
    • 0x9b08:$a3: START "" "
    • 0x9993:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x9a48:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
    • 0x9a48:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
    • 0x9993:$s2: L2Mgc2NodGFza3MgL2
    • 0x9912:$s3: QW1zaVNjYW5CdWZmZXI
    • 0x9960:$s4: VmlydHVhbFByb3RlY3Q
    17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0x9cca:$q1: Select * from Win32_CacheMemory
    • 0x9d0a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0x9d58:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0x9da6:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xa142:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x63f7:$a1: havecamera
      • 0x98e8:$a2: timeout 3 > NUL
      • 0x9908:$a3: START "" "
      • 0x9793:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x9848:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      00000000.00000002.3020676790.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x3ac9c:$b2: DcRat By qwqdanchun1
      00000000.00000002.3021179672.0000000002D01000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x55c0:$b1: DcRatByqwqdanchun
      • 0x29e384:$b2: DcRat By qwqdanchun1
      Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
          • 0x65f7:$a1: havecamera
          • 0x9ae8:$a2: timeout 3 > NUL
          • 0x9b08:$a3: START "" "
          • 0x9993:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
          • 0x9a48:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
          0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
          • 0x9a48:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
          • 0x9993:$s2: L2Mgc2NodGFza3MgL2
          • 0x9912:$s3: QW1zaVNjYW5CdWZmZXI
          • 0x9960:$s4: VmlydHVhbFByb3RlY3Q
          0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
          • 0x9cca:$q1: Select * from Win32_CacheMemory
          • 0x9d0a:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
          • 0x9d58:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
          • 0x9da6:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
          0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
          • 0xa142:$s1: DcRatBy
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-01T17:09:33.793529+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449731TCP
          2024-11-01T17:10:12.096403+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449781TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeAvira: detected
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeMalware Configuration Extractor: AsyncRAT {"Server": "sostener2024.duckdns.org", "Ports": "2020", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "Y87JSKg9gyY3j2G4q5kD4EQDhAzJbMPX", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "gCqxGN2XFz6m+Z9HeZmzkjMv3rqhTklv/R54m+q9IzJOC1WTeGYnTBHgEHP7RHOPDvHLdwCV0GVcEsyIPaFaTupUdTnKkBRj+0aQMfGKtySDBV7dakDsnQtcDzDhokI1I3dazs2Mc/vloCurAZcnNwgO0XThq+f26gcPFC/czS8=", "BDOS": "null", "External_config_on_Pastebin": "false"}
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeReversingLabs: Detection: 81%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeJoe Sandbox ML: detected
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: sostener2024.duckdns.org
          Source: unknownDNS query: name: sostener2024.duckdns.org
          Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
          Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
          Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49781
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49731
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: sostener2024.duckdns.org
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000002.3021179672.0000000002D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTR

          System Summary

          barindex
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3020676790.0000000000D3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3021179672.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeCode function: 0_2_00007FFD9B9030E50_2_00007FFD9B9030E5
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000000.1769313262.000000000087E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeBinary or memory string: OriginalFilenameClient.exe" vs 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3020676790.0000000000D3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3021179672.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, Settings.csBase64 encoded string: 'TFJspWD7GsHQMZk5UpkFiEkF2W8i6lF5YjmQP2kjAejFHftLHr/L1D5e+gaMfu6L38fb/AIcmCRR1WTi62phdg==', 'lU2GskampQbZN5NhwH3m7uSd7yMmhK0fR0Zej7eMp93lr2MwWx8qD+OsPX1PoQFtxSrMZAujfvSECKpIaxBl8Q==', 'htwC7eftEkjRbD+cufqUoeuEY1R46Iq/gTSt6wPHCCIYLKARWOln5TLITNb2UFeHTzp9L4VBUfa7nAe5clnPRw==', 'LCyumoDtjFSIJEagBeu3UfsZmIyW9maacktOUH4S//sMFk/zR4l9sLMGfGlwmCMGuO5cVHOB/o3oJP7DEgy4ch3Ywxvq8NEfPpbacWFHgnU=', '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', 'NoIhHBH5bfbiyagZh3dRg7/Px4YZJ2eUwWH4/UMoOBwHFlTzPe/5PK5UnrS45W0B8fT06W4AtyzgmkOHKX7e5HB3X1bB81PFmPPq8NLipjrSMA79U6G/oB7cHyCeBsEt7ln5m/WgvShHOucpD8FSekrSCPlnQy+SCP333pP//G5YzmCu6DLIV3HpX7F16lwaK2osqVtuUrb6P54yN16QJiHF40lnTwhhRdjacT6PuVy/Upt30iN/7CTsIWnDox4cGB0a3otfNkGCpwQd3ee5PrhqzxkMfnfa8L/3zmRZ3Kc=', 'T2A/8H2KAy0oymS0/rlSrP06sF1CQoMBYRRLSqtZZ5g9aOfYhLUqZjCfJPUOcOdZygMtMwJ/Ggl4DF0Dxe8U8w==', '/YAgNBdLNjTJToggewvNuEiwrOPpJSiKwW3Oi7tnfvBJlHJkbj8XjDYlsG2mSZSS0Seyuml9LLx7tUe56jT5aQ==', 'I8YgPYILlfn2ERWSVCKOF7yn6F6yyEAexl/+Go7X5L6TmfaKjjYkLRqd7G1rnVUbft4sZDNiMBdEVlZpzE64TQ==', 'N+HHqNTvY8ONW5CvHI5XgafXsBEAj2M6637NxicMfAXvppsFmg02MTrHbcV6An1deP8RUT554DfwOy8MFaIkhw==', 'XDlA+rud57XgoBMeguKqH9gWQV/a3wcxs2TIG0xptC/1r7JoZjgFRqfVTipVvzecE4DtyjaiLamHuzHG0xJCbQ=='
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@21/1
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeMutant created: NULL
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeReversingLabs: Detection: 81%
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeSection loaded: schannel.dllJump to behavior
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeCode function: 0_2_00007FFD9B9000BD pushad ; iretd 0_2_00007FFD9B9000C1

          Boot Survival

          barindex
          Source: Yara matchFile source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTR
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTR
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeMemory allocated: 10C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeMemory allocated: 1AD00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe TID: 6304Thread sleep time: -70000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000002.3022441568.000000001B663000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, Amsi.csReference to suspicious API methods: Win32.VirtualAllocEx(procAddress, (UIntPtr)(ulong)patch.Length, 64u, out var _)
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe.870000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTR
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
          Source: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe PID: 6320, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          2
          Virtualization/Sandbox Evasion
          OS Credential Dumping111
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account Manager13
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive21
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe82%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
          17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe100%AviraHEUR/AGEN.1307404
          17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          sostener2024.duckdns.org
          192.169.69.26
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            sostener2024.duckdns.orgtrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe, 00000000.00000002.3021179672.0000000002D01000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              192.169.69.26
              sostener2024.duckdns.orgUnited States
              23033WOWUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1546879
              Start date and time:2024-11-01 17:08:13 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 6s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/0@21/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 3
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • VT rate limit hit for: 17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              192.169.69.26SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
              • yuya0415.duckdns.org:1928/Vre
              confirmaci#U00f3n y correcci#U00f3n de la direcci#U00f3n de entrega.vbsGet hashmaliciousUnknownBrowse
              • servidorarquivos.duckdns.org/e/e
              oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
              • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
              oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
              • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
              http://yvtplhuqem.duckdns.org/ja/Get hashmaliciousUnknownBrowse
              • yvtplhuqem.duckdns.org/ja/
              http://fqqqffcydg.duckdns.org/en/Get hashmaliciousUnknownBrowse
              • fqqqffcydg.duckdns.org/en/
              http://yugdzvsqnf.duckdns.org/en/Get hashmaliciousUnknownBrowse
              • yugdzvsqnf.duckdns.org/en/
              &nuevo_pedido#..vbsGet hashmaliciousUnknownBrowse
              • servidorarquivos.duckdns.org/e/e
              transferencia_Hsbc.xlsxGet hashmaliciousUnknownBrowse
              • servidorarquivos.duckdns.org/e/e
              http://www.secure-0fflce-o365.duckdns.org/Get hashmaliciousUnknownBrowse
              • www.secure-0fflce-o365.duckdns.org/
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              sostener2024.duckdns.orgrKBGGJz4TB.exeGet hashmaliciousAsyncRATBrowse
              • 179.14.9.152
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              WOWUSv6pwbOEUpl.elfGet hashmaliciousUnknownBrowse
              • 208.115.121.90
              QUOTE #46789_AL_JAMEELA24.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 192.169.69.26
              173003310796a9a81fadbaf448c87ed10922a3747e183ef712567128e4bbfb00e7bcac9cd3988.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
              • 192.169.69.26
              kkkarm.elfGet hashmaliciousUnknownBrowse
              • 208.115.121.95
              UOp1kufsuw.exeGet hashmaliciousNanocoreBrowse
              • 192.169.69.26
              EXSP 5634 HISP9005 ST MSDS DOKUME74247liniereletOpsistype.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • 192.169.69.26
              DHL AWB_NO_928473.exeGet hashmaliciousRemcosBrowse
              • 192.169.69.26
              IMG465244247443 ORDER Opmagasinering.exeGet hashmaliciousXWormBrowse
              • 192.169.69.26
              172966494683a361ba19e5107ad739c4261113c8b850c2db5512e1d9850ba41c9e7130006e629.dat-decoded.exeGet hashmaliciousRemcosBrowse
              • 192.169.69.26
              17296642858200fb7d98884fd3fefd8063bc539e47fc39cf313b464256316dfe4c77155349452.dat-decoded.exeGet hashmaliciousRemcosBrowse
              • 192.169.69.26
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):5.616310833983759
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
              File size:48'640 bytes
              MD5:ea189587eda182b5edcb3b4977dbe529
              SHA1:35ecab87e17c8bac42598118745c92f1bff46a43
              SHA256:bd0e792d8bccec62065711552deb0a997ff4132e4050f03e9a4adb4811e611cf
              SHA512:79f96f975d5926fe1f7c56f989d82e0ed1d7b77435d8335cc6bd1fb38ab0643b7e8656336a61b5d82bc90d561768e00d170f516e900d478e548b126102086518
              SSDEEP:768:4q+s3pUtDILNCCa+DiptelDSN+iV08Ybyge9uFGq3xKvEgK/JvZVc6KN:4q+AGtQOptKDs4zb1fKnkJvZVclN
              TLSH:36235C4037E88136E2BD4BB8ACF3E2458275D6676903DA5D6CC814EA1F13BC596036FE
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x40cbbe
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x60930A0B [Wed May 5 21:11:39 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xcb640x57.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000xdf7.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xabc40xac00f679f2191adcfb0045d464b044618a5fFalse0.501953125data5.641277698381036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0xe0000xdf70xe002083376922615c09cdda9acfd9305376False0.4017857142857143data5.110607648061562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x100000xc0x20082148d01c3935cf90ef81a3dd1fad607False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_VERSION0xe0a00x2d4data0.4350828729281768
              RT_MANIFEST0xe3740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-11-01T17:09:33.793529+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449731TCP
              2024-11-01T17:10:12.096403+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449781TCP
              TimestampSource PortDest PortSource IPDest IP
              Nov 1, 2024 17:09:29.055077076 CET497302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:29.060847044 CET202049730192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:29.060961008 CET497302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:29.630889893 CET497302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:29.821495056 CET202049730192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:30.055504084 CET202049730192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:30.055572987 CET497302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:35.075131893 CET497302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:35.076411009 CET497352020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:35.080492020 CET202049730192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:35.081357002 CET202049735192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:35.081424952 CET497352020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:35.081799030 CET497352020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:35.086998940 CET202049735192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:35.864638090 CET202049735192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:35.864775896 CET497352020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:40.869112015 CET497352020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:40.874017954 CET202049735192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:40.895376921 CET497382020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:40.900245905 CET202049738192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:40.900312901 CET497382020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:40.907749891 CET497382020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:40.912729979 CET202049738192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:41.741308928 CET202049738192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:41.741379023 CET497382020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:46.742119074 CET497382020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:46.743019104 CET497392020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:46.747975111 CET202049738192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:46.748502970 CET202049739192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:46.749145031 CET497392020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:46.749428034 CET497392020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:46.755039930 CET202049739192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:47.570250034 CET202049739192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:47.570426941 CET497392020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:52.585900068 CET497392020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:52.586627960 CET497402020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:52.590724945 CET202049739192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:52.591523886 CET202049740192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:52.591613054 CET497402020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:52.591835022 CET497402020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:52.600878954 CET202049740192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:53.466475964 CET202049740192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:53.466558933 CET497402020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:58.476691961 CET497402020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:58.477987051 CET497412020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:58.481637001 CET202049740192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:58.482891083 CET202049741192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:58.482959986 CET497412020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:58.483258963 CET497412020192.168.2.4192.169.69.26
              Nov 1, 2024 17:09:58.488256931 CET202049741192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:59.314747095 CET202049741192.169.69.26192.168.2.4
              Nov 1, 2024 17:09:59.314884901 CET497412020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:04.321381092 CET497412020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:04.323596954 CET497432020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:04.327085018 CET202049741192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:04.328877926 CET202049743192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:04.328954935 CET497432020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:04.329271078 CET497432020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:04.335832119 CET202049743192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:05.201051950 CET202049743192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:05.201134920 CET497432020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:10.211146116 CET497432020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:10.212081909 CET497762020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:10.216051102 CET202049743192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:10.217255116 CET202049776192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:10.217333078 CET497762020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:10.217571020 CET497762020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:10.223187923 CET202049776192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:11.048015118 CET202049776192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:11.048098087 CET497762020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:16.054873943 CET497762020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:16.055908918 CET498012020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:16.059916019 CET202049776192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:16.061064005 CET202049801192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:16.061144114 CET498012020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:16.061446905 CET498012020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:16.066271067 CET202049801192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:16.950469971 CET202049801192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:16.950603962 CET498012020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:21.961172104 CET498012020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:21.962138891 CET498302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:21.977442980 CET202049801192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:21.977734089 CET202049830192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:21.977816105 CET498302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:21.978125095 CET498302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:21.994379997 CET202049830192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:22.870498896 CET202049830192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:22.870569944 CET498302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:27.883018017 CET498302020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:27.884139061 CET498612020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:27.887943983 CET202049830192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:27.889189959 CET202049861192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:27.889262915 CET498612020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:27.889635086 CET498612020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:27.894479036 CET202049861192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:28.680012941 CET202049861192.169.69.26192.168.2.4
              Nov 1, 2024 17:10:28.680108070 CET498612020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:33.695601940 CET498612020192.168.2.4192.169.69.26
              Nov 1, 2024 17:10:33.701133966 CET202049861192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:11.680943966 CET500132020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:11.688524008 CET202050013192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:11.688601971 CET500132020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:11.688941002 CET500132020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:11.695766926 CET202050013192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:12.608922958 CET202050013192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:12.608987093 CET500132020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:17.887624025 CET500132020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:17.888349056 CET500142020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:17.892625093 CET202050013192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:17.893274069 CET202050014192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:17.893345118 CET500142020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:17.893683910 CET500142020192.168.2.4192.169.69.26
              Nov 1, 2024 17:11:17.898705006 CET202050014192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:18.754641056 CET202050014192.169.69.26192.168.2.4
              Nov 1, 2024 17:11:18.754720926 CET500142020192.168.2.4192.169.69.26
              TimestampSource PortDest PortSource IPDest IP
              Nov 1, 2024 17:09:18.123394966 CET4949653192.168.2.41.1.1.1
              Nov 1, 2024 17:09:19.117243052 CET4949653192.168.2.41.1.1.1
              Nov 1, 2024 17:09:20.132859945 CET4949653192.168.2.41.1.1.1
              Nov 1, 2024 17:09:22.132827997 CET4949653192.168.2.41.1.1.1
              Nov 1, 2024 17:09:23.839931011 CET53494961.1.1.1192.168.2.4
              Nov 1, 2024 17:09:23.839982986 CET53494961.1.1.1192.168.2.4
              Nov 1, 2024 17:09:23.839993954 CET53494961.1.1.1192.168.2.4
              Nov 1, 2024 17:09:23.840029955 CET53494961.1.1.1192.168.2.4
              Nov 1, 2024 17:09:28.880295992 CET6424053192.168.2.41.1.1.1
              Nov 1, 2024 17:09:29.012103081 CET53642401.1.1.1192.168.2.4
              Nov 1, 2024 17:10:33.696456909 CET6318953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:34.711292982 CET6318953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:35.728046894 CET6318953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:37.707153082 CET53631891.1.1.1192.168.2.4
              Nov 1, 2024 17:10:37.707171917 CET53631891.1.1.1192.168.2.4
              Nov 1, 2024 17:10:37.707592010 CET53631891.1.1.1192.168.2.4
              Nov 1, 2024 17:10:42.722829103 CET5039153192.168.2.41.1.1.1
              Nov 1, 2024 17:10:43.711448908 CET5039153192.168.2.41.1.1.1
              Nov 1, 2024 17:10:44.726794004 CET5039153192.168.2.41.1.1.1
              Nov 1, 2024 17:10:46.742384911 CET5039153192.168.2.41.1.1.1
              Nov 1, 2024 17:10:46.946970940 CET53503911.1.1.1192.168.2.4
              Nov 1, 2024 17:10:46.946991920 CET53503911.1.1.1192.168.2.4
              Nov 1, 2024 17:10:46.947005033 CET53503911.1.1.1192.168.2.4
              Nov 1, 2024 17:10:47.322351933 CET53503911.1.1.1192.168.2.4
              Nov 1, 2024 17:10:51.962037086 CET5730953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:52.961390018 CET5730953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:53.976757050 CET5730953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:55.992539883 CET5730953192.168.2.41.1.1.1
              Nov 1, 2024 17:10:56.023420095 CET53573091.1.1.1192.168.2.4
              Nov 1, 2024 17:10:56.023442030 CET53573091.1.1.1192.168.2.4
              Nov 1, 2024 17:10:56.023452997 CET53573091.1.1.1192.168.2.4
              Nov 1, 2024 17:10:56.032180071 CET53573091.1.1.1192.168.2.4
              Nov 1, 2024 17:11:01.040117979 CET6496153192.168.2.41.1.1.1
              Nov 1, 2024 17:11:02.056124926 CET6496153192.168.2.41.1.1.1
              Nov 1, 2024 17:11:03.055114985 CET6496153192.168.2.41.1.1.1
              Nov 1, 2024 17:11:05.050100088 CET53649611.1.1.1192.168.2.4
              Nov 1, 2024 17:11:05.050116062 CET53649611.1.1.1192.168.2.4
              Nov 1, 2024 17:11:05.050127983 CET53649611.1.1.1192.168.2.4
              Nov 1, 2024 17:11:10.056658983 CET5590653192.168.2.41.1.1.1
              Nov 1, 2024 17:11:11.070651054 CET5590653192.168.2.41.1.1.1
              Nov 1, 2024 17:11:11.680125952 CET53559061.1.1.1192.168.2.4
              Nov 1, 2024 17:11:11.682195902 CET53559061.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 1, 2024 17:09:18.123394966 CET192.168.2.41.1.1.10xc66fStandard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:19.117243052 CET192.168.2.41.1.1.10xc66fStandard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:20.132859945 CET192.168.2.41.1.1.10xc66fStandard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:22.132827997 CET192.168.2.41.1.1.10xc66fStandard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:28.880295992 CET192.168.2.41.1.1.10xaf16Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:33.696456909 CET192.168.2.41.1.1.10x6fc8Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:34.711292982 CET192.168.2.41.1.1.10x6fc8Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:35.728046894 CET192.168.2.41.1.1.10x6fc8Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:42.722829103 CET192.168.2.41.1.1.10xb543Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:43.711448908 CET192.168.2.41.1.1.10xb543Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:44.726794004 CET192.168.2.41.1.1.10xb543Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:46.742384911 CET192.168.2.41.1.1.10xb543Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:51.962037086 CET192.168.2.41.1.1.10x2be2Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:52.961390018 CET192.168.2.41.1.1.10x2be2Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:53.976757050 CET192.168.2.41.1.1.10x2be2Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:55.992539883 CET192.168.2.41.1.1.10x2be2Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:01.040117979 CET192.168.2.41.1.1.10x4ab7Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:02.056124926 CET192.168.2.41.1.1.10x4ab7Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:03.055114985 CET192.168.2.41.1.1.10x4ab7Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:10.056658983 CET192.168.2.41.1.1.10x47b8Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:11.070651054 CET192.168.2.41.1.1.10x47b8Standard query (0)sostener2024.duckdns.orgA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 1, 2024 17:09:23.839931011 CET1.1.1.1192.168.2.40xc66fServer failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:23.839982986 CET1.1.1.1192.168.2.40xc66fServer failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:23.839993954 CET1.1.1.1192.168.2.40xc66fServer failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:23.840029955 CET1.1.1.1192.168.2.40xc66fServer failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:09:29.012103081 CET1.1.1.1192.168.2.40xaf16No error (0)sostener2024.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:37.707153082 CET1.1.1.1192.168.2.40x6fc8Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:37.707171917 CET1.1.1.1192.168.2.40x6fc8Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:37.707592010 CET1.1.1.1192.168.2.40x6fc8Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:46.946970940 CET1.1.1.1192.168.2.40xb543Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:46.946991920 CET1.1.1.1192.168.2.40xb543Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:46.947005033 CET1.1.1.1192.168.2.40xb543Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:47.322351933 CET1.1.1.1192.168.2.40xb543Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:56.023420095 CET1.1.1.1192.168.2.40x2be2Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:56.023442030 CET1.1.1.1192.168.2.40x2be2Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:56.023452997 CET1.1.1.1192.168.2.40x2be2Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:10:56.032180071 CET1.1.1.1192.168.2.40x2be2Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:05.050100088 CET1.1.1.1192.168.2.40x4ab7Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:05.050116062 CET1.1.1.1192.168.2.40x4ab7Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:05.050127983 CET1.1.1.1192.168.2.40x4ab7Server failure (2)sostener2024.duckdns.orgnonenoneA (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:11.680125952 CET1.1.1.1192.168.2.40x47b8No error (0)sostener2024.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Nov 1, 2024 17:11:11.682195902 CET1.1.1.1192.168.2.40x47b8No error (0)sostener2024.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:12:09:13
              Start date:01/11/2024
              Path:C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bbe09f276.dat-decoded.exe"
              Imagebase:0x870000
              File size:48'640 bytes
              MD5 hash:EA189587EDA182B5EDCB3B4977DBE529
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.1769296546.0000000000872000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3020676790.0000000000D3A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3021179672.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:32.9%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:6
                Total number of Limit Nodes:0
                execution_graph 1806 7ffd9b9029e1 1807 7ffd9b9029eb LoadLibraryA 1806->1807 1809 7ffd9b902ad2 1807->1809 1810 7ffd9b902d3d 1811 7ffd9b902d4b VirtualProtect 1810->1811 1813 7ffd9b902e2b 1811->1813

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 441 7ffd9b9030e5-7ffd9b903142 447 7ffd9b903148-7ffd9b9031ed 441->447 448 7ffd9b903381-7ffd9b9033c2 call 7ffd9b901998 441->448 476 7ffd9b9032b3 447->476 477 7ffd9b9031f3-7ffd9b9032a0 447->477 456 7ffd9b9033d7-7ffd9b9033e0 448->456 457 7ffd9b9033c4-7ffd9b9033d5 448->457 459 7ffd9b9033e8-7ffd9b903404 456->459 457->459 466 7ffd9b903419-7ffd9b90341e 459->466 467 7ffd9b903406-7ffd9b903417 459->467 470 7ffd9b903425-7ffd9b90348b call 7ffd9b9019a8 call 7ffd9b9019b8 466->470 467->470 491 7ffd9b903512 470->491 492 7ffd9b903491-7ffd9b9034dd 470->492 481 7ffd9b9032b8-7ffd9b9032df 476->481 477->476 518 7ffd9b9032a2-7ffd9b9032ad 477->518 499 7ffd9b9032e1-7ffd9b9032ef 481->499 496 7ffd9b903517-7ffd9b90353f 491->496 492->491 517 7ffd9b9034df-7ffd9b90350b 492->517 523 7ffd9b903541-7ffd9b903558 call 7ffd9b9038d5 496->523 505 7ffd9b903365-7ffd9b90337c 499->505 506 7ffd9b9032f1-7ffd9b90330b 499->506 513 7ffd9b903559-7ffd9b90356a 505->513 506->513 515 7ffd9b903311-7ffd9b90332c 506->515 525 7ffd9b903891 513->525 526 7ffd9b903570-7ffd9b90365e call 7ffd9b9019c8 call 7ffd9b9019d8 513->526 522 7ffd9b903334-7ffd9b903345 515->522 517->496 528 7ffd9b90350d-7ffd9b903510 517->528 518->481 521 7ffd9b9032af-7ffd9b9032b1 518->521 521->499 532 7ffd9b90334c-7ffd9b90335e 522->532 533 7ffd9b903347 522->533 523->513 529 7ffd9b903898-7ffd9b9038d3 525->529 526->476 552 7ffd9b903664-7ffd9b90367e 526->552 528->523 532->515 535 7ffd9b903360 532->535 533->513 535->513 553 7ffd9b903684-7ffd9b903690 552->553 554 7ffd9b903692-7ffd9b903698 553->554 555 7ffd9b90369a-7ffd9b9036a1 554->555 556 7ffd9b9036d0-7ffd9b9037a6 call 7ffd9b902418 554->556 555->554 559 7ffd9b9036a3-7ffd9b9036ca call 7ffd9b901988 call 7ffd9b900628 555->559 578 7ffd9b9037a7-7ffd9b9037b8 556->578 559->556 581 7ffd9b9037ba-7ffd9b90388f call 7ffd9b902418 578->581 581->529
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3023255324.00007FFD9B900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B900000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd9b900000_17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bb.jbxd
                Similarity
                • API ID:
                • String ID: ,
                • API String ID: 0-3772416878
                • Opcode ID: 3ab758cc2e9664915bd79a0992065f59f8e1a125021a87296624826b29137a32
                • Instruction ID: 604ce870c72ca00505501b973c4f062fe27a3d5aa34dc9aab5496e8340389ba1
                • Opcode Fuzzy Hash: 3ab758cc2e9664915bd79a0992065f59f8e1a125021a87296624826b29137a32
                • Instruction Fuzzy Hash: C832F631B2D90A5FEB68EB6C84657B973D2FF98310F544579E05EC32EACE28A8418741

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 592 7ffd9b9029e1-7ffd9b902ad0 LoadLibraryA 598 7ffd9b902ad8-7ffd9b902b31 call 7ffd9b902b32 592->598 599 7ffd9b902ad2 592->599 599->598
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3023255324.00007FFD9B900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B900000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd9b900000_17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bb.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: bcc5da6bfe6f94317de47a13b216f87ac0582525f78e8e74deed7b48f33d1916
                • Instruction ID: 5f0619c618fb1c0805783089f5d2c41eca1557a647aed71856d6a1f9c70c58f7
                • Opcode Fuzzy Hash: bcc5da6bfe6f94317de47a13b216f87ac0582525f78e8e74deed7b48f33d1916
                • Instruction Fuzzy Hash: B9416F30A08A5C8FDB98EF98D855BEDBBF1FF99310F1041AAD04DD7296CA75A845CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 605 7ffd9b902d3d-7ffd9b902d49 606 7ffd9b902d4b-7ffd9b902d53 605->606 607 7ffd9b902d54-7ffd9b902d63 605->607 606->607 608 7ffd9b902d65-7ffd9b902d6d 607->608 609 7ffd9b902d6e-7ffd9b902e29 VirtualProtect 607->609 608->609 614 7ffd9b902e2b 609->614 615 7ffd9b902e31-7ffd9b902e59 609->615 614->615
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3023255324.00007FFD9B900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B900000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ffd9b900000_17304772280366bf2e2bb7f849b5bf79510637548fa7c7d19dd73a2fc7893bc18cc1bb.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 1451839f1e0531af876cf177fed8db34c162e9c432f44d47c6add4b52d786309
                • Instruction ID: c172a815f5072e38fd414a9ccfabaf8476251507b52230a7e73c23324776f12b
                • Opcode Fuzzy Hash: 1451839f1e0531af876cf177fed8db34c162e9c432f44d47c6add4b52d786309
                • Instruction Fuzzy Hash: F441193190D7884FDB199BA898566ED7FE0EF56321F0442AFD089C3193CA746806C796