Windows
Analysis Report
HHn9tNeZd8.exe
Overview
General Information
Sample name: | HHn9tNeZd8.exerenamed because original name is a hash value |
Original sample name: | ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db.exe |
Analysis ID: | 1550284 |
MD5: | e568ed81e7672a30a6954c966b617de2 |
SHA1: | f488b104c27b490d4d2b69d2fe8206dd45036347 |
SHA256: | ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db |
Tags: | exeuser-adrian__luca |
Infos: | |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- HHn9tNeZd8.exe (PID: 4524 cmdline:
"C:\Users\ user\Deskt op\HHn9tNe Zd8.exe" MD5: E568ED81E7672A30A6954C966B617DE2) - HHn9tNeZd8.exe (PID: 2060 cmdline:
"C:\Users\ user\Deskt op\HHn9tNe Zd8.exe" MD5: E568ED81E7672A30A6954C966B617DE2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T16:30:42.169878+0100 | 2022930 | 1 | A Network Trojan was detected | 20.12.23.50 | 443 | 192.168.2.7 | 49734 | TCP |
2024-11-06T16:31:21.149647+0100 | 2022930 | 1 | A Network Trojan was detected | 20.12.23.50 | 443 | 192.168.2.7 | 49814 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00405C60 | |
Source: | Code function: | 0_2_004068B1 |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Code function: | 0_2_0040352F |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_70341BFF |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_0040352F |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_70341BFF |
Source: | Code function: | 0_2_703430EE |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File opened: | Jump to behavior |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Code function: | 0_2_00405C60 | |
Source: | Code function: | 0_2_004068B1 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-2644 | ||
Source: | API call chain: | graph_0-2870 |
Source: | Code function: | 0_2_70341BFF |
Source: | Code function: | 0_2_0040352F |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 11 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | 12 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Process Injection | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Access Token Manipulation | Security Account Manager | 3 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 22 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
45% | ReversingLabs | Win32.Trojan.Guloader | ||
100% | Avira | HEUR/AGEN.1331786 |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
kmsaksesuar.com | 44.28.239.165 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
44.28.239.165 | kmsaksesuar.com | United States | 7377 | UCSDUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1550284 |
Start date and time: | 2024-11-06 16:29:26 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | HHn9tNeZd8.exerenamed because original name is a hash value |
Original Sample Name: | ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db.exe |
Detection: | MAL |
Classification: | mal80.troj.evad.winEXE@2/12@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: HHn9tNeZd8.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
44.28.239.165 | Get hash | malicious | GuLoader | Browse | ||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
kmsaksesuar.com | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
UCSDUS | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsf288C.tmp\System.dll | Get hash | malicious | GuLoader | Browse | ||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 5.804946284177748 |
Encrypted: | false |
SSDEEP: | 192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr |
MD5: | 192639861E3DC2DC5C08BB8F8C7260D5 |
SHA1: | 58D30E460609E22FA0098BC27D928B689EF9AF78 |
SHA-256: | 23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6 |
SHA-512: | 6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 267575 |
Entropy (8bit): | 7.796054563912965 |
Encrypted: | false |
SSDEEP: | 6144:SwqR4VAHAaBgMA1a0bkY8oV6YZxAyAu+bLN3Hv86vI:1qOmH9MbvA8+/N3HZw |
MD5: | D61648D26008666B0A0A2BCC616093D2 |
SHA1: | DC0E4886A3F314D175B174F863AF49F22F6707A7 |
SHA-256: | D20E76D03FD5427C06641730DE2F301E24F1FDDC8B858C282E506F33F7D5772B |
SHA-512: | 81F66779531205E0315B383565DE3BC2EA3F86237CF161BDB4BD480B7E468E01E96BB8EBA845F081EC9DD028B7B676B71C114813BEE9CF603F23189FB43B877E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 246772 |
Entropy (8bit): | 1.2570033577927036 |
Encrypted: | false |
SSDEEP: | 768:jF+X5GwMbRR6v/H4EwYatl23bka4FtbP30qIlbXc/B/VDYFgHUAHFLO3+u1uNnEA:jFROqkCEr2/Vd0WP9Ph0nVc |
MD5: | 51B771910E4858E4E5CDD09DF62F5BB8 |
SHA1: | 8F52AC9FB80E1F75FB4C20112D83E41F6B51B9A5 |
SHA-256: | 673C982F75C3CDD0EACAD35785FB01475D01964806072C2DE8E4B011C8EF4DB7 |
SHA-512: | ADE1E430583B64F3A8EE77931B24CD4C179A44CF5C88CA46444F41616812D524660274F426D5AB7EC62E0277B58EB5E13F737ABDFDCA83DB55853EAD4CA78E5F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 379 |
Entropy (8bit): | 4.329981128856023 |
Encrypted: | false |
SSDEEP: | 6:9xjkVqlVDbW189uc6q9KReE9cypokkFqpiL3XP2MkdmFiFNSdqkDrD60s++JuGgz:LxPDbWA9weQcyF+n+Mwm8FYFDKpJbJf0 |
MD5: | F6E659DE27C7920DA8122DCD7C1EBBFD |
SHA1: | FF974B124B5C7F75694B9821FCF43A71E80FF8FD |
SHA-256: | 4014208ED19D8A82A79EF53A86178D0B3AAF527A872BBC34D4D55476BA52C66A |
SHA-512: | 77B7C164E8A422B7DB2B3FF9978689A2A67DF34F84DE2FBE25EF3517259908682DE46C59264A4C3CDDD5DBDE16EE37232678097EFEE26FADBA351332200CA010 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 391326 |
Entropy (8bit): | 1.2598991897339225 |
Encrypted: | false |
SSDEEP: | 768:GcJYS2pZ+e16MV4+KZgNQ97FkX/E+Lt97IkW3F4OvAPwmcMUoaFu4vMBUq2L0BQZ:/TmK4iiR6XUq0Qw1rfyivGfSopD6uH0y |
MD5: | 6E6832896907F1F51F42BAE57CE341BC |
SHA1: | 9294AC513B5968808BE70F6EFE2D027E7837B989 |
SHA-256: | C65E4FF0B7A80E686858F6C34B686DE908540CCDE1A3AE5E627272DFC4E40D20 |
SHA-512: | BC04F0319512812E54A7E612991A7BD71FEAE1E955DAFCAEE407C835F70D1E1F4212E4085D123A046BFBFCE2F96BF9DD80B456E308B11D0584E933FE6D456324 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 94596 |
Entropy (8bit): | 4.617825489661229 |
Encrypted: | false |
SSDEEP: | 1536:fb0Qns7L9ja2T3zN3nOn4SX4GCZY6vfkB7QEqT2Aes6T7xEn:4z7LRaMjN3nO4K4GCq6vfSLqSn9k |
MD5: | 935DB226075ADD353A773223AC3A4E1C |
SHA1: | A4DE27FA1323A5F795294430AA17D8B2D3A4D53B |
SHA-256: | 922A066A18A4F90BD69874F239CD67DED44A7FD3CCB4AA56BC4393C0EE3862F6 |
SHA-512: | DA9E74A2D61540192D3D4BCC8C03A4D3DB6B4C0E192456F9D0B1AA1EB95A34792AF574286883BE6906B5CF07E1D477D121F6D35FF99572289E688BC7C1FD0B2E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 258798 |
Entropy (8bit): | 1.2490334020377054 |
Encrypted: | false |
SSDEEP: | 768:T2PLd1hgU1SmVlqVwusTqMdrtd5jsctJuIsiIZtRlAf9tpjc9GI+DFENhHiXP7yj:ad1euLPsb39GIqFruRChk |
MD5: | 3269394F73B2ADA0574A74284D8B2E17 |
SHA1: | 8CC597FD67D71D56F489C2B970682D9DED1392FC |
SHA-256: | 510850D30CEC95EB1A0BF4FCA7B7F0113F0D4C42726B794EFA98937AF62A516B |
SHA-512: | A4BFAA7C52CF5EE5E9CDB900A3228A17109BFE46B08266DAE3057F17A6EAAAAB5DFD91DBB4833FA47FC961B5809FB41C340BCF82139ACD7A4B9AB54DF94351D8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 323693 |
Entropy (8bit): | 1.2536949862219147 |
Encrypted: | false |
SSDEEP: | 1536:FCN4UE4Tjyohd/qCWOGtHCIFy58RqmA3I:FCN4GiVCuyuw3I |
MD5: | AEE2F83A7C4C7F24701B741521FB2E16 |
SHA1: | A8FEFDB29A731112A30BB5E2B3EF87B89A6D0F3E |
SHA-256: | CAEBFE32548B8DC684AA35B144A20A99FA6F36692BED690DE4900691A525DA30 |
SHA-512: | 075E80AC88843441E4B3A24D525DD1043AAEFCA9EBCB8C445E442C3B4F421C955A2A5A93D9E37327BB50228B81F2036C0D9842CFED7D186A05DABD5C211C3879 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 218367 |
Entropy (8bit): | 1.246980092990912 |
Encrypted: | false |
SSDEEP: | 768:5c8SYAdyufvUy3CuNMJAdaM+KCzP6QcG9wghZ0cL52j/i10qEDYiaXF44Xrrocc1:5hAdayyxFVZ64Xve5rsW4 |
MD5: | 9EC9F165C9E1D40A5FE69E13F4E40BB2 |
SHA1: | 4F35529EB907F3DD41D2F1C1F8114896B0049FEF |
SHA-256: | 3C494D3A6F8E831560EDCAF571F1AED0DB2699D951DCE31555FFC8EEB0C68E8E |
SHA-512: | 1F8BC071520584402BE5692375F40AF319914777AD3CF7CAF4291D4281E4FF3EB18FEE781F22C84F4336B8E403A21D59D8F4EECF17009DA34D7DA9B6B6EDA14F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 465079 |
Entropy (8bit): | 1.2524740649146269 |
Encrypted: | false |
SSDEEP: | 1536:Rv7GJmqRTpKBSpacoAbleU7c0PReL6HSE1/hqQ79/:RzG5n7DRe+jqQ |
MD5: | E2123D8FCF95DD997B5B57C859952C42 |
SHA1: | C57FA1122078B47A37E0D2FADD0ABC4C2B8B6185 |
SHA-256: | 7D67F05679B2132F418A353DC26498F79E93133C482B28D20EE18C3A83534B3E |
SHA-512: | 1A5339D733B08A760BE0D69162422A3A9199AC496D970A57050C3C009FE9EF47095CE2F4D14E6F96F7CB5E870E1CAF8EAFE2AF4660FCEC2AADEAD2884F27A27D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 442049 |
Entropy (8bit): | 1.2574037958564046 |
Encrypted: | false |
SSDEEP: | 1536:9U42WMwaAJbj1SWgmYjFLw5pUEx6Yszh92PbGwT/:9UM9ffpcFLwYuHszj2Pbf |
MD5: | 436F0693F85A9463E53FC25016A6E62E |
SHA1: | 70920FF51C4E0CAA612419FFB860FDDC24F0B7C5 |
SHA-256: | F4190EE3362CE3585A4A921077C1AD14E895C80AD7D17455B55AAC27335E2093 |
SHA-512: | CEC32BAF315AE9D3480D221E54503898E2EB31C5FD0B81A87852AD6EA566BA8584B0CA02D3E898C5CBB078F60B20EFA490F6B2D8D4F1ED22169C8DF2DC7BB392 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
File Type: | |
Category: | modified |
Size (bytes): | 33 |
Entropy (8bit): | 3.9653141049815805 |
Encrypted: | false |
SSDEEP: | 3:KmIAWRY2Wd3:MzRUp |
MD5: | 76D9175A3DB7407EB0BFC3C07DDCD9D2 |
SHA1: | 72071127E9A44935CB02650ED715CCAF6A8F8418 |
SHA-256: | 1F7119996DD17AF05BF05E497104715BBBC3909676AFA4329FBD59502BE1A1A5 |
SHA-512: | 5032DAB71E70A4BD1DAD2F5CF9380E0097BE7993BC46886FED6E4BDD8781F2B10D31338D90D0DC5804665BDA2CBFE93F1172250E1A8AB7C9118BAF9F156E3C69 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.830812784257768 |
TrID: |
|
File name: | HHn9tNeZd8.exe |
File size: | 827'024 bytes |
MD5: | e568ed81e7672a30a6954c966b617de2 |
SHA1: | f488b104c27b490d4d2b69d2fe8206dd45036347 |
SHA256: | ac181e995def08ad2ca48afff1aa70b0d534504e6cb9e4056644d616fcce77db |
SHA512: | b3c32301715b836fabf25e0d7f4d2d95457206dfb77cd2450d79f293dde321aa290c896554dcac396b945c35e4d2bd8e5963494d00600dcfed4a863af00faf82 |
SSDEEP: | 24576:TG+y7etk5qAChl5H87LE8oy9jRKta3uja581Cm:6mk547c7L7o/aE |
TLSH: | 94052300A570A433EAD95730CE5EE5726976ECB81C21294B1353BF4FB9B2642ED3DB12 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:.... |
Icon Hash: | 06860fcf871b1f07 |
Entrypoint: | 0x40352f |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x660843EA [Sat Mar 30 16:55:06 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f4639a0b3116c2cfc71144b88a929cfd |
Signature Valid: | false |
Signature Issuer: | CN=Bideternes, O=Bideternes, L=Gaddesby, C=GB |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D2C35B52541D2A7224B177C0489672A5 |
Thumbprint SHA-1: | DAB32181293C3811113A05372CD3B25369BBD8EA |
Thumbprint SHA-256: | B14539847E70F750F2250A62A0CD390E4E9597BFF2B008C1A7CD59AC563CE76C |
Serial: | 299E758B75D7F63AE5770E746552527B20CC6672 |
Instruction |
---|
sub esp, 000003F8h |
push ebp |
push esi |
push edi |
push 00000020h |
pop edi |
xor ebp, ebp |
push 00008001h |
mov dword ptr [esp+20h], ebp |
mov dword ptr [esp+18h], 0040A2D8h |
mov dword ptr [esp+14h], ebp |
call dword ptr [004080A4h] |
mov esi, dword ptr [004080A8h] |
lea eax, dword ptr [esp+34h] |
push eax |
mov dword ptr [esp+4Ch], ebp |
mov dword ptr [esp+0000014Ch], ebp |
mov dword ptr [esp+00000150h], ebp |
mov dword ptr [esp+38h], 0000011Ch |
call esi |
test eax, eax |
jne 00007F75E0C7340Ah |
lea eax, dword ptr [esp+34h] |
mov dword ptr [esp+34h], 00000114h |
push eax |
call esi |
mov ax, word ptr [esp+48h] |
mov ecx, dword ptr [esp+62h] |
sub ax, 00000053h |
add ecx, FFFFFFD0h |
neg ax |
sbb eax, eax |
mov byte ptr [esp+0000014Eh], 00000004h |
not eax |
and eax, ecx |
mov word ptr [esp+00000148h], ax |
cmp dword ptr [esp+38h], 0Ah |
jnc 00007F75E0C733D8h |
and word ptr [esp+42h], 0000h |
mov eax, dword ptr [esp+40h] |
movzx ecx, byte ptr [esp+3Ch] |
mov dword ptr [007A8318h], eax |
xor eax, eax |
mov ah, byte ptr [esp+38h] |
movzx eax, ax |
or eax, ecx |
xor ecx, ecx |
mov ch, byte ptr [esp+00000148h] |
movzx ecx, cx |
shl eax, 10h |
or eax, ecx |
movzx ecx, byte ptr [esp+0000004Eh] |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x84fc | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x3f6000 | 0x10078 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xc7bc8 | 0x22c8 | .data |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2a8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x66d1 | 0x6800 | 1cb1571d2754df0a2b7df66b1b8d9089 | False | 0.6727388822115384 | data | 6.4708065613184305 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x1358 | 0x1400 | f0b500ff912dda10f31f36da3efc8a1e | False | 0.44296875 | data | 5.102094016108248 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x39e378 | 0x600 | 92e7d2d711bd61815cb4cc2d30d795b1 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x3a9000 | 0x4d000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x3f6000 | 0x10078 | 0x10200 | 2f803b37b807a2b1d5cbde829bcf3ad9 | False | 0.38117732558139533 | data | 3.911000282332835 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_BITMAP | 0x3f6460 | 0x368 | Device independent bitmap graphic, 96 x 16 x 4, image size 768 | English | United States | 0.23623853211009174 |
RT_ICON | 0x3f67c8 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.3824988190836089 |
RT_ICON | 0x3fa9f0 | 0x3228 | Device independent bitmap graphic, 64 x 128 x 24, image size 12800 | English | United States | 0.32118380062305296 |
RT_ICON | 0x3fdc18 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.4403526970954357 |
RT_ICON | 0x4001c0 | 0x1ca8 | Device independent bitmap graphic, 48 x 96 x 24, image size 7296 | English | United States | 0.3501908396946565 |
RT_ICON | 0x401e68 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.549718574108818 |
RT_ICON | 0x402f10 | 0xca8 | Device independent bitmap graphic, 32 x 64 x 24, image size 3200 | English | United States | 0.38117283950617287 |
RT_ICON | 0x403bb8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.6311475409836066 |
RT_ICON | 0x404540 | 0x748 | Device independent bitmap graphic, 24 x 48 x 24, image size 1824 | English | United States | 0.4093347639484979 |
RT_ICON | 0x404c88 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.6693262411347518 |
RT_ICON | 0x4050f0 | 0x368 | Device independent bitmap graphic, 16 x 32 x 24, image size 832 | English | United States | 0.4323394495412844 |
RT_DIALOG | 0x405458 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0x4055a0 | 0x13c | data | English | United States | 0.5506329113924051 |
RT_DIALOG | 0x4056e0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x4057e0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x405900 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x4059c8 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x405a28 | 0x92 | data | English | United States | 0.636986301369863 |
RT_VERSION | 0x405ac0 | 0x274 | data | English | United States | 0.5015923566878981 |
RT_MANIFEST | 0x405d38 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
ADVAPI32.dll | RegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW |
SHELL32.dll | SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW |
ole32.dll | CoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree |
COMCTL32.dll | ImageList_Destroy, ImageList_AddMasked, ImageList_Create |
USER32.dll | MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics |
GDI32.dll | GetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor |
KERNEL32.dll | lstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-06T16:30:42.169878+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.12.23.50 | 443 | 192.168.2.7 | 49734 | TCP |
2024-11-06T16:31:21.149647+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.12.23.50 | 443 | 192.168.2.7 | 49814 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 6, 2024 16:32:13.006392002 CET | 49970 | 443 | 192.168.2.7 | 44.28.239.165 |
Nov 6, 2024 16:32:13.006426096 CET | 443 | 49970 | 44.28.239.165 | 192.168.2.7 |
Nov 6, 2024 16:32:13.006504059 CET | 49970 | 443 | 192.168.2.7 | 44.28.239.165 |
Nov 6, 2024 16:32:13.046528101 CET | 49970 | 443 | 192.168.2.7 | 44.28.239.165 |
Nov 6, 2024 16:32:13.046540976 CET | 443 | 49970 | 44.28.239.165 | 192.168.2.7 |
Nov 6, 2024 16:32:30.023243904 CET | 443 | 49970 | 44.28.239.165 | 192.168.2.7 |
Nov 6, 2024 16:32:30.023298979 CET | 49970 | 443 | 192.168.2.7 | 44.28.239.165 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 6, 2024 16:32:12.909513950 CET | 50203 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 6, 2024 16:32:12.994782925 CET | 53 | 50203 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 6, 2024 16:32:12.909513950 CET | 192.168.2.7 | 1.1.1.1 | 0x11c4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 6, 2024 16:32:12.994782925 CET | 1.1.1.1 | 192.168.2.7 | 0x11c4 | No error (0) | 44.28.239.165 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 10:30:20 |
Start date: | 06/11/2024 |
Path: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 827'024 bytes |
MD5 hash: | E568ED81E7672A30A6954C966B617DE2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 11 |
Start time: | 11:54:56 |
Start date: | 06/11/2024 |
Path: | C:\Users\user\Desktop\HHn9tNeZd8.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 827'024 bytes |
MD5 hash: | E568ED81E7672A30A6954C966B617DE2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 24.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 18.7% |
Total number of Nodes: | 710 |
Total number of Limit Nodes: | 23 |
Graph
Function 0040352F Relevance: 84.5, APIs: 32, Strings: 16, Instructions: 464stringfilecomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C60 Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 148filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068B1 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403C26 Relevance: 45.7, APIs: 13, Strings: 13, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004030A2 Relevance: 24.7, APIs: 5, Strings: 9, Instructions: 181memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406591 Relevance: 16.0, APIs: 6, Strings: 3, Instructions: 204stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068D8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405F2B Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 47stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406422 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405AA8 Relevance: 3.0, APIs: 2, Instructions: 26COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B37 Relevance: 3.0, APIs: 2, Instructions: 24processCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406044 Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B02 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70342B98 Relevance: 1.6, APIs: 1, Instructions: 143fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060C7 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060F6 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70342A7F Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004034E7 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404508 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 703412BB Relevance: 1.3, APIs: 1, Instructions: 6memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70341BFF Relevance: 20.1, APIs: 13, Instructions: 597stringlibrarymemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040619A Relevance: 24.6, APIs: 10, Strings: 4, Instructions: 130memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040453A Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70342480 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 135memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402FB8 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70342655 Relevance: 9.1, APIs: 6, Instructions: 109COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 70341979 Relevance: 7.7, APIs: 5, Instructions: 194COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 703416BD Relevance: 7.5, APIs: 5, Instructions: 41memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E23 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 703410E1 Relevance: 6.4, APIs: 5, Instructions: 145memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040303E Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E6F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405FA9 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|