Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe

Overview

General Information

Sample name:17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
Analysis ID:1553106
MD5:01ef0ba434c74e68df6e94737826d22f
SHA1:86c934eb90ae6ecc38fd7dd38001552f618d5e5f
SHA256:48ee878fefc7d5d9df66fc978dfaafcfb61129acf92b1143e1b865ab292be9f0
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected DcRat
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"Server": "dckast.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "IcjempBO8d2MCouzOGusB0svKBQJXA6a", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "ZIALyYaEK2Gf9gnEAWavWOlpzAiUytpYF0CfNaOtJ8GspQ6HPAr4iuTjM7Rva8TOykfQUmKjNP6Kbjdj6exK3H8TCZIcKZdURtF0TCwSQvECT0GIeTVFARCSyw9L7oDKWUmPRrmclA8bpdKzhVCHHWUMlnSSUQbraA0yIMRWCzQ=", "BDOS": "null", "External_config_on_Pastebin": "false"}
SourceRuleDescriptionAuthorStrings
17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x65fb:$a1: havecamera
    • 0x9aec:$a2: timeout 3 > NUL
    • 0x9b0c:$a3: START "" "
    • 0x9997:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
    • 0x9a4c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
    17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
    • 0x9a4c:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
    • 0x9997:$s2: L2Mgc2NodGFza3MgL2
    • 0x9916:$s3: QW1zaVNjYW5CdWZmZXI
    • 0x9964:$s4: VmlydHVhbFByb3RlY3Q
    17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
    • 0x9cce:$q1: Select * from Win32_CacheMemory
    • 0x9d0e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
    • 0x9d5c:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
    • 0x9daa:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
    17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
    • 0xa146:$s1: DcRatBy
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x63fb:$a1: havecamera
      • 0x98ec:$a2: timeout 3 > NUL
      • 0x990c:$a3: START "" "
      • 0x9797:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
      • 0x984c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
      00000000.00000002.3264671730.0000000000F74000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x4f58c:$b2: DcRat By qwqdanchun1
      00000000.00000002.3265097856.0000000002D41000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
      • 0x55d0:$b1: DcRatByqwqdanchun
      • 0x29e3dc:$b2: DcRat By qwqdanchun1
      Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpackWindows_Trojan_DCRat_1aeea1acunknownunknown
          • 0x65fb:$a1: havecamera
          • 0x9aec:$a2: timeout 3 > NUL
          • 0x9b0c:$a3: START "" "
          • 0x9997:$a4: L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g
          • 0x9a4c:$a5: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==
          0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpackINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
          • 0x9a4c:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
          • 0x9997:$s2: L2Mgc2NodGFza3MgL2
          • 0x9916:$s3: QW1zaVNjYW5CdWZmZXI
          • 0x9964:$s4: VmlydHVhbFByb3RlY3Q
          0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
          • 0x9cce:$q1: Select * from Win32_CacheMemory
          • 0x9d0e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
          • 0x9d5c:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
          • 0x9daa:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
          0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
          • 0xa146:$s1: DcRatBy
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-10T11:53:27.865161+010020229301A Network Trojan was detected20.12.23.50443192.168.2.549707TCP
          2024-11-10T11:54:06.445320+010020229301A Network Trojan was detected20.12.23.50443192.168.2.549862TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeAvira: detected
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeMalware Configuration Extractor: AsyncRAT {"Server": "dckast.duckdns.org", "Ports": "35650", "Version": "1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "IcjempBO8d2MCouzOGusB0svKBQJXA6a", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "ZIALyYaEK2Gf9gnEAWavWOlpzAiUytpYF0CfNaOtJ8GspQ6HPAr4iuTjM7Rva8TOykfQUmKjNP6Kbjdj6exK3H8TCZIcKZdURtF0TCwSQvECT0GIeTVFARCSyw9L7oDKWUmPRrmclA8bpdKzhVCHHWUMlnSSUQbraA0yIMRWCzQ=", "BDOS": "null", "External_config_on_Pastebin": "false"}
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeReversingLabs: Detection: 81%
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeVirustotal: Detection: 76%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeJoe Sandbox ML: detected
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: dckast.duckdns.org
          Source: unknownDNS query: name: dckast.duckdns.org
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 45.135.232.38:35650
          Source: Joe Sandbox ViewIP Address: 45.135.232.38 45.135.232.38
          Source: Joe Sandbox ViewASN Name: ASBAXETNRU ASBAXETNRU
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.5:49862
          Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.5:49707
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: dckast.duckdns.org
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000002.3265097856.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTR

          System Summary

          barindex
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
          Source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3264671730.0000000000F74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: 00000000.00000002.3265097856.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeCode function: 0_2_00007FF848DA308D0_2_00007FF848DA308D
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000000.2024789896.0000000000A8E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe" vs 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeBinary or memory string: OriginalFilenameClient.exe" vs 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
          Source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
          Source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3264671730.0000000000F74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 00000000.00000002.3265097856.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, Settings.csBase64 encoded string: 'XdIMr3DfHPVWG7i0DgU381uXZbKGsO343wXMjENGAQ3/S/xbBju3RpMBkyi5pGjqtvqAuOXG/Zo33UOMvuYtuA==', 'QKiV0MZ8cAMSMQPrZz6NjO73qu8qmMa8SelebdZYAISS8E8B5lDRlEvDUYDmUzq6chqVQHy2/yGWlV4Qt9iJ0g==', 'RCu73t0dkF5BCKgJOq8EqhwZkc3ILb4uReU7OuxcfXKXkWTyyva9YRotvewC3f7guNUBvBqEUE4BK0MAfZkoZYaYlaz0shLuBqMZJUFaVfI=', 'pUeVdv9HUKzewwjroNrDBMPVfA/PeUdWxDAwJ5ipQ10Ze6/XmyRlWNnk4zAcpFRxkrdeJE8/ZMSEDnTG0IDJ0fF85tBmJxwFHBBKo2nT9XeMiCIawK0je7cV32vT7umlAFuwCc822XusOyecc0l/lvZOQ0/5ogD+pRczQgVxnsC1RyBwcDPoNb+Upr64Vr3kPTKxmVIzcbH2zuPPRfkuQ/YkufwSgQbVIGS8dy9BWLVFmkt7a+rXMGj+6JHADywEJ0BVvFwvgpx1LI54WbhTi/oultIAO/++5Bcpjjv5vUQ=', 'mjvTqGmMaPrekjciiSBtVN6fC8hCPQ94oaV8dGQPhqFQBxgH06SX/Lcq0tYrVVe2Uvl/Ls1iL84Y9RJ0j0XzWA==', 'OC7lj/tI5fuT0CguxMaZWTHrXmjmV5iXdRKBHggA25SLCjqfe1rtSekFBr9Uf/4ODqxt/aajn/FQR9affsHrWw==', 'NpkG/O0FmKBBoGncAO2Fsu6lRYnPNVuc/FkV7xsQQ1ZO+AyWd3c2uDgQkgdcevWDgBdPsFEC9F92TOT8hOKROg==', 'ir3agYRntJvL4HwBx40oqoGOBczbE72UXzjqxpg3kn9fUmOHZuXWmDdUKpKoAOZrFALN54kQJl4EKKF5Mdij8A==', '+kxCV5kzL3RZ403WTn5+FC0bF/KEc0yt8pNpOLXQbqtZM/KV2PjQot+gmKPLruKHCF81H+s6wYQZskP4FU8RRg=='
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, NormalStartup.csBase64 encoded string: 'L2Mgc2NodGFza3MgL2NyZWF0ZSAvZiAvc2Mgb25sb2dvbiAvcmwgaGlnaGVzdCAvdG4g', 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA=='
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@2/1
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeMutant created: NULL
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeReversingLabs: Detection: 81%
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeVirustotal: Detection: 76%
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeSection loaded: schannel.dllJump to behavior
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeCode function: 0_2_00007FF848DA00BD pushad ; iretd 0_2_00007FF848DA00C1

          Boot Survival

          barindex
          Source: Yara matchFile source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTR
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTR
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeMemory allocated: 2C90000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeMemory allocated: 1AD40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe TID: 1996Thread sleep time: -95000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000002.3266225739.000000001B6BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, AntiProcess.csReference to suspicious API methods: OpenProcess(1u, bInheritHandle: false, processId)
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, Win32.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, Amsi.csReference to suspicious API methods: Win32.VirtualAllocEx(procAddress, (UIntPtr)(ulong)patch.Length, 64u, out var _)
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: Yara matchFile source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe.a80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTR
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MSASCui.exe
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
          Source: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: 17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe PID: 1992, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          2
          Virtualization/Sandbox Evasion
          OS Credential Dumping111
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
          Obfuscated Files or Information
          Security Account Manager13
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture21
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe82%ReversingLabsByteCode-MSIL.Backdoor.AsyncRAT
          17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe76%VirustotalBrowse
          17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe100%AviraHEUR/AGEN.1307404
          17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          dckast.duckdns.org0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          dckast.duckdns.org
          45.135.232.38
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            dckast.duckdns.orgtrue
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe, 00000000.00000002.3265097856.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.135.232.38
              dckast.duckdns.orgRussian Federation
              49392ASBAXETNRUtrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1553106
              Start date and time:2024-11-10 11:52:14 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 51s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/0@2/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 3
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              45.135.232.381730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                sostener.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                  172698102496c864a187aff64295ab0b70d4e0148fc884b8fdef49a9c604553959f0c4197e421.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    1726981024afb0b5261027cf8cb56ba2e74288f35f8a8f03f714e141da3004c24e1b6d3c16555.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                      decode_3c3a2e81bb9b9ea689c7c8d6aa9e24c0af55f3915e14295a64263688c83f4ab7.exeGet hashmaliciousRemcosBrowse
                        sostener.vbsGet hashmaliciousRemcosBrowse
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ASBAXETNRU1730879944d691bb811f5e0f33d6d0d5afc86cdfb09b3d0562ee86d2276a3358127f125d3c941.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                          • 45.135.232.38
                          arm5.elfGet hashmaliciousMiraiBrowse
                          • 212.196.181.187
                          Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                          • 194.87.252.100
                          dvc2TBOZTh.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                          • 194.135.20.4
                          teh76E2k50.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                          • 194.135.20.4
                          SecuriteInfo.com.Trojan.Siggen29.1091.20762.15518.exeGet hashmaliciousXmrigBrowse
                          • 45.89.228.144
                          bin.armv7l.elfGet hashmaliciousMiraiBrowse
                          • 212.192.15.49
                          https://sub.investorscabirigroup.com/4WQbos10596ktJI775idiwtbqpkk1528WGTFCWTFRKDXPVO305927/749609o14Get hashmaliciousPhisherBrowse
                          • 45.147.195.16
                          https://sub.investorscabirigroup.com/4tBfEb10596UgJc775rrkvedqhmm1528ZICWGQLYSOBMUOM389951/749609V14Get hashmaliciousPhisherBrowse
                          • 45.147.195.16
                          7p6TMfaWhQ.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                          • 45.142.44.233
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):5.620781820179294
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
                          File size:48'640 bytes
                          MD5:01ef0ba434c74e68df6e94737826d22f
                          SHA1:86c934eb90ae6ecc38fd7dd38001552f618d5e5f
                          SHA256:48ee878fefc7d5d9df66fc978dfaafcfb61129acf92b1143e1b865ab292be9f0
                          SHA512:d489c98df8ae90621922cba7d4ff0e3d937382ef60900cd2af7b319e2902048576f8a41c32210ea6b555c0ae753d5f930d234f28827227e2fe1343cc2a46057f
                          SSDEEP:768:xGq+s3pUtDILNCCa+Di+0j1rgLqRp8AofiV8YbOgekOHg3LTvEgK/JLZVc6KN:8q+AGtQO+OOPAbzbxgHcTnkJLZVclN
                          TLSH:5B236D0037D8C136E2FD4BB4A9F2A2458279D6675903CA996CC815EA2B13FC597036FE
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`................................. ........@.. ....................... ............@................................
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x40cbbe
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x60930A0B [Wed May 5 21:11:39 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xcb680x53.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xe0000xdf7.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xabc40xac00ccfb5bc34bf8e2c2f1fb1b8335f8ff03False0.5024073401162791data5.6464763236392IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xe0000xdf70xe002083376922615c09cdda9acfd9305376False0.4017857142857143data5.110607648061562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x100000xc0x20082148d01c3935cf90ef81a3dd1fad607False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0xe0a00x2d4data0.4350828729281768
                          RT_MANIFEST0xe3740xa83XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40245261984392416
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-11-10T11:53:27.865161+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.549707TCP
                          2024-11-10T11:54:06.445320+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.549862TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 10, 2024 11:53:12.031997919 CET4970435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:12.036824942 CET356504970445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:12.036917925 CET4970435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:12.057600021 CET4970435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:12.062524080 CET356504970445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:12.656487942 CET356504970445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:12.656637907 CET4970435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:17.752285957 CET4970435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:17.753823996 CET4970535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:17.911768913 CET356504970445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:17.911792040 CET356504970545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:17.911922932 CET4970535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:17.912415028 CET4970535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:17.918600082 CET356504970545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:18.526166916 CET356504970545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:18.526287079 CET4970535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:23.530694008 CET4970535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:23.531831980 CET4970635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:23.535490036 CET356504970545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:23.536561012 CET356504970645.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:23.536638021 CET4970635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:23.536927938 CET4970635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:23.541680098 CET356504970645.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:24.163470984 CET356504970645.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:24.163547993 CET4970635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:29.171411037 CET4970635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:29.172456026 CET4971435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:29.176176071 CET356504970645.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:29.177290916 CET356504971445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:29.177367926 CET4971435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:29.177675009 CET4971435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:29.182389021 CET356504971445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:29.795591116 CET356504971445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:29.795665979 CET4971435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:34.796605110 CET4971435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:34.797620058 CET4974535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:34.801445007 CET356504971445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:34.802402973 CET356504974545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:34.802491903 CET4974535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:34.802819967 CET4974535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:34.807816982 CET356504974545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:35.423825979 CET356504974545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:35.423886061 CET4974535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:40.436989069 CET4974535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:40.437971115 CET4977735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:40.442044020 CET356504974545.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:40.443003893 CET356504977745.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:40.443072081 CET4977735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:40.443293095 CET4977735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:40.448093891 CET356504977745.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:41.053394079 CET356504977745.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:41.053492069 CET4977735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:46.062001944 CET4977735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:46.062768936 CET4985435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:46.066926003 CET356504977745.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:46.067584991 CET356504985445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:46.067646027 CET4985435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:46.067832947 CET4985435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:46.072566032 CET356504985445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:46.072979927 CET356504985445.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:51.078989029 CET4985935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:51.083878040 CET356504985945.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:51.083991051 CET4985935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:51.084250927 CET4985935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:51.089051008 CET356504985945.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:51.702980042 CET356504985945.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:51.703077078 CET4985935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:56.719588041 CET4985935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:56.720385075 CET4986035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:56.724389076 CET356504985945.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:56.725222111 CET356504986045.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:56.725282907 CET4986035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:56.725562096 CET4986035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:56.730108023 CET356504986045.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:56.730173111 CET4986035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:53:56.730331898 CET356504986045.135.232.38192.168.2.5
                          Nov 10, 2024 11:53:56.734927893 CET356504986045.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:01.734946012 CET4986135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:01.739713907 CET356504986145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:01.739805937 CET4986135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:01.740067959 CET4986135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:01.744833946 CET356504986145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:02.352153063 CET356504986145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:02.352227926 CET4986135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:07.358957052 CET4986135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:07.359776020 CET4986335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:07.363940954 CET356504986145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:07.364785910 CET356504986345.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:07.364871025 CET4986335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:07.365176916 CET4986335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:07.370059967 CET356504986345.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:07.978771925 CET356504986345.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:07.978846073 CET4986335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:12.983974934 CET4986335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:12.988816023 CET356504986345.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:13.102504015 CET4986435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:13.107431889 CET356504986445.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:13.107501030 CET4986435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:13.107774973 CET4986435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:13.112519026 CET356504986445.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:13.721029043 CET356504986445.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:13.721120119 CET4986435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:18.734035969 CET4986435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:18.735045910 CET4986535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:18.739237070 CET356504986445.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:18.739875078 CET356504986545.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:18.739959002 CET4986535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:18.740231991 CET4986535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:18.745012045 CET356504986545.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:18.745064974 CET4986535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:18.745119095 CET356504986545.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:18.750684977 CET356504986545.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:23.752490997 CET4986635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:23.757515907 CET356504986645.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:23.757582903 CET4986635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:23.757913113 CET4986635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:23.762682915 CET356504986645.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:24.393441916 CET356504986645.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:24.393517971 CET4986635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:29.405945063 CET4986635650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:29.406838894 CET4986735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:29.410797119 CET356504986645.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:29.411616087 CET356504986745.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:29.411696911 CET4986735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:29.412101984 CET4986735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:29.416815996 CET356504986745.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:29.416825056 CET356504986745.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:29.416877031 CET4986735650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:29.421632051 CET356504986745.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:34.427782059 CET4986835650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:34.433037043 CET356504986845.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:34.433115959 CET4986835650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:34.433451891 CET4986835650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:34.438762903 CET356504986845.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:34.438796997 CET356504986845.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:34.438833952 CET4986835650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:34.443775892 CET356504986845.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:39.454268932 CET4986935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:39.459081888 CET356504986945.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:39.459172010 CET4986935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:39.459512949 CET4986935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:39.464246035 CET356504986945.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:40.099806070 CET356504986945.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:40.099898100 CET4986935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:45.109091043 CET4986935650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:45.109878063 CET4987035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:45.113954067 CET356504986945.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:45.114650011 CET356504987045.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:45.114717007 CET4987035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:45.115113974 CET4987035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:45.119771004 CET356504987045.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:45.119843960 CET4987035650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:45.119857073 CET356504987045.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:45.124594927 CET356504987045.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:50.125715017 CET4987135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:50.130546093 CET356504987145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:50.130629063 CET4987135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:50.130893946 CET4987135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:50.135632992 CET356504987145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:50.746371984 CET356504987145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:50.746444941 CET4987135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:55.749741077 CET4987135650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:55.750850916 CET4987235650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:55.754547119 CET356504987145.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:55.755662918 CET356504987245.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:55.755747080 CET4987235650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:55.756056070 CET4987235650192.168.2.545.135.232.38
                          Nov 10, 2024 11:54:55.760971069 CET356504987245.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:56.367728949 CET356504987245.135.232.38192.168.2.5
                          Nov 10, 2024 11:54:56.367834091 CET4987235650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:01.381477118 CET4987235650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:01.385504007 CET4987335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:01.386384964 CET356504987245.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:01.390316010 CET356504987345.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:01.390391111 CET4987335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:01.390707016 CET4987335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:01.395308971 CET356504987345.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:01.395364046 CET4987335650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:01.395446062 CET356504987345.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:01.400125027 CET356504987345.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:06.463587999 CET4987435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:06.468508959 CET356504987445.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:06.468621969 CET4987435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:06.473761082 CET356504987445.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:06.473834991 CET4987435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:06.488254070 CET4987435650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:06.493046045 CET356504987445.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:11.500880957 CET4987535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:11.505697012 CET356504987545.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:11.505783081 CET4987535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:11.506089926 CET4987535650192.168.2.545.135.232.38
                          Nov 10, 2024 11:55:11.510858059 CET356504987545.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:12.125915051 CET356504987545.135.232.38192.168.2.5
                          Nov 10, 2024 11:55:12.125976086 CET4987535650192.168.2.545.135.232.38
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 10, 2024 11:53:11.050909042 CET5595353192.168.2.51.1.1.1
                          Nov 10, 2024 11:53:12.024605989 CET53559531.1.1.1192.168.2.5
                          Nov 10, 2024 11:54:12.984689951 CET5012053192.168.2.51.1.1.1
                          Nov 10, 2024 11:54:13.101888895 CET53501201.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Nov 10, 2024 11:53:11.050909042 CET192.168.2.51.1.1.10x231cStandard query (0)dckast.duckdns.orgA (IP address)IN (0x0001)false
                          Nov 10, 2024 11:54:12.984689951 CET192.168.2.51.1.1.10x5dcaStandard query (0)dckast.duckdns.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Nov 10, 2024 11:53:12.024605989 CET1.1.1.1192.168.2.50x231cNo error (0)dckast.duckdns.org45.135.232.38A (IP address)IN (0x0001)false
                          Nov 10, 2024 11:54:13.101888895 CET1.1.1.1192.168.2.50x5dcaNo error (0)dckast.duckdns.org45.135.232.38A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:05:53:07
                          Start date:10/11/2024
                          Path:C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e138d6557.dat-decoded.exe"
                          Imagebase:0xa80000
                          File size:48'640 bytes
                          MD5 hash:01EF0BA434C74E68DF6E94737826D22F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000000.2024775474.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3264671730.0000000000F74000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.3265097856.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:27.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:6
                            Total number of Limit Nodes:0
                            execution_graph 1863 7ff848da29e1 1864 7ff848da29eb LoadLibraryA 1863->1864 1866 7ff848da2ad2 1864->1866 1867 7ff848da2d3d 1868 7ff848da2d4b VirtualProtect 1867->1868 1870 7ff848da2e2b 1868->1870

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 191 7ff848da308d-7ff848da30b9 192 7ff848da3104-7ff848da3114 191->192 193 7ff848da30bc-7ff848da30df 191->193 197 7ff848da311e-7ff848da3142 192->197 196 7ff848da30e1-7ff848da30e3 193->196 196->192 200 7ff848da3381-7ff848da33c2 call 7ff848da1998 197->200 201 7ff848da3148-7ff848da31ed 197->201 209 7ff848da33c4-7ff848da33d5 200->209 210 7ff848da33d7-7ff848da33e0 200->210 229 7ff848da32b3 201->229 230 7ff848da31f3-7ff848da32a0 201->230 212 7ff848da33e8-7ff848da3404 209->212 210->212 219 7ff848da3406-7ff848da3417 212->219 220 7ff848da3419-7ff848da341e 212->220 223 7ff848da3425-7ff848da348b call 7ff848da19a8 call 7ff848da19b8 219->223 220->223 245 7ff848da3491-7ff848da34dd 223->245 246 7ff848da3512 223->246 234 7ff848da32b8-7ff848da32df 229->234 230->229 271 7ff848da32a2-7ff848da32ad 230->271 252 7ff848da32e1-7ff848da32ef 234->252 245->246 270 7ff848da34df-7ff848da350b 245->270 249 7ff848da3517-7ff848da353f 246->249 276 7ff848da3541-7ff848da3558 call 7ff848da38d5 249->276 258 7ff848da32f1-7ff848da32f2 252->258 259 7ff848da3365-7ff848da337c 252->259 263 7ff848da32fa-7ff848da330b 258->263 267 7ff848da3559-7ff848da356a 259->267 266 7ff848da3311-7ff848da332c 263->266 263->267 273 7ff848da3334-7ff848da3345 266->273 278 7ff848da3891 267->278 279 7ff848da3570-7ff848da365e call 7ff848da19c8 call 7ff848da19d8 267->279 270->249 281 7ff848da350d-7ff848da3510 270->281 271->234 275 7ff848da32af-7ff848da32b1 271->275 286 7ff848da3347 273->286 287 7ff848da334c-7ff848da335e 273->287 275->252 276->267 282 7ff848da3898-7ff848da38a4 278->282 279->229 305 7ff848da3664-7ff848da367e 279->305 281->276 286->267 287->266 289 7ff848da3360 287->289 289->267 306 7ff848da3684-7ff848da37a6 call 7ff848da1988 call 7ff848da0628 call 7ff848da2418 305->306 328 7ff848da37ad-7ff848da37b8 306->328 330 7ff848da37a7 328->330 331 7ff848da37ba-7ff848da388f call 7ff848da2418 328->331 330->328 331->282
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3267024568.00007FF848DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848da0000_17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e1.jbxd
                            Similarity
                            • API ID:
                            • String ID: ,
                            • API String ID: 0-3772416878
                            • Opcode ID: 5a76795d3849e5ecb6c8b98e285c2283883591695e4212a49c57206b3da64349
                            • Instruction ID: 9b54812081e6af7abe1d4fd80b1acaa8a4f1568d24b4cc364cfbac3e810a4d63
                            • Opcode Fuzzy Hash: 5a76795d3849e5ecb6c8b98e285c2283883591695e4212a49c57206b3da64349
                            • Instruction Fuzzy Hash: 91320030A1DA4A8FEB98FB2C94557B973E2FF98390F640579D04EC36C6CF28A8458745

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 490 7ff848da29e1-7ff848da2ad0 LoadLibraryA 496 7ff848da2ad2 490->496 497 7ff848da2ad8-7ff848da2b31 call 7ff848da2b32 490->497 496->497
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3267024568.00007FF848DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848da0000_17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e1.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: a1b7cc905a5fcc3a5f3b139e20890a644ef985ff48f5fe010b562b25b584bd19
                            • Instruction ID: df6da54957d5c1162b61458d55bd8b373dd5156df6ac5f670dfff6e5c50c27e3
                            • Opcode Fuzzy Hash: a1b7cc905a5fcc3a5f3b139e20890a644ef985ff48f5fe010b562b25b584bd19
                            • Instruction Fuzzy Hash: F7415D30909A5C8FDB98EF58D845BE9BBF1FF99310F10416AD00DD7296CB75A845CB81

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 503 7ff848da2d3d-7ff848da2d49 504 7ff848da2d54-7ff848da2d63 503->504 505 7ff848da2d4b-7ff848da2d53 503->505 506 7ff848da2d65-7ff848da2d6d 504->506 507 7ff848da2d6e-7ff848da2e29 VirtualProtect 504->507 505->504 506->507 512 7ff848da2e31-7ff848da2e59 507->512 513 7ff848da2e2b 507->513 513->512
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3267024568.00007FF848DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848DA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff848da0000_17312358643e2349e1394349def751b6d9e1f5f7d806ef332905ce99f25fe32ff480e1.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: b8b5c99e3bbc11e9a18f4cf2d96f226829b4af824605e787d39cb17d573e19ce
                            • Instruction ID: 42223e337b7179f2b1f9390d274837e170a8829360b1286bf3d9f138fb584752
                            • Opcode Fuzzy Hash: b8b5c99e3bbc11e9a18f4cf2d96f226829b4af824605e787d39cb17d573e19ce
                            • Instruction Fuzzy Hash: BF41063190D7885FDB199B6898466A97FE0EF96321F1442AFD089C3193CB746806C796