Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA CONTAINER LINE Oct 24.exe

Overview

General Information

Sample name:SOA CONTAINER LINE Oct 24.exe
Analysis ID:1557907
MD5:022751194e17f47b1651de3600f08dc1
SHA1:c6c5b6f8dfc9163a51cd983662a2afdbbce69eb3
SHA256:cde7e6227b12f407f02e9dfcd2025e6716248f5c8ffc93dd8c00cc8e14ee63ed
Tags:exeuser-abuse_ch
Infos:

Detection

Snake Keylogger
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SOA CONTAINER LINE Oct 24.exe (PID: 5368 cmdline: "C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe" MD5: 022751194E17F47B1651DE3600F08DC1)
    • SOA CONTAINER LINE Oct 24.exe (PID: 356 cmdline: "C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe" MD5: 022751194E17F47B1651DE3600F08DC1)
      • WerFault.exe (PID: 6288 cmdline: C:\Windows\system32\WerFault.exe -u -p 356 -s 12 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838", "Token": "7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI", "Chat_id": "1443320838", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x154fc:$a1: get_encryptedPassword
      • 0x35f3c:$a1: get_encryptedPassword
      • 0x157e8:$a2: get_encryptedUsername
      • 0x36228:$a2: get_encryptedUsername
      • 0x15308:$a3: get_timePasswordChanged
      • 0x35d48:$a3: get_timePasswordChanged
      • 0x15403:$a4: get_passwordField
      • 0x35e43:$a4: get_passwordField
      • 0x15512:$a5: set_encryptedPassword
      • 0x35f52:$a5: set_encryptedPassword
      • 0x16bad:$a7: get_logins
      • 0x375ed:$a7: get_logins
      • 0x16b10:$a10: KeyLoggerEventArgs
      • 0x37550:$a10: KeyLoggerEventArgs
      • 0x1677b:$a11: KeyLoggerEventArgsEventHandler
      • 0x371bb:$a11: KeyLoggerEventArgsEventHandler
      00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x1a4c0:$x1: $%SMTPDV$
      • 0x3af00:$x1: $%SMTPDV$
      • 0x18ea4:$x2: $#TheHashHere%&
      • 0x398e4:$x2: $#TheHashHere%&
      • 0x1a468:$x3: %FTPDV$
      • 0x3aea8:$x3: %FTPDV$
      • 0x18e44:$x4: $%TelegramDv$
      • 0x39884:$x4: $%TelegramDv$
      • 0x1677b:$x5: KeyLoggerEventArgs
      • 0x16b10:$x5: KeyLoggerEventArgs
      • 0x371bb:$x5: KeyLoggerEventArgs
      • 0x37550:$x5: KeyLoggerEventArgs
      • 0x1a48c:$m2: Clipboard Logs ID
      • 0x1a6ca:$m2: Screenshot Logs ID
      • 0x1a7da:$m2: keystroke Logs ID
      • 0x3aecc:$m2: Clipboard Logs ID
      • 0x3b10a:$m2: Screenshot Logs ID
      • 0x3b21a:$m2: keystroke Logs ID
      • 0x1aab4:$m3: SnakePW
      • 0x3b4f4:$m3: SnakePW
      • 0x1a6a2:$m4: \SnakeKeylogger\
      Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12c84:$a1: get_encryptedPassword
            • 0x12f70:$a2: get_encryptedUsername
            • 0x12a90:$a3: get_timePasswordChanged
            • 0x12b8b:$a4: get_passwordField
            • 0x12c9a:$a5: set_encryptedPassword
            • 0x14335:$a7: get_logins
            • 0x14298:$a10: KeyLoggerEventArgs
            • 0x13f03:$a11: KeyLoggerEventArgsEventHandler
            0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a5fe:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x19830:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19c63:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1aca2:$a5: \Kometa\User Data\Default\Login Data
            0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x1386f:$s1: UnHook
            • 0x13876:$s2: SetHook
            • 0x1387e:$s3: CallNextHook
            • 0x1388b:$s4: _hook
            Click to see the 21 entries
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI/sendMessage?chat_id=1443320838", "Token": "7399492470:AAF1Q52TLq6uEICFiCVrLu9dpROnjh2wukI", "Chat_id": "1443320838", "Version": "5.1"}
            Source: SOA CONTAINER LINE Oct 24.exeReversingLabs: Detection: 21%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: SOA CONTAINER LINE Oct 24.exeJoe Sandbox ML: detected
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPE
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: SOA CONTAINER LINE Oct 24.exeString found in binary or memory: https://www.google.com/#q=

            System Summary

            barindex
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343ED4950_2_00007FFD343ED495
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343E151B0_2_00007FFD343E151B
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343ED0B00_2_00007FFD343ED0B0
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343E29260_2_00007FFD343E2926
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343E3BD90_2_00007FFD343E3BD9
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343ED0B00_2_00007FFD343ED0B0
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 356 -s 12
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: No import functions for PE file found
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2218067672.0000000003EE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameReactionDiffusion.dll0 vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2219079433.0000000015889000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGreenEnergy.dll@ vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2218067672.0000000003E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameReactionDiffusion.dll0 vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2218067672.0000000004267000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2228272720.000000001F990000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGreenEnergy.dll@ vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2224515206.000000001C9A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameReactionDiffusion.dll0 vs SOA CONTAINER LINE Oct 24.exe
            Source: SOA CONTAINER LINE Oct 24.exeBinary or memory string: OriginalFilenameFLAO.exe8 vs SOA CONTAINER LINE Oct 24.exe
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, 2-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, 2-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, 2-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, 2-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
            Source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, ---.csBase64 encoded string: 'tPa5k5FJD4dSXw0EqQ2lIcLtrXnSHhm60gt1D+3WpsNqPxTv3g1y5+EIwUawZGy8'
            Source: classification engineClassification label: mal88.troj.evad.winEXE@4/1@0/0
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SOA CONTAINER LINE Oct 24.exe.logJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeMutant created: NULL
            Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess356
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeMutant created: \Sessions\1\BaseNamedObjects\rjhVamkNEUpemgxprqSxOlIwx
            Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\805da2ed-c4ed-459c-a779-1d3811ff6323Jump to behavior
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SOA CONTAINER LINE Oct 24.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SOA CONTAINER LINE Oct 24.exeReversingLabs: Detection: 21%
            Source: unknownProcess created: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe "C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess created: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe "C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 356 -s 12
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess created: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe "C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: msdmo.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41B89B6B-9399-11D2-9623-00C04F8EE628}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeCode function: 0_2_00007FFD343E00BD pushad ; iretd 0_2_00007FFD343E00C1
            Source: SOA CONTAINER LINE Oct 24.exeStatic PE information: section name: .text entropy: 7.918358277292282
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeMemory allocated: 12F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeMemory allocated: 1BE60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe TID: 3704Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2228272720.000000001F990000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: ENC7I0UVSDQuQZj7JDeJZPZjALyKCjWdNpvPcaFZ8UqhUPTNY8Rlh0w1OxT49Ult8UmiKGRWsDWiD1iEUBcuX0hPLUwZJBpOIaJlUitwL4fKldAxxgGJSUL6mEvxH1UserControlSystem.Windows.FormshsCVCwb2UA9l8mUSNQUITypeEditorSystem.Drawing.DesignSystem.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.ComponentModelTHjWsNJirNDWByatV5sLOq2du5sZl4uqUUd0VSU9RIv7SWmMhQR6gjEBCaJtfeTEbnbTw3q4<Module>{4489A06A-3CC7-431E-8D99-43F5F3BF98FC}CrreGowaUy2O6TZXGIQuT04yhrKHfTuioi1xMulticastDelegateimniDy3ADXj6Um6rQi<PrivateImplementationDetails>{3737F7A5-4CFF-4A83-A41C-022A0DB5878F}__StaticArrayInitTypeSize=256__StaticArrayInitTypeSize=40__StaticArrayInitTypeSize=30__StaticArrayInitTypeSize=32__StaticArrayInitTypeSize=16__StaticArrayInitTypeSize=64__StaticArrayInitTypeSize=18
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeThread register set: target process: 356Jump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeProcess created: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe "C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeQueries volume information: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Speech\v4.0_4.0.0.0__31bf3856ad364e35\System.Speech.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e924b8.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SOA CONTAINER LINE Oct 24.exe.13e71a78.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SOA CONTAINER LINE Oct 24.exe PID: 5368, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
            Virtualization/Sandbox Evasion
            Security Account Manager41
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS12
            System Information Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
            Obfuscated Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SOA CONTAINER LINE Oct 24.exe22%ReversingLabsWin32.Trojan.Generic
            SOA CONTAINER LINE Oct 24.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://checkip.dyndns.org/qSOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://www.google.com/#q=SOA CONTAINER LINE Oct 24.exefalse
                high
                https://reallyfreegeoip.org/xml/SOA CONTAINER LINE Oct 24.exe, 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1557907
                  Start date and time:2024-11-18 18:17:06 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 32s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:SOA CONTAINER LINE Oct 24.exe
                  Detection:MAL
                  Classification:mal88.troj.evad.winEXE@4/1@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 54%
                  • Number of executed functions: 6
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • VT rate limit hit for: SOA CONTAINER LINE Oct 24.exe
                  TimeTypeDescription
                  12:18:03API Interceptor2x Sleep call for process: SOA CONTAINER LINE Oct 24.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1598
                  Entropy (8bit):5.38398350549571
                  Encrypted:false
                  SSDEEP:48:MxHKQ71qHGIs0HKjRHmYHKGSI6oPtHTHhAHKKkl+vxp3/elT:iq+wmj0qFGYqGSI6oPtzHeqKksZp/elT
                  MD5:AF16B658F6C24EDB649D384BDE4C754C
                  SHA1:884A3A8612E63757536133D992E56D2950D33F2C
                  SHA-256:E89BF2F4F6D77FE14251084F4121B79E34820321B5471E0649240CE6D598B832
                  SHA-512:D88025C14ACE963411612F4456E1001D5947CD84927D6E906DAB56806D20AD3F176122B7E9F32C77846EA3B238642D892C5F8D722204AF3C387598EBDF9737FD
                  Malicious:true
                  Reputation:low
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Speech, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neu
                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.912335817097297
                  TrID:
                  • Win64 Executable GUI Net Framework (217006/5) 49.88%
                  • Win64 Executable GUI (202006/5) 46.43%
                  • Win64 Executable (generic) (12005/4) 2.76%
                  • Generic Win/DOS Executable (2004/3) 0.46%
                  • DOS Executable Generic (2002/1) 0.46%
                  File name:SOA CONTAINER LINE Oct 24.exe
                  File size:702'976 bytes
                  MD5:022751194e17f47b1651de3600f08dc1
                  SHA1:c6c5b6f8dfc9163a51cd983662a2afdbbce69eb3
                  SHA256:cde7e6227b12f407f02e9dfcd2025e6716248f5c8ffc93dd8c00cc8e14ee63ed
                  SHA512:c4da34b69757201fc2567dacdfef26219839f9bef36d6b16c808077b0a4f9f01fb6cd498222f5704bea48aff3a0cc8e57ba3028717783211a223f091c391f854
                  SSDEEP:12288:KbQ0AlSGvCpQTXKGHILLMh9xm6wk6qHV4p4nxupPXYU8TQqUq4EsKSsm9:6oBxXKGWMVm6h6wGp4noNFqhAs+
                  TLSH:56E412B917651726CABFAEF3263633D84375DB8768A1DB5D0AC490EC6783B4145133C2
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....;g.........."...0.................. .....@..... ....................................@...@......@............... .....
                  Icon Hash:0595150b64f0390f
                  Entrypoint:0x140000000
                  Entrypoint Section:
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x673B1007 [Mon Nov 18 09:59:35 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:
                  Instruction
                  dec ebp
                  pop edx
                  nop
                  add byte ptr [ebx], al
                  add byte ptr [eax], al
                  add byte ptr [eax+eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x1ab8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xa9b540xa9c002fe7ea2fe319d83db725c7403ed91242False0.9177760263254786data7.918358277292282IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xac0000x1ab80x1c00a64707944b78b75c63b79bbe79e7a9aaFalse0.8045479910714286data7.217970328166368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xac1000x1439PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9592428047131544
                  RT_GROUP_ICON0xad54c0x14data1.05
                  RT_VERSION0xad5700x348data0.43214285714285716
                  RT_MANIFEST0xad8c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:12:18:02
                  Start date:18/11/2024
                  Path:C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"
                  Imagebase:0xa20000
                  File size:702'976 bytes
                  MD5 hash:022751194E17F47B1651DE3600F08DC1
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2219079433.0000000013E71000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:4
                  Start time:12:18:04
                  Start date:18/11/2024
                  Path:C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"
                  Imagebase:0x9f0000
                  File size:702'976 bytes
                  MD5 hash:022751194E17F47B1651DE3600F08DC1
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Target ID:7
                  Start time:12:18:05
                  Start date:18/11/2024
                  Path:C:\Windows\System32\WerFault.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\WerFault.exe -u -p 356 -s 12
                  Imagebase:0x7ff7f5a20000
                  File size:570'736 bytes
                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:10.7%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:23.1%
                    Total number of Nodes:13
                    Total number of Limit Nodes:1
                    execution_graph 6560 7ffd343fd48c 6561 7ffd343fd4e0 CreateProcessA 6560->6561 6563 7ffd343fd7d1 6561->6563 6572 7ffd343ed529 6573 7ffd343ed55a 6572->6573 6574 7ffd343fd48c CreateProcessA 6573->6574 6575 7ffd343ed7a2 6573->6575 6574->6573 6564 7ffd343ed495 6565 7ffd343ed49f 6564->6565 6567 7ffd343ed4db 6565->6567 6568 7ffd343fd48c 6565->6568 6569 7ffd343fd4e0 CreateProcessA 6568->6569 6571 7ffd343fd7d1 6569->6571 6571->6565

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 7ffd343e3bd9-7ffd343e3bfb call 7ffd343e0518 call 7ffd343e0508 5 7ffd343e3cbb-7ffd343e3ce2 0->5 6 7ffd343e3c01-7ffd343e3c02 0->6 16 7ffd343e3cf6-7ffd343e3d40 5->16 17 7ffd343e3ce4-7ffd343e3cf5 5->17 7 7ffd343e3c06-7ffd343e3c10 6->7 9 7ffd343e3c16-7ffd343e3c2e 7->9 10 7ffd343e4197-7ffd343e41da 7->10 9->10 11 7ffd343e3c34-7ffd343e3c3f 9->11 11->10 14 7ffd343e3c45-7ffd343e3c5b 11->14 14->10 15 7ffd343e3c61-7ffd343e3c67 14->15 15->10 18 7ffd343e3c6d-7ffd343e3c7b 15->18 27 7ffd343e3d42-7ffd343e3d5d 16->27 28 7ffd343e3d5f-7ffd343e3d6d 16->28 17->16 18->10 21 7ffd343e3c81-7ffd343e3c8c 18->21 21->10 22 7ffd343e3c92-7ffd343e3ca2 21->22 22->10 24 7ffd343e3ca8-7ffd343e3cb5 22->24 24->5 24->7 27->28 28->10 31 7ffd343e3d73-7ffd343e3d89 28->31 31->10 33 7ffd343e3d8f-7ffd343e3e32 31->33 42 7ffd343e3e38-7ffd343e3e61 33->42 44 7ffd343e3e63-7ffd343e3e76 42->44 45 7ffd343e3e7d-7ffd343e3f1d call 7ffd343e23e0 call 7ffd343e1ad0 call 7ffd343e1af0 call 7ffd343e1b00 call 7ffd343e23f0 call 7ffd343e2400 42->45 44->45 59 7ffd343e3f2f-7ffd343e3f34 45->59 60 7ffd343e3f1f-7ffd343e3f26 45->60 61 7ffd343e3f36 59->61 62 7ffd343e3f47-7ffd343e3fb1 call 7ffd343e2420 call 7ffd343e2430 call 7ffd343e1ac0 * 2 59->62 63 7ffd343e3f38 60->63 64 7ffd343e3f28-7ffd343e3f2e 60->64 61->63 66 7ffd343e3fb4-7ffd343e3fbf 62->66 65 7ffd343e3f3a-7ffd343e3f45 call 7ffd343e2410 63->65 63->66 64->59 65->62 70 7ffd343e3fc9-7ffd343e3fd2 66->70 72 7ffd343e3fd4-7ffd343e3fe7 70->72 73 7ffd343e3fee-7ffd343e4005 call 7ffd343e2440 70->73 72->73 80 7ffd343e4007-7ffd343e400a 73->80 81 7ffd343e405e-7ffd343e4063 73->81 84 7ffd343e400c-7ffd343e4038 80->84 85 7ffd343e408b-7ffd343e4092 call 7ffd343e1af0 80->85 82 7ffd343e4064 81->82 83 7ffd343e40df-7ffd343e40e4 81->83 87 7ffd343e40e5-7ffd343e40ee 82->87 88 7ffd343e4065 82->88 83->87 101 7ffd343e403a-7ffd343e4041 84->101 102 7ffd343e40a9 84->102 99 7ffd343e4099-7ffd343e40a8 85->99 108 7ffd343e40f0-7ffd343e4196 call 7ffd343e2450 call 7ffd343e2460 call 7ffd343e2450 call 7ffd343e2460 call 7ffd343e2450 call 7ffd343e2460 87->108 92 7ffd343e40ab-7ffd343e40b3 88->92 93 7ffd343e4066-7ffd343e408a call 7ffd343e1ae0 88->93 92->99 106 7ffd343e40b5-7ffd343e40bb 92->106 93->85 99->102 103 7ffd343e4043 101->103 104 7ffd343e40bd-7ffd343e40c7 101->104 102->92 103->70 109 7ffd343e4045-7ffd343e405a 103->109 113 7ffd343e40cb-7ffd343e40d6 104->113 106->104 112 7ffd343e405c 109->112 109->113 112->81 113->108 117 7ffd343e40d8-7ffd343e40dc 113->117 117->83
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2229005555.00007FFD343E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd343e0000_SOA CONTAINER LINE Oct 24.jbxd
                    Similarity
                    • API ID:
                    • String ID: `^-4${ N_^
                    • API String ID: 0-3902655902
                    • Opcode ID: 43e29cd3bbdf88126a500e010e9e36d993682b3a24b0887ce08088e861ba9d6f
                    • Instruction ID: 44f3ccd63a456b6e788385864d68079c6db03e608817ed5961af440aae39dadb
                    • Opcode Fuzzy Hash: 43e29cd3bbdf88126a500e010e9e36d993682b3a24b0887ce08088e861ba9d6f
                    • Instruction Fuzzy Hash: D512153170DB494FE759FB2884A567A77D1EF9A300F1805BED18EC7293DD39A8828741

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 132 7ffd343ed495-7ffd343ed4d9 138 7ffd343ed4db-7ffd343f5661 132->138 139 7ffd343ed54a-7ffd343ed553 132->139 142 7ffd343f5668-7ffd343f567c 138->142 143 7ffd343f5663 138->143 141 7ffd343ed55a-7ffd343ed55e 139->141 144 7ffd343ed57b-7ffd343ed582 call 7ffd343eced0 141->144 145 7ffd343ed560-7ffd343ed577 141->145 143->142 148 7ffd343ed594-7ffd343ed59d 144->148 149 7ffd343ed584-7ffd343ed58b 144->149 145->144 151 7ffd343ed59e-7ffd343ed5a8 148->151 150 7ffd343ed58d-7ffd343ed592 149->150 149->151 150->148 152 7ffd343ed5ba 151->152 153 7ffd343ed5aa-7ffd343ed5b1 151->153 156 7ffd343ed5cc-7ffd343ed5d5 call 7ffd343fd48c 152->156 157 7ffd343ed5bc-7ffd343ed5c3 152->157 154 7ffd343ed5b3-7ffd343ed5b8 153->154 155 7ffd343ed5c4-7ffd343ed5cb 153->155 154->152 155->156 158 7ffd343ed5d6-7ffd343ed5d7 156->158 157->155 157->158 161 7ffd343ed5d8-7ffd343ed5e8 158->161 162 7ffd343ed7a2-7ffd343ed828 158->162 161->141 165 7ffd343ed82a-7ffd343ed82c 162->165 166 7ffd343ed83e-7ffd343ed85f 162->166 167 7ffd343ed8a8-7ffd343ed8aa 165->167 168 7ffd343ed82e-7ffd343ed836 165->168 173 7ffd343ed861 166->173 174 7ffd343ed862-7ffd343ed878 166->174 169 7ffd343ed8ad-7ffd343ed8ba 167->169 168->166 171 7ffd343ed8cc-7ffd343ed8d2 169->171 172 7ffd343ed8bc-7ffd343ed8c3 169->172 177 7ffd343ed8e5-7ffd343ed8e6 171->177 178 7ffd343ed8d4-7ffd343ed8d5 171->178 175 7ffd343ed8c5-7ffd343ed8c8 172->175 176 7ffd343ed8d6-7ffd343ed8d7 172->176 173->174 174->169 186 7ffd343ed87a-7ffd343ed8a7 174->186 180 7ffd343ed8ca 175->180 181 7ffd343ed945-7ffd343ed951 175->181 182 7ffd343ed8d8 176->182 183 7ffd343ed954-7ffd343ed95a 176->183 184 7ffd343ed8e7 177->184 185 7ffd343ed963-7ffd343ed978 177->185 178->176 180->171 181->183 187 7ffd343ed8d9-7ffd343ed8e1 182->187 188 7ffd343ed8ea-7ffd343ed8f0 182->188 183->185 189 7ffd343ed8f9-7ffd343ed8ff 184->189 190 7ffd343ed8e8-7ffd343ed8e9 184->190 199 7ffd343ed9da 185->199 200 7ffd343ed97a-7ffd343ed986 185->200 186->167 195 7ffd343ed8e3-7ffd343ed8e4 187->195 196 7ffd343ed8f4-7ffd343ed8f6 187->196 197 7ffd343ed903-7ffd343ed906 188->197 198 7ffd343ed8f2-7ffd343ed8f3 188->198 193 7ffd343ed901-7ffd343ed902 189->193 194 7ffd343ed912-7ffd343ed943 189->194 190->188 193->197 194->181 195->177 203 7ffd343ed908-7ffd343ed910 196->203 207 7ffd343ed8f7-7ffd343ed8f8 196->207 197->203 198->196 205 7ffd343ed9db 199->205 208 7ffd343ed988-7ffd343ed98f 200->208 209 7ffd343ed9d4 200->209 203->194 210 7ffd343ed991-7ffd343ed994 205->210 207->189 208->210 214 7ffd343eda3b-7ffd343eda59 209->214 215 7ffd343ed9d6-7ffd343ed9d7 209->215 211 7ffd343ed996-7ffd343ed9aa 210->211 212 7ffd343ed9ae-7ffd343ed9c2 210->212 211->212 212->209 216 7ffd343ed9c4-7ffd343ed9cb 212->216 220 7ffd343eda5b-7ffd343eda78 214->220 215->199 218 7ffd343ed9cd-7ffd343ed9d1 216->218 219 7ffd343ed9de 216->219 218->205 221 7ffd343ed9d3 218->221 219->220 222 7ffd343ed9e0-7ffd343ed9e8 219->222 223 7ffd343eda79-7ffd343eda85 220->223 221->209 224 7ffd343ed9fb-7ffd343ed9fc 222->224 225 7ffd343ed9ea-7ffd343ed9f7 222->225 233 7ffd343eda88-7ffd343eda90 223->233 224->223 227 7ffd343ed9fd 224->227 229 7ffd343ed9f9-7ffd343ed9fa 225->229 230 7ffd343eda0a-7ffd343eda0b 225->230 231 7ffd343eda0f-7ffd343eda14 227->231 232 7ffd343ed9fe-7ffd343eda06 227->232 229->224 230->233 236 7ffd343eda0c 230->236 237 7ffd343eda91-7ffd343edaa4 231->237 238 7ffd343eda15 231->238 234 7ffd343eda19 232->234 235 7ffd343eda08-7ffd343eda09 232->235 233->237 240 7ffd343eda1e 234->240 235->230 239 7ffd343eda0d-7ffd343eda0e 236->239 236->240 241 7ffd343edaa6-7ffd343edaa9 237->241 242 7ffd343eda28-7ffd343eda38 238->242 243 7ffd343eda16-7ffd343eda18 238->243 239->231 240->210 244 7ffd343edaab-7ffd343edabf 241->244 245 7ffd343edac3-7ffd343edacc call 7ffd343ecc98 call 7ffd343ecca8 241->245 242->214 243->234 244->245 250 7ffd343edad1-7ffd343edaf6 245->250 251 7ffd343edaf8 250->251 252 7ffd343edb03-7ffd343edb15 251->252 252->241
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2229005555.00007FFD343E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd343e0000_SOA CONTAINER LINE Oct 24.jbxd
                    Similarity
                    • API ID:
                    • String ID: 2!,4$2!,4
                    • API String ID: 0-193823299
                    • Opcode ID: 97c9d4a51f3da044cdb4f84188502e0e249a983373524229d14ad6031ae4eeda
                    • Instruction ID: 4c6db28a58c252eaa7cf14530f08fb28d3e7df436d3ae038276034ee6f589b49
                    • Opcode Fuzzy Hash: 97c9d4a51f3da044cdb4f84188502e0e249a983373524229d14ad6031ae4eeda
                    • Instruction Fuzzy Hash: 4B02086294E6874FE726A76888612B63FA0EF53314F0C42FBC189CB1D3EA2C544A9751
                    Memory Dump Source
                    • Source File: 00000000.00000002.2229005555.00007FFD343E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd343e0000_SOA CONTAINER LINE Oct 24.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c27590b86e71346d4622feb15c55b78583c9f81cc05fa0048017ec73aa821992
                    • Instruction ID: 8322f583c19075d6d29801db8051c88e56709ffc9398d5f58375daadfd321caf
                    • Opcode Fuzzy Hash: c27590b86e71346d4622feb15c55b78583c9f81cc05fa0048017ec73aa821992
                    • Instruction Fuzzy Hash: C4E2D67160DB458FD795EB28C0A57A677E1FF9A300F1445BDD08EC72A2DE38A886CB41

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2229005555.00007FFD343E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd343e0000_SOA CONTAINER LINE Oct 24.jbxd
                    Similarity
                    • API ID:
                    • String ID: >4
                    • API String ID: 0-3923709113
                    • Opcode ID: 3f3bd343a11938f6de2fefc2b40196871c240efb85446996254bf05e82edf54b
                    • Instruction ID: d5729975f8e8db3c551433f8cf4df4a05e4cd1b91ca3ec596312667194c0b013
                    • Opcode Fuzzy Hash: 3f3bd343a11938f6de2fefc2b40196871c240efb85446996254bf05e82edf54b
                    • Instruction Fuzzy Hash: A6A16823B0EA990FE766B76C9CB61E77FA0EF8332570801BBD189C7183DD1858468391

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 879 7ffd343ed0b0-7ffd343ed112 880 7ffd343ed114-7ffd343ed141 879->880 881 7ffd343ed161-7ffd343ed162 879->881 885 7ffd343ed1b6 880->885 912 7ffd343ed143-7ffd343ed15e 880->912 882 7ffd343ed164-7ffd343ed172 881->882 883 7ffd343ed1b1-7ffd343ed1b5 881->883 891 7ffd343ed174-7ffd343ed1b0 882->891 892 7ffd343ed1c1-7ffd343ed1c9 882->892 884 7ffd343ed1b7-7ffd343ed1b8 883->884 883->885 887 7ffd343ef670-7ffd343ef6f8 884->887 885->884 893 7ffd343ef7d9-7ffd343ef8be 887->893 894 7ffd343ef6fe-7ffd343ef709 887->894 891->883 897 7ffd343ed1cc-7ffd343ed1f6 892->897 898 7ffd343ed219-7ffd343ed220 892->898 924 7ffd343ef8c0-7ffd343ef8c7 call 7ffd343ed1d8 893->924 896 7ffd343ef6a4-7ffd343ef6a7 894->896 904 7ffd343ef6a9-7ffd343ef6bd 896->904 905 7ffd343ef6c1-7ffd343ef6dd 896->905 897->898 901 7ffd343ed295-7ffd343ed2a8 898->901 902 7ffd343ed222-7ffd343ed243 898->902 901->887 902->901 904->905 905->893 917 7ffd343ef6e3-7ffd343ef6eb 905->917 912->881 917->896 928 7ffd343ef8cc-7ffd343ef8de 924->928 930 7ffd343ef8e0-7ffd343ef8ed call 7ffd343ed1f8 928->930 932 7ffd343ef8f2-7ffd343ef910 930->932 935 7ffd343ef948-7ffd343efa3d 932->935 936 7ffd343ef912-7ffd343ef91d 932->936 943 7ffd343efc28-7ffd343efc6d 935->943 944 7ffd343efa43-7ffd343efa53 935->944 937 7ffd343ef866-7ffd343ef86a 936->937 938 7ffd343ef86c-7ffd343ef881 937->938 939 7ffd343ef885-7ffd343ef89f 937->939 938->939 939->937 949 7ffd343efc77-7ffd343efc89 943->949 950 7ffd343efc6f-7ffd343efc76 943->950 945 7ffd343ef9d8-7ffd343ef9dc 944->945 947 7ffd343efa00-7ffd343efa16 945->947 948 7ffd343ef9de-7ffd343ef9f6 945->948 952 7ffd343efa18-7ffd343efa1f 947->952 953 7ffd343efa20-7ffd343efa28 947->953 948->947 955 7ffd343efc8b-7ffd343efc8d 949->955 956 7ffd343efcd6-7ffd343efce6 949->956 950->949 952->953 953->945 957 7ffd343efc8f-7ffd343efccb 955->957 958 7ffd343efc8e 955->958 959 7ffd343efd10-7ffd343efd1e 956->959 957->959 958->957 960 7ffd343efe06-7ffd343efe69 959->960 961 7ffd343efd24-7ffd343efd29 959->961 968 7ffd343efe6b-7ffd343efeaa 960->968 969 7ffd343efeb6-7ffd343efef1 960->969 962 7ffd343efccd-7ffd343efcd0 961->962 964 7ffd343efcea-7ffd343efcf5 962->964 965 7ffd343efcd2-7ffd343efcd5 962->965 970 7ffd343efcf7-7ffd343efd03 964->970 971 7ffd343efd74-7ffd343efd7b 964->971 965->956 972 7ffd343efeac 968->972 973 7ffd343efeb1 968->973 974 7ffd343efef3-7ffd343eff0d 969->974 975 7ffd343eff11-7ffd343f0586 969->975 970->960 976 7ffd343efd09-7ffd343efd0e 970->976 971->962 972->973 973->969 974->975 976->959 976->962
                    Memory Dump Source
                    • Source File: 00000000.00000002.2229005555.00007FFD343E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd343e0000_SOA CONTAINER LINE Oct 24.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21ff14374e5e8de90897e96ccf3c9378be50bbe0e9ff089f461b758bf682963d
                    • Instruction ID: 56a31ba4c62525971a1514a39d08dc75f64eb470b28f0c376b56f13d350f70fe
                    • Opcode Fuzzy Hash: 21ff14374e5e8de90897e96ccf3c9378be50bbe0e9ff089f461b758bf682963d
                    • Instruction Fuzzy Hash: DE12E062A4E3C25FE317A77448A51A63FA0DF53264B1D01FBD4C9CB0E3D96C6886D362

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 254 7ffd343fd48c-7ffd343fd550 258 7ffd343fd552-7ffd343fd561 254->258 259 7ffd343fd5ae-7ffd343fd5e0 254->259 258->259 260 7ffd343fd563-7ffd343fd566 258->260 264 7ffd343fd5e2-7ffd343fd5f1 259->264 265 7ffd343fd63e-7ffd343fd696 259->265 261 7ffd343fd568-7ffd343fd57b 260->261 262 7ffd343fd5a0-7ffd343fd5a8 260->262 266 7ffd343fd57f-7ffd343fd592 261->266 267 7ffd343fd57d 261->267 262->259 264->265 268 7ffd343fd5f3-7ffd343fd5f6 264->268 275 7ffd343fd698-7ffd343fd6a7 265->275 276 7ffd343fd6f4-7ffd343fd71e 265->276 266->266 269 7ffd343fd594-7ffd343fd59c 266->269 267->266 270 7ffd343fd5f8-7ffd343fd60b 268->270 271 7ffd343fd630-7ffd343fd638 268->271 269->262 273 7ffd343fd60f-7ffd343fd622 270->273 274 7ffd343fd60d 270->274 271->265 273->273 277 7ffd343fd624-7ffd343fd62c 273->277 274->273 275->276 278 7ffd343fd6a9-7ffd343fd6ac 275->278 282 7ffd343fd72c-7ffd343fd73b 276->282 283 7ffd343fd720-7ffd343fd728 276->283 277->271 280 7ffd343fd6e6-7ffd343fd6ee 278->280 281 7ffd343fd6ae-7ffd343fd6c1 278->281 280->276 284 7ffd343fd6c5-7ffd343fd6d8 281->284 285 7ffd343fd6c3 281->285 286 7ffd343fd748-7ffd343fd7cf CreateProcessA 282->286 287 7ffd343fd73d-7ffd343fd745 282->287 283->282 284->284 288 7ffd343fd6da-7ffd343fd6e2 284->288 285->284 289 7ffd343fd7d7-7ffd343fd7e6 call 7ffd343fd830 286->289 290 7ffd343fd7d1 286->290 287->286 288->280 292 7ffd343fd7eb-7ffd343fd814 289->292 290->289 294 7ffd343fd81b-7ffd343fd82f 292->294 295 7ffd343fd816 292->295 295->294
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2229005555.00007FFD343E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD343E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ffd343e0000_SOA CONTAINER LINE Oct 24.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: a960b3f4f25502ffbf6a867ce7372876a386602d25adb761838f772cd0f5ba9f
                    • Instruction ID: 0b17625ec0161615fcfdc92129e0d72bc93ed1fba1638af21d988e5fce7bc6d1
                    • Opcode Fuzzy Hash: a960b3f4f25502ffbf6a867ce7372876a386602d25adb761838f772cd0f5ba9f
                    • Instruction Fuzzy Hash: F3C1A431618A8D8FEB64EF28C8597F977D0FF59310F10422EE84EC7291DB74A5458B82