Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
exe004.exe

Overview

General Information

Sample name:exe004.exe
Analysis ID:1560733
MD5:fa90b485a972700b7114ef4b9ce25786
SHA1:00ada95db0395eda9fe76c8481811961817dacc5
SHA256:8b0daaf4ef82710274197ee7df4375cd795d6f73693c36e28b415d84f0410517
Tags:exemalwareuser-Joker
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • exe004.exe (PID: 7844 cmdline: "C:\Users\user\Desktop\exe004.exe" MD5: FA90B485A972700B7114EF4B9CE25786)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
exe004.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.2599210496.0000027C786E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000000.1348039579.0000027C5DC3E000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Process Memory Space: exe004.exe PID: 7844JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              SourceRuleDescriptionAuthorStrings
              0.2.exe004.exe.27c78ab0000.2.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.2.exe004.exe.27c786e0000.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.exe004.exe.27c786e0000.1.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.0.exe004.exe.27c5dbd0000.0.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: exe004.exeAvira: detected
                      Source: exe004.exeReversingLabs: Detection: 42%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: exe004.exeJoe Sandbox ML: detected
                      Source: exe004.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: memory;costura.memory.dll.compressed;costura.memory.pdb.compressedGsystem.diagnostics.diagnosticsourceucostura.system.diagnostics.diagnosticsource.dll.compressed source: exe004.exe
                      Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: exe004.exe
                      Source: Binary string: costura.costura.pdb.compressed source: exe004.exe
                      Source: Binary string: costura.memory.pdb.compressed source: exe004.exe

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.exe004.exe.27c78ab0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: keyauth.win
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaframework.com/api/licensing.php
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/api/licensing.php
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gunaui.com/pricing

                      System Summary

                      barindex
                      Source: exe004.exeStatic PE information: section name: ZqM~o)+
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF80E62 NtQueryInformationProcess,0_2_00007FFE7DF80E62
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF8FF49 NtQueryInformationProcess,0_2_00007FFE7DF8FF49
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF9009D NtQueryInformationProcess,0_2_00007FFE7DF9009D
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF87B1D0_2_00007FFE7DF87B1D
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF905220_2_00007FFE7DF90522
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF905F80_2_00007FFE7DF905F8
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF906240_2_00007FFE7DF90624
                      Source: exe004.exeStatic PE information: No import functions for PE file found
                      Source: exe004.exe, 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGuna.UI2.dllD vs exe004.exe
                      Source: exe004.exeBinary or memory string: OriginalFilenameVelnest.exe0 vs exe004.exe
                      Source: exe004.exeStatic PE information: Section: ZqM~o)+ ZLIB complexity 1.0003260103383458
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/0
                      Source: C:\Users\user\Desktop\exe004.exeMutant created: NULL
                      Source: exe004.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.65%
                      Source: C:\Users\user\Desktop\exe004.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: exe004.exeReversingLabs: Detection: 42%
                      Source: C:\Users\user\Desktop\exe004.exeFile read: C:\Users\user\Desktop\exe004.exeJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: exe004.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: exe004.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: exe004.exeStatic file information: File size 4638752 > 1048576
                      Source: exe004.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x417c00
                      Source: exe004.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: memory;costura.memory.dll.compressed;costura.memory.pdb.compressedGsystem.diagnostics.diagnosticsourceucostura.system.diagnostics.diagnosticsource.dll.compressed source: exe004.exe
                      Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed source: exe004.exe
                      Source: Binary string: costura.costura.pdb.compressed source: exe004.exe
                      Source: Binary string: costura.memory.pdb.compressed source: exe004.exe

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\exe004.exeUnpacked PE file: 0.2.exe004.exe.27c5dbd0000.0.unpack ZqM~o)+:EW;.text:ER;.rsrc:R;.Invalid:EW;Wrong:R;.Xerin:R; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:EW;Unknown_Section4:R;Unknown_Section5:R;
                      Source: Yara matchFile source: exe004.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.exe004.exe.27c786e0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.exe004.exe.27c786e0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.exe004.exe.27c5dbd0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2599210496.0000027C786E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1348039579.0000027C5DC3E000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: exe004.exe PID: 7844, type: MEMORYSTR
                      Source: exe004.exeStatic PE information: 0xE6FDCBF7 [Tue Oct 21 01:55:03 2092 UTC]
                      Source: exe004.exeStatic PE information: section name: ZqM~o)+
                      Source: exe004.exeStatic PE information: section name: .Invalid
                      Source: exe004.exeStatic PE information: section name: Wrong
                      Source: exe004.exeStatic PE information: section name: .Xerin
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_0000027C5DBD6119 push 370E200Ch; retf 0_2_0000027C5DBD6131
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF800BD pushad ; iretd 0_2_00007FFE7DF800C1
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF8A54A push eax; retf 0_2_00007FFE7DF8A54B
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF92DB5 push edi; iretd 0_2_00007FFE7DF92DB6
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF939F6 push ss; ret 0_2_00007FFE7DF939F7
                      Source: exe004.exeStatic PE information: section name: ZqM~o)+ entropy: 7.9994516540380705
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\exe004.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\exe004.exeSection loaded: OutputDebugStringW count: 1929
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: C:\Users\user\Desktop\exe004.exeMemory allocated: 27C5FB30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeMemory allocated: 27C77D50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sysJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0Jump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sysJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeFile opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sysJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeWindow / User API: threadDelayed 1800Jump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeWindow / User API: threadDelayed 6875Jump to behavior
                      Source: C:\Users\user\Desktop\exe004.exe TID: 7956Thread sleep time: -1800000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exe TID: 7956Thread sleep time: -6875000s >= -30000sJump to behavior
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys8
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                      Source: exe004.exe, 00000000.00000002.2598784936.0000027C78534000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
                      Source: exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys
                      Source: C:\Users\user\Desktop\exe004.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Users\user\Desktop\exe004.exeCode function: 0_2_00007FFE7DF91F38 CheckRemoteDebuggerPresent,0_2_00007FFE7DF91F38
                      Source: C:\Users\user\Desktop\exe004.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeQueries volume information: C:\Users\user\Desktop\exe004.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\exe004.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      24
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping321
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Disable or Modify Tools
                      LSASS Memory24
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                      Obfuscated Files or Information
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                      Software Packing
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets12
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      exe004.exe42%ReversingLabsWin64.Trojan.Generic
                      exe004.exe100%AviraTR/Crypt.ZPACK.Gen7
                      exe004.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      keyauth.win
                      104.26.0.5
                      truefalse
                        high
                        s-part-0035.t-0009.t-msedge.net
                        13.107.246.63
                        truefalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://gunaui.com/api/licensing.phpexe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://gunaframework.com/api/licensing.phpexe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://gunaui.com/exe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://gunaui.com/pricingexe004.exe, 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  No contacted IP infos
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1560733
                                  Start date and time:2024-11-22 09:11:14 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 55s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:7
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:exe004.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@1/0@1/0
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • VT rate limit hit for: exe004.exe
                                  TimeTypeDescription
                                  03:12:52API Interceptor143403x Sleep call for process: exe004.exe modified
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  keyauth.winIAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                  • 172.67.72.57
                                  SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.1.5
                                  SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.1.5
                                  SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  s-part-0035.t-0009.t-msedge.netexe001.exeGet hashmaliciousUnknownBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 13.107.246.63
                                  https://ex.securemail.intermedia.net/login.html?msgUserId=3883fff1970b5d7b&enterprise=aurorahealth&rrRegcode=Thzq6kFB&locale=en_USGet hashmaliciousUnknownBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousStealcBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                  • 13.107.246.63
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 13.107.246.63
                                  No context
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.935221947327123
                                  TrID:
                                  • Win64 Executable GUI Net Framework (217006/5) 49.65%
                                  • Win64 Executable GUI (202006/5) 46.21%
                                  • Win64 Executable (generic) (12005/4) 2.75%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.47%
                                  • Generic Win/DOS Executable (2004/3) 0.46%
                                  File name:exe004.exe
                                  File size:4'638'752 bytes
                                  MD5:fa90b485a972700b7114ef4b9ce25786
                                  SHA1:00ada95db0395eda9fe76c8481811961817dacc5
                                  SHA256:8b0daaf4ef82710274197ee7df4375cd795d6f73693c36e28b415d84f0410517
                                  SHA512:60762dc286c5177ddb4bdd142cd1a544d49b6cf6a58ab9d78e16e01deeab7eb9469f24c07b5cf8f7b1a0e5dad432c65304fcb2a658ff7f98a340dcd8bf7b4cc8
                                  SSDEEP:98304:4zvKsxRauKuNKbOG5+1wjbqW+eJhQHMWSi7OE7C8X86r/hoedesaaD:4KsxR8ugbOZ1KPMs7E7iemfsdD
                                  TLSH:7C2633BE35789DF0D28F0FF58822F0652F21C5FA0D29DE982D615AE70E92F529F61610
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..|A..H...........`....@...... .......................`G...........`...@......@............... .....
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x400000
                                  Entrypoint Section:
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0xE6FDCBF7 [Tue Oct 21 01:55:03 2092 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:
                                  Instruction
                                  dec ebp
                                  pop edx
                                  nop
                                  add byte ptr [ebx], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax+eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x46e0000x596.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x560000x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  ZqM~o)+0x20000x5306c0x53200dc19069d1e3fbbfd0b86a4d3ce4c3addFalse1.0003260103383458data7.9994516540380705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .text0x560000x417a680x417c00bda2818ed9406605c71f28b682a809b5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x46e0000x5960x6009e147ad85ab9348879ff16d022f92209False0.4108072916666667data4.029089686581361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .Invalid0x4700000xa0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  Wrong0x4720000xa0d0xc00938b64e3c2e0cc8aa6c473ef01725febFalse0.6555989583333334data5.773428430096493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .Xerin0x4740000x8d0x200040d178313ed47b83547676fc1993608False0.04296875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x46e0a00x30cdata0.4217948717948718
                                  RT_MANIFEST0x46e3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 22, 2024 09:12:19.716514111 CET5662553192.168.2.111.1.1.1
                                  Nov 22, 2024 09:12:19.857848883 CET53566251.1.1.1192.168.2.11
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 22, 2024 09:12:19.716514111 CET192.168.2.111.1.1.10x9075Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 22, 2024 09:12:15.481842995 CET1.1.1.1192.168.2.110xfbd9No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Nov 22, 2024 09:12:15.481842995 CET1.1.1.1192.168.2.110xfbd9No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                  Nov 22, 2024 09:12:19.857848883 CET1.1.1.1192.168.2.110x9075No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                  Nov 22, 2024 09:12:19.857848883 CET1.1.1.1192.168.2.110x9075No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                  Nov 22, 2024 09:12:19.857848883 CET1.1.1.1192.168.2.110x9075No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:03:12:17
                                  Start date:22/11/2024
                                  Path:C:\Users\user\Desktop\exe004.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\exe004.exe"
                                  Imagebase:0x27c5dbd0000
                                  File size:4'638'752 bytes
                                  MD5 hash:FA90B485A972700B7114EF4B9CE25786
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2601580703.0000027C78AB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2599210496.0000027C786E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000000.1348039579.0000027C5DC3E000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2594166804.0000027C5FD51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:26.1%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:32.7%
                                    Total number of Nodes:49
                                    Total number of Limit Nodes:2
                                    execution_graph 4323 7ffe7df80e62 4324 7ffe7df900d0 NtQueryInformationProcess 4323->4324 4326 7ffe7df90191 4324->4326 4331 7ffe7df8ff49 4332 7ffe7df8ff53 4331->4332 4333 7ffe7df9002c 4332->4333 4334 7ffe7df9013d NtQueryInformationProcess 4332->4334 4335 7ffe7df90191 4334->4335 4302 7ffe7df8fcaa 4303 7ffe7df96570 CloseHandle 4302->4303 4305 7ffe7df965f4 4303->4305 4288 7ffe7df8a641 4289 7ffe7df8a65f GetFileAttributesW 4288->4289 4291 7ffe7df8a6f6 4289->4291 4306 7ffe7df92421 4307 7ffe7df9243f 4306->4307 4310 7ffe7df91f38 4307->4310 4309 7ffe7df92473 4311 7ffe7df91f3d CheckRemoteDebuggerPresent 4310->4311 4313 7ffe7df97f3f 4311->4313 4313->4309 4314 7ffe7df878a8 4315 7ffe7df878ad VirtualProtect 4314->4315 4317 7ffe7df87e81 4315->4317 4292 7ffe7df8ffd9 4295 7ffe7df8ffe9 4292->4295 4296 7ffe7df9002c 4292->4296 4293 7ffe7df9013d NtQueryInformationProcess 4294 7ffe7df90191 4293->4294 4295->4293 4295->4296 4327 7ffe7df80eb2 4328 7ffe7df8a660 GetFileAttributesW 4327->4328 4330 7ffe7df8a6f6 4328->4330 4336 7ffe7df80f52 4337 7ffe7df87de0 VirtualProtect 4336->4337 4339 7ffe7df87e81 4337->4339 4368 7ffe7df9021c 4369 7ffe7df90227 4368->4369 4370 7ffe7df90dab VirtualProtect 4369->4370 4372 7ffe7df90291 4369->4372 4371 7ffe7df90df1 4370->4371 4297 7ffe7df87b1d 4299 7ffe7df87b27 4297->4299 4298 7ffe7df87d19 4299->4298 4300 7ffe7df87e3b VirtualProtect 4299->4300 4301 7ffe7df87e81 4300->4301 4340 7ffe7df923d4 4341 7ffe7df923ef 4340->4341 4342 7ffe7df9240c 4341->4342 4343 7ffe7df91f38 CheckRemoteDebuggerPresent 4341->4343 4344 7ffe7df92473 4343->4344

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 7ffe7df90522-7ffe7df90532 1 7ffe7df90538-7ffe7df90575 0->1 2 7ffe7df90699-7ffe7df9069b 0->2 3 7ffe7df9057b-7ffe7df90594 call 7ffe7df8fc50 1->3 4 7ffe7df90602-7ffe7df9061b call 7ffe7df8fc50 1->4 5 7ffe7df906fa-7ffe7df906ff 2->5 6 7ffe7df9069d-7ffe7df906a1 2->6 3->4 4->2 7 7ffe7df90a6c-7ffe7df90a71 5->7 10 7ffe7df906a7-7ffe7df906d1 6->10 11 7ffe7df90768-7ffe7df90774 6->11 12 7ffe7df90a77-7ffe7df90a9c 7->12 13 7ffe7df90b2f-7ffe7df90b56 call 7ffe7df8fc50 7->13 18 7ffe7df9070e-7ffe7df90713 10->18 19 7ffe7df906d3-7ffe7df906db 10->19 16 7ffe7df9077a-7ffe7df907a9 11->16 17 7ffe7df9082d-7ffe7df9083a 11->17 21 7ffe7df90ac7-7ffe7df90acc 12->21 22 7ffe7df90a9e-7ffe7df90aa6 12->22 59 7ffe7df90b5c-7ffe7df90b88 13->59 60 7ffe7df90c11-7ffe7df90c6b call 7ffe7df8fc50 13->60 27 7ffe7df907ab-7ffe7df907b3 16->27 28 7ffe7df907d2-7ffe7df907d7 16->28 25 7ffe7df90840-7ffe7df9086f 17->25 26 7ffe7df908f2-7ffe7df908fe 17->26 23 7ffe7df90719-7ffe7df90724 18->23 24 7ffe7df90d23-7ffe7df90def VirtualProtect 18->24 29 7ffe7df906dd-7ffe7df906f0 19->29 30 7ffe7df906f2-7ffe7df906f6 19->30 21->24 39 7ffe7df90ad2-7ffe7df90add 21->39 35 7ffe7df90aa8-7ffe7df90abb 22->35 36 7ffe7df90abd-7ffe7df90ac3 22->36 37 7ffe7df90726-7ffe7df9072a 23->37 38 7ffe7df9073d-7ffe7df90741 23->38 126 7ffe7df90df7-7ffe7df90e1f 24->126 127 7ffe7df90df1 24->127 42 7ffe7df90898-7ffe7df9089d 25->42 43 7ffe7df90871-7ffe7df90879 25->43 40 7ffe7df9095b-7ffe7df90960 26->40 41 7ffe7df90900-7ffe7df9092c 26->41 44 7ffe7df907ca-7ffe7df907ce 27->44 45 7ffe7df907b5-7ffe7df907c8 27->45 28->24 34 7ffe7df907dd-7ffe7df907e8 28->34 29->30 31 7ffe7df90745-7ffe7df9074a 29->31 30->19 32 7ffe7df906f8 30->32 31->24 51 7ffe7df90750-7ffe7df9075b 31->51 32->11 61 7ffe7df907ea-7ffe7df907ee 34->61 62 7ffe7df90801-7ffe7df90805 34->62 35->36 47 7ffe7df90b00-7ffe7df90b05 35->47 36->22 49 7ffe7df90ac5 36->49 37->24 48 7ffe7df90730-7ffe7df9073b 37->48 38->18 50 7ffe7df90743 38->50 52 7ffe7df90af6-7ffe7df90afc 39->52 53 7ffe7df90adf-7ffe7df90ae3 39->53 57 7ffe7df909c8-7ffe7df90a01 call 7ffe7df8fc50 40->57 54 7ffe7df9092e-7ffe7df90936 41->54 55 7ffe7df90962-7ffe7df90967 41->55 42->24 46 7ffe7df908a3-7ffe7df908ae 42->46 64 7ffe7df9087b-7ffe7df9088e 43->64 65 7ffe7df90890-7ffe7df90894 43->65 44->27 58 7ffe7df907d0 44->58 45->44 56 7ffe7df90809-7ffe7df9080e 45->56 67 7ffe7df908c7-7ffe7df908cb 46->67 68 7ffe7df908b0-7ffe7df908b4 46->68 47->24 75 7ffe7df90b0b-7ffe7df90b1c 47->75 48->31 48->38 49->13 50->11 51->24 70 7ffe7df90761-7ffe7df90764 51->70 52->21 72 7ffe7df90afe 52->72 53->24 71 7ffe7df90ae9-7ffe7df90af4 53->71 73 7ffe7df90938-7ffe7df9094a 54->73 74 7ffe7df9094c-7ffe7df90952 54->74 55->24 76 7ffe7df9096d-7ffe7df90977 55->76 56->24 81 7ffe7df90814-7ffe7df9081f 56->81 111 7ffe7df90a03-7ffe7df90a17 57->111 58->17 77 7ffe7df90b8a-7ffe7df90b92 59->77 78 7ffe7df90bb1-7ffe7df90bb6 59->78 100 7ffe7df90cfb-7ffe7df90d0a 60->100 101 7ffe7df90c71-7ffe7df90c91 call 7ffe7df8fc50 60->101 61->24 79 7ffe7df907f4-7ffe7df907ff 61->79 62->28 80 7ffe7df90807 62->80 64->65 84 7ffe7df908cf-7ffe7df908d4 64->84 65->43 66 7ffe7df90896 65->66 66->26 67->42 87 7ffe7df908cd 67->87 68->24 85 7ffe7df908ba-7ffe7df908c5 68->85 70->11 71->47 71->52 72->13 73->74 89 7ffe7df9099e-7ffe7df909a3 73->89 74->54 90 7ffe7df90954-7ffe7df90959 74->90 75->24 91 7ffe7df90b22-7ffe7df90b2b 75->91 92 7ffe7df90979-7ffe7df9097d 76->92 93 7ffe7df9098f-7ffe7df90995 76->93 94 7ffe7df90ba9-7ffe7df90bad 77->94 95 7ffe7df90b94-7ffe7df90ba7 77->95 78->24 96 7ffe7df90bbc-7ffe7df90bc7 78->96 79->56 79->62 80->17 81->24 97 7ffe7df90825-7ffe7df90829 81->97 84->24 88 7ffe7df908da-7ffe7df908e5 84->88 85->67 85->84 87->26 88->24 102 7ffe7df908eb-7ffe7df908ee 88->102 89->24 106 7ffe7df909a9-7ffe7df909b5 89->106 90->57 91->13 92->24 103 7ffe7df90983-7ffe7df9098d 92->103 93->55 104 7ffe7df90997-7ffe7df9099c 93->104 94->77 107 7ffe7df90baf 94->107 95->94 105 7ffe7df90be8-7ffe7df90bed 95->105 108 7ffe7df90bc9-7ffe7df90bcd 96->108 109 7ffe7df90be0-7ffe7df90be4 96->109 97->17 114 7ffe7df90d0c 100->114 115 7ffe7df90d11-7ffe7df90d22 100->115 125 7ffe7df90c93-7ffe7df90cb6 call 7ffe7df8fc50 101->125 102->26 103->89 103->93 104->57 105->24 112 7ffe7df90bf3-7ffe7df90c03 105->112 106->24 116 7ffe7df909bb-7ffe7df909c4 106->116 107->60 108->24 117 7ffe7df90bd3-7ffe7df90bde 108->117 109->78 118 7ffe7df90be6 109->118 111->111 119 7ffe7df90a19-7ffe7df90a53 call 7ffe7df8fc50 111->119 112->24 120 7ffe7df90c09-7ffe7df90c0d 112->120 114->115 116->57 117->105 117->109 118->60 128 7ffe7df90a55-7ffe7df90a6a 119->128 120->60 131 7ffe7df90cb8-7ffe7df90cc3 125->131 132 7ffe7df90ce2-7ffe7df90ce6 125->132 127->126 128->7 128->128 133 7ffe7df90ce8-7ffe7df90cec 131->133 134 7ffe7df90cc5-7ffe7df90cd0 131->134 135 7ffe7df90cf1-7ffe7df90cf5 132->135 133->135 136 7ffe7df90cee-7ffe7df90cef 134->136 137 7ffe7df90cd2-7ffe7df90cde 134->137 135->100 135->101 136->135 137->125 138 7ffe7df90ce0 137->138 138->135
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ntin
                                    • API String ID: 0-3077571345
                                    • Opcode ID: be1a261fa176081d0d485caf098bade91076338cd6558d5a5f12625b4c9f22db
                                    • Instruction ID: 11236146fc09cc6305e67589b0725247b02a56b7d26789f04a5e8b11d9dc051d
                                    • Opcode Fuzzy Hash: be1a261fa176081d0d485caf098bade91076338cd6558d5a5f12625b4c9f22db
                                    • Instruction Fuzzy Hash: 6B52363192CA8F4AE72DDE0895916B977D2FF91300F68423DD0EBC35A5EE38B4438685

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 139 7ffe7df90624-7ffe7df9064d 142 7ffe7df90d23-7ffe7df90def VirtualProtect 139->142 143 7ffe7df90653-7ffe7df90663 139->143 189 7ffe7df90df7-7ffe7df90e1f 142->189 190 7ffe7df90df1 142->190 143->142 144 7ffe7df90669-7ffe7df9067d 143->144 144->142 146 7ffe7df90683-7ffe7df90697 144->146 147 7ffe7df90699-7ffe7df9069b 146->147 148 7ffe7df90704-7ffe7df90705 146->148 152 7ffe7df906fa-7ffe7df906ff 147->152 153 7ffe7df9069d-7ffe7df906a1 147->153 150 7ffe7df90768-7ffe7df90774 148->150 156 7ffe7df9077a-7ffe7df907a9 150->156 157 7ffe7df9082d-7ffe7df9083a 150->157 154 7ffe7df90a6c-7ffe7df90a71 152->154 153->150 158 7ffe7df906a7-7ffe7df906d1 153->158 159 7ffe7df90a77-7ffe7df90a9c 154->159 160 7ffe7df90b2f-7ffe7df90b56 call 7ffe7df8fc50 154->160 163 7ffe7df907ab-7ffe7df907b3 156->163 164 7ffe7df907d2-7ffe7df907d7 156->164 161 7ffe7df90840-7ffe7df9086f 157->161 162 7ffe7df908f2-7ffe7df908fe 157->162 165 7ffe7df9070e-7ffe7df90713 158->165 166 7ffe7df906d3-7ffe7df906db 158->166 169 7ffe7df90ac7-7ffe7df90acc 159->169 170 7ffe7df90a9e-7ffe7df90aa6 159->170 214 7ffe7df90b5c-7ffe7df90b88 160->214 215 7ffe7df90c11-7ffe7df90c6b call 7ffe7df8fc50 160->215 175 7ffe7df90898-7ffe7df9089d 161->175 176 7ffe7df90871-7ffe7df90879 161->176 173 7ffe7df9095b-7ffe7df90960 162->173 174 7ffe7df90900-7ffe7df9092c 162->174 177 7ffe7df907ca-7ffe7df907ce 163->177 178 7ffe7df907b5-7ffe7df907c8 163->178 164->142 168 7ffe7df907dd-7ffe7df907e8 164->168 165->142 171 7ffe7df90719-7ffe7df90724 165->171 179 7ffe7df906dd-7ffe7df906f0 166->179 180 7ffe7df906f2-7ffe7df906f6 166->180 197 7ffe7df907ea-7ffe7df907ee 168->197 198 7ffe7df90801-7ffe7df90805 168->198 169->142 188 7ffe7df90ad2-7ffe7df90add 169->188 184 7ffe7df90aa8-7ffe7df90abb 170->184 185 7ffe7df90abd-7ffe7df90ac3 170->185 186 7ffe7df90726-7ffe7df9072a 171->186 187 7ffe7df9073d-7ffe7df90741 171->187 194 7ffe7df909c8-7ffe7df90a01 call 7ffe7df8fc50 173->194 191 7ffe7df9092e-7ffe7df90936 174->191 192 7ffe7df90962-7ffe7df90967 174->192 175->142 183 7ffe7df908a3-7ffe7df908ae 175->183 199 7ffe7df9087b-7ffe7df9088e 176->199 200 7ffe7df90890-7ffe7df90894 176->200 177->163 195 7ffe7df907d0 177->195 178->177 193 7ffe7df90809-7ffe7df9080e 178->193 179->180 181 7ffe7df90745-7ffe7df9074a 179->181 180->166 182 7ffe7df906f8 180->182 181->142 208 7ffe7df90750-7ffe7df9075b 181->208 182->150 202 7ffe7df908c7-7ffe7df908cb 183->202 203 7ffe7df908b0-7ffe7df908b4 183->203 184->185 204 7ffe7df90b00-7ffe7df90b05 184->204 185->170 206 7ffe7df90ac5 185->206 186->142 205 7ffe7df90730-7ffe7df9073b 186->205 187->165 207 7ffe7df90743 187->207 209 7ffe7df90af6-7ffe7df90afc 188->209 210 7ffe7df90adf-7ffe7df90ae3 188->210 190->189 211 7ffe7df90938-7ffe7df9094a 191->211 212 7ffe7df9094c-7ffe7df90952 191->212 192->142 213 7ffe7df9096d-7ffe7df90977 192->213 193->142 218 7ffe7df90814-7ffe7df9081f 193->218 246 7ffe7df90a03-7ffe7df90a17 194->246 195->157 197->142 216 7ffe7df907f4-7ffe7df907ff 197->216 198->164 217 7ffe7df90807 198->217 199->200 220 7ffe7df908cf-7ffe7df908d4 199->220 200->176 201 7ffe7df90896 200->201 201->162 202->175 223 7ffe7df908cd 202->223 203->142 222 7ffe7df908ba-7ffe7df908c5 203->222 204->142 229 7ffe7df90b0b-7ffe7df90b1c 204->229 205->181 205->187 206->160 207->150 208->142 225 7ffe7df90761-7ffe7df90764 208->225 209->169 227 7ffe7df90afe 209->227 210->142 226 7ffe7df90ae9-7ffe7df90af4 210->226 211->212 228 7ffe7df9099e-7ffe7df909a3 211->228 212->191 230 7ffe7df90954-7ffe7df90959 212->230 231 7ffe7df90979-7ffe7df9097d 213->231 232 7ffe7df9098f-7ffe7df90995 213->232 233 7ffe7df90b8a-7ffe7df90b92 214->233 234 7ffe7df90bb1-7ffe7df90bb6 214->234 247 7ffe7df90cfb-7ffe7df90d0a 215->247 248 7ffe7df90c71-7ffe7df90c91 call 7ffe7df8fc50 215->248 216->193 216->198 217->157 218->142 235 7ffe7df90825-7ffe7df90829 218->235 220->142 224 7ffe7df908da-7ffe7df908e5 220->224 222->202 222->220 223->162 224->142 238 7ffe7df908eb-7ffe7df908ee 224->238 225->150 226->204 226->209 227->160 228->142 244 7ffe7df909a9-7ffe7df909b5 228->244 229->142 239 7ffe7df90b22-7ffe7df90b2b 229->239 230->194 231->142 240 7ffe7df90983-7ffe7df9098d 231->240 232->192 241 7ffe7df90997-7ffe7df9099c 232->241 242 7ffe7df90ba9-7ffe7df90bad 233->242 243 7ffe7df90b94-7ffe7df90ba7 233->243 234->142 245 7ffe7df90bbc-7ffe7df90bc7 234->245 235->157 238->162 239->160 240->228 240->232 241->194 242->233 250 7ffe7df90baf 242->250 243->242 249 7ffe7df90be8-7ffe7df90bed 243->249 244->142 251 7ffe7df909bb-7ffe7df909c4 244->251 252 7ffe7df90bc9-7ffe7df90bcd 245->252 253 7ffe7df90be0-7ffe7df90be4 245->253 246->246 254 7ffe7df90a19-7ffe7df90a53 call 7ffe7df8fc50 246->254 257 7ffe7df90d0c 247->257 258 7ffe7df90d11-7ffe7df90d22 247->258 266 7ffe7df90c93-7ffe7df90cb6 call 7ffe7df8fc50 248->266 249->142 255 7ffe7df90bf3-7ffe7df90c03 249->255 250->215 251->194 252->142 259 7ffe7df90bd3-7ffe7df90bde 252->259 253->234 260 7ffe7df90be6 253->260 265 7ffe7df90a55-7ffe7df90a6a 254->265 255->142 263 7ffe7df90c09-7ffe7df90c0d 255->263 257->258 259->249 259->253 260->215 263->215 265->154 265->265 269 7ffe7df90cb8-7ffe7df90cc3 266->269 270 7ffe7df90ce2-7ffe7df90ce6 266->270 271 7ffe7df90ce8-7ffe7df90cec 269->271 272 7ffe7df90cc5-7ffe7df90cd0 269->272 273 7ffe7df90cf1-7ffe7df90cf5 270->273 271->273 274 7ffe7df90cee-7ffe7df90cef 272->274 275 7ffe7df90cd2-7ffe7df90cde 272->275 273->247 273->248 274->273 275->266 276 7ffe7df90ce0 275->276 276->273
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID: ntin
                                    • API String ID: 544645111-3077571345
                                    • Opcode ID: 24230c3501c8ff6e05e84b14d4dcf831a14ad682c46cf29038449584b8e55559
                                    • Instruction ID: 33562724b278ea783142f0c3221d76b8bae504fbc969d15f2ff89f1c39cccbf5
                                    • Opcode Fuzzy Hash: 24230c3501c8ff6e05e84b14d4dcf831a14ad682c46cf29038449584b8e55559
                                    • Instruction Fuzzy Hash: 4B124C71A2C68E4BE72D9E0C94516B977D2FF91301F68423DD4DBC35D2EE28B4438685

                                    Control-flow Graph

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: 62372adba4f7d91a0ab5dfdb414e6f1ccff213e46d92b40ad300cd265a33be01
                                    • Instruction ID: 4cb4051ab417823e275bb7c3c6d83530ab244c186dced181a7e9c7fa43347fb8
                                    • Opcode Fuzzy Hash: 62372adba4f7d91a0ab5dfdb414e6f1ccff213e46d92b40ad300cd265a33be01
                                    • Instruction Fuzzy Hash: BEC1BB31A18B468FD31CDF18D4919B5BBE1FF99314B50463ED09B83A92DB34B862CB85

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 948 7ffe7df8ff49-7ffe7df8ff6c 951 7ffe7df8ffb6-7ffe7df8ffb9 948->951 952 7ffe7df8ff6e-7ffe7df8ff89 948->952 953 7ffe7df8ffbb-7ffe7df8ffbf 951->953 954 7ffe7df90035 951->954 955 7ffe7df8ff8f-7ffe7df8ff98 952->955 956 7ffe7df9003b-7ffe7df90041 953->956 957 7ffe7df8ffc1 953->957 958 7ffe7df8ff9a-7ffe7df8ff9d 955->958 959 7ffe7df8fff1-7ffe7df8fff2 955->959 964 7ffe7df90058 956->964 965 7ffe7df90043-7ffe7df90044 956->965 966 7ffe7df90008-7ffe7df90012 957->966 967 7ffe7df8ffc3-7ffe7df8ffc6 957->967 960 7ffe7df9001e-7ffe7df90021 958->960 961 7ffe7df8ff9f-7ffe7df8ffa1 958->961 962 7ffe7df9006e 959->962 963 7ffe7df8fff3 959->963 977 7ffe7df90023-7ffe7df90028 call 7ffe7df80e58 960->977 968 7ffe7df9001d 961->968 969 7ffe7df8ffa3 961->969 970 7ffe7df9006f-7ffe7df90073 962->970 971 7ffe7df90064-7ffe7df90068 963->971 972 7ffe7df8fff4-7ffe7df8fff9 963->972 979 7ffe7df90059 964->979 973 7ffe7df90047 965->973 976 7ffe7df90014-7ffe7df9001b 966->976 974 7ffe7df90037-7ffe7df9003a 967->974 975 7ffe7df8ffc8-7ffe7df8ffc9 967->975 968->960 980 7ffe7df8ffe6-7ffe7df8ffe8 969->980 981 7ffe7df8ffa5-7ffe7df8ffa7 969->981 983 7ffe7df900bd-7ffe7df9018f NtQueryInformationProcess 970->983 984 7ffe7df90075-7ffe7df90079 970->984 982 7ffe7df90069 971->982 985 7ffe7df9007a-7ffe7df9007e 972->985 986 7ffe7df8fffb-7ffe7df8fffe 972->986 987 7ffe7df90048-7ffe7df9004a 973->987 974->956 975->955 988 7ffe7df8ffcb 975->988 976->968 1000 7ffe7df90029-7ffe7df9002a 977->1000 990 7ffe7df8ffeb 979->990 991 7ffe7df9005b-7ffe7df9005d 979->991 980->979 998 7ffe7df8ffea 980->998 981->977 992 7ffe7df8ffa9 981->992 1015 7ffe7df90197-7ffe7df901b6 983->1015 1016 7ffe7df90191 983->1016 984->985 994 7ffe7df90080-7ffe7df90098 985->994 986->985 993 7ffe7df90000-7ffe7df90004 986->993 987->964 995 7ffe7df9004c-7ffe7df90056 987->995 988->973 997 7ffe7df8ffcd 988->997 999 7ffe7df8ffec-7ffe7df8ffed 990->999 1001 7ffe7df9005e-7ffe7df90063 991->1001 992->999 1002 7ffe7df8ffab-7ffe7df8ffad 992->1002 993->994 1003 7ffe7df90006 993->1003 995->1001 997->976 1005 7ffe7df8ffcf-7ffe7df8ffd1 997->1005 998->990 999->982 1006 7ffe7df8ffee 999->1006 1007 7ffe7df90036 1000->1007 1008 7ffe7df9002c-7ffe7df90034 1000->1008 1001->971 1002->1000 1010 7ffe7df8ffaf-7ffe7df8ffb4 1002->1010 1003->966 1003->987 1005->980 1006->970 1012 7ffe7df8ffef 1006->1012 1007->974 1008->954 1010->951 1010->954 1012->959 1014 7ffe7df8fff0 1012->1014 1014->959 1016->1015
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b903bd27b20f213d483d20f2c96409e6272ec3a95f456a9147f32046285f38da
                                    • Instruction ID: 1fed160861e4120b011b9de9e24949811e83625dc9e42c3ffc4c1954e2ed6fbe
                                    • Opcode Fuzzy Hash: b903bd27b20f213d483d20f2c96409e6272ec3a95f456a9147f32046285f38da
                                    • Instruction Fuzzy Hash: 87911732D1C6CD4FE7789A5898056F97BE1EF95320F08037AD46DD31B2EE2468198781

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1036 7ffe7df91f38-7ffe7df97f3d CheckRemoteDebuggerPresent 1046 7ffe7df97f3f 1036->1046 1047 7ffe7df97f45-7ffe7df97f7f 1036->1047 1046->1047
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 14d1c0447f3a97c5d2f08743b5044a7e951176515eec7b792041d1e1636d32a9
                                    • Instruction ID: 32200d3429dcd4847c4d93c17ea7cda4f6ae89e6b4e59d1e8fbbeb6a7c7bc44b
                                    • Opcode Fuzzy Hash: 14d1c0447f3a97c5d2f08743b5044a7e951176515eec7b792041d1e1636d32a9
                                    • Instruction Fuzzy Hash: 7B412332A086588FDB14EFACD84A6ED7BE0EF55321F08427BC089D7592EA34A4558BD1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1048 7ffe7df9009d-7ffe7df900b9 1049 7ffe7df900bb 1048->1049 1050 7ffe7df900bc-7ffe7df9018f NtQueryInformationProcess 1048->1050 1049->1050 1055 7ffe7df90197-7ffe7df901b6 1050->1055 1056 7ffe7df90191 1050->1056 1056->1055
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: InformationProcessQuery
                                    • String ID:
                                    • API String ID: 1778838933-0
                                    • Opcode ID: b6068e5dab855235c189019d7eae9dc7343ee633b01daeff8e716c2bfd2a8e19
                                    • Instruction ID: 4147705262f070132df1ad293ad64931a76bb5f19677e8248888fd33ddf0e69c
                                    • Opcode Fuzzy Hash: b6068e5dab855235c189019d7eae9dc7343ee633b01daeff8e716c2bfd2a8e19
                                    • Instruction Fuzzy Hash: 8241F57190C7888FDB29DB989C456E97FF1FF99321F0442AFE089D3152DA746846CB82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1057 7ffe7df80e62-7ffe7df9018f NtQueryInformationProcess 1061 7ffe7df90197-7ffe7df901b6 1057->1061 1062 7ffe7df90191 1057->1062 1062->1061
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: InformationProcessQuery
                                    • String ID:
                                    • API String ID: 1778838933-0
                                    • Opcode ID: 630d5675a23cc8d5196d3f7c02ec4766297279e3e562f109df7f0e020b19d781
                                    • Instruction ID: ce6d3cf63d6f9663c1d798fad7f52ab4b52a6e43f398291b13a9b2bd27e420d8
                                    • Opcode Fuzzy Hash: 630d5675a23cc8d5196d3f7c02ec4766297279e3e562f109df7f0e020b19d781
                                    • Instruction Fuzzy Hash: A1318F7191CA089FDB58DB8CD8456FD7BE1FB99321F00822FE04DD3251DA706845CB81

                                    Control-flow Graph

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ntin
                                    • API String ID: 0-3077571345
                                    • Opcode ID: 4f3e50473b5968eb54bd12d49a00a4be47e7f31a6f05e5d637d35e75b4c5a04a
                                    • Instruction ID: a7c1cd650c687e1e17c51dd3a37efc590988c7a3871fba037179cc9cb72ee5d0
                                    • Opcode Fuzzy Hash: 4f3e50473b5968eb54bd12d49a00a4be47e7f31a6f05e5d637d35e75b4c5a04a
                                    • Instruction Fuzzy Hash: 6FD1683196CA898FE72D9B1CD8957B8BBE1EF56310F14417ED0DBC36A2DE286842C741

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1017 7ffe7df878a8-7ffe7df878cd 1021 7ffe7df878cf-7ffe7df878d3 1017->1021 1022 7ffe7df878e6 1017->1022 1023 7ffe7df87db4-7ffe7df87dd9 1021->1023 1024 7ffe7df878d9-7ffe7df878e4 1021->1024 1025 7ffe7df878e8-7ffe7df8791f 1022->1025 1029 7ffe7df87ddb 1023->1029 1024->1025 1025->1023 1029->1029 1030 7ffe7df87ddd-7ffe7df87e7f VirtualProtect 1029->1030 1034 7ffe7df87e81 1030->1034 1035 7ffe7df87e87-7ffe7df87eaf 1030->1035 1034->1035
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: dd553e4392c513e7e338217664f51473a3ccc79eb15e6a241691cf2a0c2b0e21
                                    • Instruction ID: e084142aaf1dd2fd58bde67c9d82784731c59ea3666b921ee5c3eca91c6503ff
                                    • Opcode Fuzzy Hash: dd553e4392c513e7e338217664f51473a3ccc79eb15e6a241691cf2a0c2b0e21
                                    • Instruction Fuzzy Hash: F651273190CA488FD729DB688445BB9BBF1EF56311F0442BFD089C31A2DB74A845CB91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 0b3fd7a6d213e3c42d4e5e4d311dedb8288194eb0bcef2b746158ba7ccc081de
                                    • Instruction ID: 208a74d14637c1c71881f40adc9a96c61ddf520afba9cf1c0b1714a456532265
                                    • Opcode Fuzzy Hash: 0b3fd7a6d213e3c42d4e5e4d311dedb8288194eb0bcef2b746158ba7ccc081de
                                    • Instruction Fuzzy Hash: DF31B33190CA5C8FDB69DB68D8456EABBF0FF56320F04826FD049D3662DB70A855CB81
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 91ec27084eae633922cf27fda56ca600baf08dab44c38404c7bd5e93f662fa68
                                    • Instruction ID: 40e36e2cb13c890087b5b9fafd1e9bcfc61dbe1d42e7d4cec0b1a9d935ed3edf
                                    • Opcode Fuzzy Hash: 91ec27084eae633922cf27fda56ca600baf08dab44c38404c7bd5e93f662fa68
                                    • Instruction Fuzzy Hash: B131D431A0CA0C8FDB18DF9898466F9B7E1EB99311F04422FD04AD3651DB70A856CB91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 70d26825d038015c471ee1fdc75ad4791262cebcb1ba28be9e4a53d4c026edc2
                                    • Instruction ID: 4c08c4c164b62dbaec78806c208acd7469341729a2ca8e09766127f1d0892030
                                    • Opcode Fuzzy Hash: 70d26825d038015c471ee1fdc75ad4791262cebcb1ba28be9e4a53d4c026edc2
                                    • Instruction Fuzzy Hash: 1F31D63191CA0C8FDB18DF9898466F977E1EB99311F00422FD04AD3651DB7078528B81
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 00677fccd9eded14993b4bc0da83b9ae10b82a6d6b9f472223d015902632d2da
                                    • Instruction ID: f22d9be8f5400e93bf66d70aa27dac49a08a3a738c3185f17f68c27bfc4952b1
                                    • Opcode Fuzzy Hash: 00677fccd9eded14993b4bc0da83b9ae10b82a6d6b9f472223d015902632d2da
                                    • Instruction Fuzzy Hash: 82218F71908A1C9FDB58DB58D449AF9BBE0EB55321F00822FD00AD3661DB70A8558B81
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: 0dfe006cb7c56d38a70637216b9ca0c85179f4d3ed8dc45a8eda0787fe6ea115
                                    • Instruction ID: 8dd8f0a9b6edb35973a6f44c54c289f8e577f767aeb672930d6f61fbb13cfe66
                                    • Opcode Fuzzy Hash: 0dfe006cb7c56d38a70637216b9ca0c85179f4d3ed8dc45a8eda0787fe6ea115
                                    • Instruction Fuzzy Hash: 9321A171908A0C9FDB58EB58C449BF9BBF1FB65321F00422ED04ED3651DB71A456CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2608390636.00007FFE7DF80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffe7df80000_exe004.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ntin
                                    • API String ID: 0-3077571345
                                    • Opcode ID: 5f5c5f46095af3e455c10d2a8a6cd117ecf6d9ac6042ec89d68a5b4fee70fab8
                                    • Instruction ID: 4101ae4104f3cdda3129bc5519cf74b9d9051e7db73908e0ed9f6b472eca7e51
                                    • Opcode Fuzzy Hash: 5f5c5f46095af3e455c10d2a8a6cd117ecf6d9ac6042ec89d68a5b4fee70fab8
                                    • Instruction Fuzzy Hash: 26D15A75A2CA8F46E72CAD0995912B973D2FF91701F68423CD4EBC25D2EE28F4438685