Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q7I4ToJZ0R.exe

Overview

General Information

Sample name:Q7I4ToJZ0R.exe
renamed because original name is a hash value
Original sample name:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d.exe
Analysis ID:1563001
MD5:bef9bf5eac3326082945cf012441a65b
SHA1:c4dc7927b9d189887d143c5a7228e7227ce330e8
SHA256:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d
Tags:148-135-121-165exeuser-JAMESWT_MHT
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains long sleeps (>= 3 min)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • Q7I4ToJZ0R.exe (PID: 732 cmdline: "C:\Users\user\Desktop\Q7I4ToJZ0R.exe" MD5: BEF9BF5EAC3326082945CF012441A65B)
    • conhost.exe (PID: 5828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Q7I4ToJZ0R.exeReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.7% probability
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: Q7I4ToJZ0R.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Q7I4ToJZ0R.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Q7I4ToJZ0R.exe
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332276569.000001E0EF57C000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332107144.000001E0EF57C000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946503827.000001E0EF57C000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331968176.000001E0EF57A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946384270.000001E0EF53B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946384270.000001E0EF53B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3ssM
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332135918.000001E0EF55F000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331985413.000001E0EF55F000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946481629.000001E0EF565000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332185947.000001E0EF564000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/oT
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2332045768.000001E0EF580000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331968176.000001E0EF57A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946527073.000001E0EF581000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF6CA1F11C00_2_00007FF6CA1F11C0
Source: classification engineClassification label: mal52.winEXE@2/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5828:120:WilError_03
Source: Q7I4ToJZ0R.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Q7I4ToJZ0R.exeReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Users\user\Desktop\Q7I4ToJZ0R.exe "C:\Users\user\Desktop\Q7I4ToJZ0R.exe"
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: dpapi.dllJump to behavior
Source: Q7I4ToJZ0R.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Q7I4ToJZ0R.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Q7I4ToJZ0R.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Q7I4ToJZ0R.exe
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe TID: 2380Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe TID: 932Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Q7I4ToJZ0R.exe, 00000000.00000002.2946542654.000001E0EF58B000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332323542.000001E0EF58D000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331894323.000001E0EF58A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF6CA1F2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CA1F2098
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF6CA1F1B6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6CA1F1B6C
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF6CA1F223C SetUnhandledExceptionFilter,0_2_00007FF6CA1F223C
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF6CA1F2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CA1F2098
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF6CA1F1F70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6CA1F1F70
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Q7I4ToJZ0R.exe26%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3ssM0%Avira URL Cloudsafe
https://148.135.121.165/oT0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30%Avira URL Cloudsafe
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeacQ7I4ToJZ0R.exe, 00000000.00000003.2332045768.000001E0EF580000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331968176.000001E0EF57A000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946527073.000001E0EF581000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/oTQ7I4ToJZ0R.exe, 00000000.00000003.2332135918.000001E0EF55F000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2331985413.000001E0EF55F000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946481629.000001E0EF565000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2332185947.000001E0EF564000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3ssMQ7I4ToJZ0R.exe, 00000000.00000003.2332305664.000001E0EF538000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.2946384270.000001E0EF53B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
148.135.121.165
unknownSweden
158ERI-ASUSfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1563001
Start date and time:2024-11-26 11:37:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Q7I4ToJZ0R.exe
renamed because original name is a hash value
Original Sample Name:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d.exe
Detection:MAL
Classification:mal52.winEXE@2/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Q7I4ToJZ0R.exe
TimeTypeDescription
05:38:03API Interceptor1x Sleep call for process: Q7I4ToJZ0R.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
ERI-ASUSla.bot.sh4.elfGet hashmaliciousUnknownBrowse
  • 150.132.118.42
loligang.ppc.elfGet hashmaliciousMiraiBrowse
  • 147.214.206.40
apep.x86.elfGet hashmaliciousMiraiBrowse
  • 131.168.79.136
zgp.elfGet hashmaliciousMiraiBrowse
  • 148.135.186.71
arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 169.144.189.36
x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 129.200.252.43
arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 169.144.206.208
yakuza.i586.elfGet hashmaliciousMiraiBrowse
  • 161.37.102.84
x86.elfGet hashmaliciousMirai, MoobotBrowse
  • 147.214.205.2
owari.arm7.elfGet hashmaliciousMiraiBrowse
  • 136.225.157.189
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
72a589da586844d7f0818ce684948eeaLgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
file.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):4.9515819022544525
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Q7I4ToJZ0R.exe
File size:16'896 bytes
MD5:bef9bf5eac3326082945cf012441a65b
SHA1:c4dc7927b9d189887d143c5a7228e7227ce330e8
SHA256:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d
SHA512:8f6a6ede316e21884641952af1bf3f0d4aed908ba78470c426b42616014b3fe66f31b7ab4d4a80d9d8473e4b4e3516c4269a8bd8e95e39b95b603b5ef0ec42cd
SSDEEP:192:MHocDdqWYMmKeObo0eZSC+SrvfTtt+pkSv56t+E3Q5XfMcQu:MHocRqRy+KSrvfBt05B6tP3/u
TLSH:F0721A4AAB564DE9D436C13DC573492BE5B2B1105722DBCF63908A2E1EB73C0BC36E46
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......mse.)...)...)... j..#...9...*...9...#...9...2...9.../...bj..,...).......b...(...b...(...b...(...Rich)...........PE..d...+%2g...
Icon Hash:90cececece8e8eb0
Entrypoint:0x140001b58
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6732252B [Mon Nov 11 15:39:23 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:cc3f5f44573b1ef710307611a33ec304
Instruction
dec eax
sub esp, 28h
call 00007F0EC8BFE984h
dec eax
add esp, 28h
jmp 00007F0EC8BFE3E7h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [000014A3h]
dec eax
mov ecx, ebx
call dword ptr [00001492h]
call dword ptr [0000149Ch]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00001490h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00001484h]
test eax, eax
je 00007F0EC8BFE579h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [000035FAh]
call 00007F0EC8BFE61Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [000036E1h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00003671h], eax
dec eax
mov eax, dword ptr [000036CAh]
dec eax
mov dword ptr [0000353Bh], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [0000363Fh], eax
mov dword ptr [00003515h], C0000409h
mov dword ptr [0000350Fh], 00000001h
mov dword ptr [00003519h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3f8c0xdc.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x240.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x58.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x36200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x258.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x18620x1a003272278371367b7d4aee9475cbb796b4False0.6045673076923077data5.950501702710063IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x18dc0x1a008f7a1294d8cd43ac7ee0f20424ca46d4False0.37259615384615385data3.9662390155216176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x7200x200144ab6bfe6bb39ce984c043b4aeb0c6fFalse0.23046875data2.0665233777045033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x60000x2400x4008646266eb1c41a7986c2e9ef88849c46False0.3115234375data2.449887087720597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x580x2000433091c18d69714fe1dcae46953db17False0.19921875data1.1833113271125035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllSleep, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlCaptureContext
MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z
WINHTTP.dllWinHttpReadData, WinHttpReceiveResponse, WinHttpOpenRequest, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpAddRequestHeaders, WinHttpCloseHandle, WinHttpSendRequest, WinHttpSetOption, WinHttpConnect
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll_CxxThrowException, __current_exception, __current_exception_context, memset, __std_exception_destroy, memchr, memcpy, __C_specific_handler, __std_exception_copy, memmove
api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, terminate, _c_exit, _cexit, _register_onexit_function, _set_app_type, _seh_filter_exe, _initialize_onexit_table, _invalid_parameter_noinfo_noreturn, __p___argv, __p___argc, _exit, _register_thread_local_exe_atexit_callback, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _crt_atexit, _configure_narrow_argv
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free, _callnewh, malloc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Nov 26, 2024 11:38:01.997874022 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:01.997946978 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:01.998035908 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:02.006814003 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:02.006834984 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:03.490617037 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:03.490792990 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:03.540169954 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:03.540240049 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:03.540551901 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:03.581675053 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:03.851624012 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:03.899338961 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:04.247363091 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:04.247432947 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:04.247493982 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:04.247867107 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:04.247893095 CET44349730148.135.121.165192.168.2.4
Nov 26, 2024 11:38:04.247908115 CET49730443192.168.2.4148.135.121.165
Nov 26, 2024 11:38:04.247915983 CET44349730148.135.121.165192.168.2.4
  • 148.135.121.165
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.449730148.135.121.165443732C:\Users\user\Desktop\Q7I4ToJZ0R.exe
TimestampBytes transferredDirectionData
2024-11-26 10:38:03 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
Connection: Keep-Alive
Content-Type: text/plain
User-Agent: HCMUS-CTF Botnet
Host: 148.135.121.165
2024-11-26 10:38:04 UTC192INHTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Tue, 26 Nov 2024 10:38:04 GMT
Content-Type: application/octet-stream
Content-Length: 93
Connection: close
Content-Type: text/plain
2024-11-26 10:38:04 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:05:38:00
Start date:26/11/2024
Path:C:\Users\user\Desktop\Q7I4ToJZ0R.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\Q7I4ToJZ0R.exe"
Imagebase:0x7ff6ca1f0000
File size:16'896 bytes
MD5 hash:BEF9BF5EAC3326082945CF012441A65B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:05:38:00
Start date:26/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:22.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:21%
    Total number of Nodes:143
    Total number of Limit Nodes:1
    execution_graph 596 7ff6ca1f1060 __std_exception_destroy 597 7ff6ca1f1095 596->597 598 7ff6ca1f1088 596->598 599 7ff6ca1f1880 free 598->599 599->597 601 7ff6ca1f26c0 602 7ff6ca1f26f8 __GSHandlerCheckCommon 601->602 603 7ff6ca1f2724 602->603 604 7ff6ca1f2713 __CxxFrameHandler4 602->604 604->603 605 7ff6ca1f19c0 609 7ff6ca1f223c SetUnhandledExceptionFilter 605->609 610 7ff6ca1f1000 __std_exception_copy 482 7ff6ca1f19dc 483 7ff6ca1f19f5 482->483 484 7ff6ca1f1b33 483->484 485 7ff6ca1f19fd 483->485 521 7ff6ca1f2098 IsProcessorFeaturePresent 484->521 487 7ff6ca1f1b3d 485->487 490 7ff6ca1f1a1b __scrt_release_startup_lock 485->490 488 7ff6ca1f2098 9 API calls 487->488 489 7ff6ca1f1b48 488->489 492 7ff6ca1f1b50 _exit 489->492 491 7ff6ca1f1a40 490->491 493 7ff6ca1f1ac6 _get_initial_narrow_environment __p___argv __p___argc 490->493 497 7ff6ca1f1abe _register_thread_local_exe_atexit_callback 490->497 502 7ff6ca1f1440 493->502 497->493 499 7ff6ca1f1af3 500 7ff6ca1f1afd 499->500 501 7ff6ca1f1af8 _cexit 499->501 500->491 501->500 504 7ff6ca1f14a0 502->504 505 7ff6ca1f15d5 Sleep 504->505 506 7ff6ca1f1576 memchr 504->506 507 7ff6ca1f15e5 _invalid_parameter_noinfo_noreturn 504->507 508 7ff6ca1f1880 free 504->508 509 7ff6ca1f15a0 memchr 504->509 510 7ff6ca1f15ec SleepEx 504->510 527 7ff6ca1f11c0 WinHttpOpen 504->527 505->504 506->504 506->505 507->510 508->504 509->504 511 7ff6ca1f15bc Sleep 509->511 512 7ff6ca1f1632 510->512 513 7ff6ca1f15fe 510->513 511->504 551 7ff6ca1f1860 512->551 515 7ff6ca1f162a 513->515 516 7ff6ca1f1623 _invalid_parameter_noinfo_noreturn 513->516 548 7ff6ca1f1880 515->548 516->515 519 7ff6ca1f21e8 GetModuleHandleW 520 7ff6ca1f1aef 519->520 520->489 520->499 522 7ff6ca1f20be 521->522 523 7ff6ca1f20cc memset RtlCaptureContext RtlLookupFunctionEntry 522->523 524 7ff6ca1f2142 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 523->524 525 7ff6ca1f2106 RtlVirtualUnwind 523->525 526 7ff6ca1f21c2 524->526 525->524 526->487 528 7ff6ca1f1295 WinHttpSetOption 527->528 529 7ff6ca1f1245 WinHttpConnect 527->529 530 7ff6ca1f12bf WinHttpAddRequestHeaders WinHttpSendRequest 528->530 531 7ff6ca1f13eb 528->531 529->528 532 7ff6ca1f1266 WinHttpOpenRequest 529->532 533 7ff6ca1f13e2 WinHttpCloseHandle 530->533 534 7ff6ca1f1303 WinHttpReceiveResponse 530->534 535 7ff6ca1f13f0 WinHttpCloseHandle 531->535 536 7ff6ca1f13f9 531->536 532->528 533->531 534->533 545 7ff6ca1f1316 534->545 535->536 537 7ff6ca1f13fe WinHttpCloseHandle 536->537 538 7ff6ca1f1407 536->538 537->538 540 7ff6ca1f1860 8 API calls 538->540 539 7ff6ca1f1320 WinHttpQueryDataAvailable 560 7ff6ca1f18c4 539->560 542 7ff6ca1f1417 540->542 542->504 544 7ff6ca1f1880 free 544->545 545->533 545->539 545->544 546 7ff6ca1f13a4 memcpy 545->546 567 7ff6ca1f16c0 545->567 546->545 549 7ff6ca1f1ce8 free 548->549 554 7ff6ca1f1869 551->554 552 7ff6ca1f1ba0 IsProcessorFeaturePresent 555 7ff6ca1f1bb8 552->555 553 7ff6ca1f1641 553->519 554->552 554->553 591 7ff6ca1f1c74 RtlCaptureContext 555->591 563 7ff6ca1f1888 malloc 560->563 562 7ff6ca1f133e memset WinHttpReadData 562->545 563->562 564 7ff6ca1f1893 563->564 564->560 564->563 583 7ff6ca1f1d10 564->583 586 7ff6ca1f1100 564->586 568 7ff6ca1f1843 567->568 569 7ff6ca1f16ee 567->569 590 7ff6ca1f11a0 ?_Xlength_error@std@@YAXPEBD 568->590 571 7ff6ca1f1848 569->571 577 7ff6ca1f173e 569->577 572 7ff6ca1f1100 Concurrency::cancel_current_task __std_exception_copy 571->572 573 7ff6ca1f184e 572->573 574 7ff6ca1f1803 581 7ff6ca1f180b memcpy 574->581 575 7ff6ca1f17af memcpy memcpy 578 7ff6ca1f17ef 575->578 579 7ff6ca1f17da 575->579 576 7ff6ca1f17fc _invalid_parameter_noinfo_noreturn 576->574 577->574 577->575 577->576 580 7ff6ca1f1880 free 578->580 579->576 579->578 582 7ff6ca1f17fa 580->582 581->582 582->545 589 7ff6ca1f1cf0 583->589 585 7ff6ca1f1d1e _CxxThrowException 587 7ff6ca1f110e Concurrency::cancel_current_task 586->587 588 7ff6ca1f111f __std_exception_copy 587->588 588->564 589->585 592 7ff6ca1f1c8e RtlLookupFunctionEntry 591->592 593 7ff6ca1f1ca4 RtlVirtualUnwind 592->593 594 7ff6ca1f1bcb 592->594 593->592 593->594 595 7ff6ca1f1b6c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 594->595 611 7ff6ca1f1b58 614 7ff6ca1f1f70 611->614 615 7ff6ca1f1f93 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 614->615 616 7ff6ca1f1b61 614->616 615->616 617 7ff6ca1f18f8 618 7ff6ca1f1908 617->618 630 7ff6ca1f1da8 618->630 620 7ff6ca1f2098 9 API calls 621 7ff6ca1f19ad 620->621 622 7ff6ca1f192c _RTC_Initialize 628 7ff6ca1f198f 622->628 638 7ff6ca1f2030 InitializeSListHead 622->638 628->620 629 7ff6ca1f199d 628->629 631 7ff6ca1f1deb 630->631 632 7ff6ca1f1db9 630->632 631->622 633 7ff6ca1f1e28 632->633 636 7ff6ca1f1dbe __scrt_release_startup_lock 632->636 634 7ff6ca1f2098 9 API calls 633->634 635 7ff6ca1f1e32 634->635 636->631 637 7ff6ca1f1ddb _initialize_onexit_table 636->637 637->631 639 7ff6ca1f27f0 640 7ff6ca1f2803 639->640 641 7ff6ca1f2810 639->641 643 7ff6ca1f1660 640->643 644 7ff6ca1f1673 643->644 645 7ff6ca1f169f 643->645 646 7ff6ca1f1697 644->646 647 7ff6ca1f16b8 _invalid_parameter_noinfo_noreturn 644->647 645->641 648 7ff6ca1f1880 free 646->648 648->645 649 7ff6ca1f10b0 __std_exception_destroy 650 7ff6ca1f18cc 651 7ff6ca1f18e4 650->651 652 7ff6ca1f18ee 650->652 653 7ff6ca1f1880 free 651->653 653->652 654 7ff6ca1f282c _seh_filter_exe 655 7ff6ca1f1b0a 656 7ff6ca1f21e8 GetModuleHandleW 655->656 657 7ff6ca1f1b11 656->657 658 7ff6ca1f1b50 _exit 657->658 659 7ff6ca1f1b15 657->659

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF6CA1F22E4 1 Function_00007FF6CA1F1060 54 Function_00007FF6CA1F1880 1->54 2 Function_00007FF6CA1F1160 3 Function_00007FF6CA1F1860 9 Function_00007FF6CA1F1C74 3->9 15 Function_00007FF6CA1F1B6C 3->15 4 Function_00007FF6CA1F1660 4->54 5 Function_00007FF6CA1F19DC 13 Function_00007FF6CA1F1EF0 5->13 16 Function_00007FF6CA1F1D6C 5->16 18 Function_00007FF6CA1F21E8 5->18 23 Function_00007FF6CA1F1440 5->23 34 Function_00007FF6CA1F1ECC 5->34 44 Function_00007FF6CA1F2098 5->44 45 Function_00007FF6CA1F1E34 5->45 48 Function_00007FF6CA1F1D30 5->48 53 Function_00007FF6CA1F2080 5->53 61 Function_00007FF6CA1F2088 5->61 6 Function_00007FF6CA1F1B58 11 Function_00007FF6CA1F1F70 6->11 7 Function_00007FF6CA1F2058 31 Function_00007FF6CA1F2050 7->31 37 Function_00007FF6CA1F2048 7->37 8 Function_00007FF6CA1F1F58 43 Function_00007FF6CA1F1F1C 8->43 10 Function_00007FF6CA1F2074 12 Function_00007FF6CA1F1CF0 25 Function_00007FF6CA1F2040 13->25 14 Function_00007FF6CA1F27F0 14->4 16->25 40 Function_00007FF6CA1F2320 16->40 17 Function_00007FF6CA1F25EC 19 Function_00007FF6CA1F2044 20 Function_00007FF6CA1F18C4 55 Function_00007FF6CA1F1100 20->55 59 Function_00007FF6CA1F1D10 20->59 21 Function_00007FF6CA1F1EC5 22 Function_00007FF6CA1F2740 23->3 27 Function_00007FF6CA1F11C0 23->27 23->54 24 Function_00007FF6CA1F26C0 24->22 26 Function_00007FF6CA1F1040 27->3 27->20 29 Function_00007FF6CA1F16C0 27->29 27->54 28 Function_00007FF6CA1F19C0 30 Function_00007FF6CA1F223C 28->30 42 Function_00007FF6CA1F201C 28->42 38 Function_00007FF6CA1F11A0 29->38 29->54 29->55 32 Function_00007FF6CA1F10D0 33 Function_00007FF6CA1F224C 34->17 35 Function_00007FF6CA1F18CC 35->54 36 Function_00007FF6CA1F284A 39 Function_00007FF6CA1F2020 41 Function_00007FF6CA1F2820 58 Function_00007FF6CA1F2090 44->58 46 Function_00007FF6CA1F10B0 47 Function_00007FF6CA1F2030 48->17 49 Function_00007FF6CA1F282C 50 Function_00007FF6CA1F1DA8 50->17 50->44 51 Function_00007FF6CA1F22A8 52 Function_00007FF6CA1F2028 55->32 56 Function_00007FF6CA1F1000 57 Function_00007FF6CA1F18F8 57->7 57->8 57->10 57->19 57->25 57->39 57->42 57->44 57->47 57->50 57->51 57->52 59->12 60 Function_00007FF6CA1F1B0A 60->18

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID: Http$CloseHandleRequest$DataOpen$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemcpymemset
    • String ID: /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3$148.135.121.165$Content-Type: text/plain$GET$HCMUS-CTF Botnet
    • API String ID: 1954243361-2234560942
    • Opcode ID: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
    • Instruction ID: cc0765d82afa11b1294646768d6a4b8d0eedc82c4135304f7e21dac31d59d4e8
    • Opcode Fuzzy Hash: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
    • Instruction Fuzzy Hash: 77617C26A08BC186EB14DF52B82466A77A4FB85FA5F144178DE9E87F54CF7CE049C700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID: Http$RequestSleep$DataOpen_invalid_parameter_noinfo_noreturnmemchr$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemset
    • String ID: HCMUS-CT
    • API String ID: 2434495133-4159949832
    • Opcode ID: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
    • Instruction ID: 42ffd38f1b5967cced0572f347fd47eb7ea0a121517d52b8887bb8ec0885cbe2
    • Opcode Fuzzy Hash: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
    • Instruction Fuzzy Hash: 7B51BE62E18BC181EB148F25A9243AC6362AB45BF1F554379EBBD43BD5DF7DE8818300

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 1328870896-0
    • Opcode ID: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
    • Instruction ID: bfc5dc2df99905510020eaba1b6f9cb446fbe52e84980058bab761d43396f89c
    • Opcode Fuzzy Hash: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
    • Instruction Fuzzy Hash: E4311F21A095C341EB14AF21BD353B91291AF55FA6F4440BDEADEC7AD7DE2DE8058340

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
    • Instruction ID: 4ce58f7c7d1bdb8195d6f505bfc5780bff71b1572a4ad3baa4058e4622bc00fb
    • Opcode Fuzzy Hash: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
    • Instruction Fuzzy Hash: D6313E76608BC186EB609F60F8507ED7360FB84B45F44447ADA8E87B98EF38D549C714

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
    • Instruction ID: cd9b88908e67e06d25eeb7d6341eb5eddba8458ee9fbbadeaa2a5d0dfdd4e6e4
    • Opcode Fuzzy Hash: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
    • Instruction Fuzzy Hash: DA110026B14F858AEB00CF60FC652B833A4FB59B59F441E35DAAD86BA4DF7CD1588340
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
    • Instruction ID: d42670c7846eb27799b2c092da7790ecb3a81a142c0becf6f5e1c85bdab31ffa
    • Opcode Fuzzy Hash: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
    • Instruction Fuzzy Hash: FFA0012590A98290E7088F08BC605202234EB54B02B4040BAC09D818619E3CE4018304

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2946691388.00007FF6CA1F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CA1F0000, based on PE: true
    • Associated: 00000000.00000002.2946666122.00007FF6CA1F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946704555.00007FF6CA1F3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946722472.00007FF6CA1F5000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2946741083.00007FF6CA1F6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6ca1f0000_Q7I4ToJZ0R.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1775671525-0
    • Opcode ID: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
    • Instruction ID: e8c32e630b8a0ea2eb426c3c4206392dee89186baa38c54c7a540f93216dd34d
    • Opcode Fuzzy Hash: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
    • Instruction Fuzzy Hash: 1141AE62B086C285EB20DF12B92436AA251BB44FE6F544679DFDD87B95DE3CE0418300