Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q7I4ToJZ0R.exe

Overview

General Information

Sample name:Q7I4ToJZ0R.exe
renamed because original name is a hash value
Original sample name:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d.exe
Analysis ID:1563001
MD5:bef9bf5eac3326082945cf012441a65b
SHA1:c4dc7927b9d189887d143c5a7228e7227ce330e8
SHA256:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d
Tags:148-135-121-165exeuser-JAMESWT_MHT
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains long sleeps (>= 3 min)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • Q7I4ToJZ0R.exe (PID: 5768 cmdline: "C:\Users\user\Desktop\Q7I4ToJZ0R.exe" MD5: BEF9BF5EAC3326082945CF012441A65B)
    • conhost.exe (PID: 3452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Q7I4ToJZ0R.exeReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: Q7I4ToJZ0R.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Q7I4ToJZ0R.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Q7I4ToJZ0R.exe
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: Q7I4ToJZ0R.exe, 00000000.00000002.3889932161.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2064135271.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664846237.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2665036792.000002136E9CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/
Source: Q7I4ToJZ0R.exe, 00000000.00000002.3889932161.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.3889883145.000002136E9AB000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2064135271.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2665098044.000002136E9A8000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664846237.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2665036792.000002136E9CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3
Source: Q7I4ToJZ0R.exe, 00000000.00000002.3889932161.000002136E9EB000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664467964.000002136E9E9000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2064135271.000002136E9E9000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664927414.000002136E9EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF696CF11C00_2_00007FF696CF11C0
Source: classification engineClassification label: mal52.winEXE@2/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3452:120:WilError_03
Source: Q7I4ToJZ0R.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Q7I4ToJZ0R.exeReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Users\user\Desktop\Q7I4ToJZ0R.exe "C:\Users\user\Desktop\Q7I4ToJZ0R.exe"
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeSection loaded: dpapi.dllJump to behavior
Source: Q7I4ToJZ0R.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Q7I4ToJZ0R.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Q7I4ToJZ0R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Q7I4ToJZ0R.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Q7I4ToJZ0R.exe
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Q7I4ToJZ0R.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe TID: 6580Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exe TID: 728Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Q7I4ToJZ0R.exe, 00000000.00000002.3889883145.000002136E9AB000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2665098044.000002136E9A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: Q7I4ToJZ0R.exe, 00000000.00000003.2665120115.000002136E9FF000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664927414.000002136E9FD000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664467964.000002136E9FD000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000002.3889994605.000002136E9FD000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664908950.000002136E9FD000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664780309.000002136E9FD000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2064135271.000002136E9FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF696CF2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF696CF2098
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF696CF2098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF696CF2098
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF696CF223C SetUnhandledExceptionFilter,0_2_00007FF696CF223C
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF696CF1B6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF696CF1B6C
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeCode function: 0_2_00007FF696CF1F70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF696CF1F70
Source: C:\Users\user\Desktop\Q7I4ToJZ0R.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Q7I4ToJZ0R.exe26%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30%Avira URL Cloudsafe
https://148.135.121.165/0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://148.135.121.165/Q7I4ToJZ0R.exe, 00000000.00000002.3889932161.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2064135271.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664846237.000002136E9CC000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2665036792.000002136E9CC000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeacQ7I4ToJZ0R.exe, 00000000.00000002.3889932161.000002136E9EB000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664467964.000002136E9E9000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2064135271.000002136E9E9000.00000004.00000020.00020000.00000000.sdmp, Q7I4ToJZ0R.exe, 00000000.00000003.2664927414.000002136E9EB000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
148.135.121.165
unknownSweden
158ERI-ASUSfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1563001
Start date and time:2024-11-26 11:41:32 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 53s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Q7I4ToJZ0R.exe
renamed because original name is a hash value
Original Sample Name:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d.exe
Detection:MAL
Classification:mal52.winEXE@2/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Q7I4ToJZ0R.exe
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
148.135.121.165BjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
    Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ERI-ASUSBjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      la.bot.sh4.elfGet hashmaliciousUnknownBrowse
      • 150.132.118.42
      loligang.ppc.elfGet hashmaliciousMiraiBrowse
      • 147.214.206.40
      apep.x86.elfGet hashmaliciousMiraiBrowse
      • 131.168.79.136
      zgp.elfGet hashmaliciousMiraiBrowse
      • 148.135.186.71
      arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 169.144.189.36
      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 129.200.252.43
      arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 169.144.206.208
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      72a589da586844d7f0818ce684948eeaBjLxqVU7m4.dllGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      file.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      No context
      No created / dropped files found
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):4.9515819022544525
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Q7I4ToJZ0R.exe
      File size:16'896 bytes
      MD5:bef9bf5eac3326082945cf012441a65b
      SHA1:c4dc7927b9d189887d143c5a7228e7227ce330e8
      SHA256:2ab6abc289406d0d1ab978de646363c27af5b52113dc9ab7d1bfbae386dfc56d
      SHA512:8f6a6ede316e21884641952af1bf3f0d4aed908ba78470c426b42616014b3fe66f31b7ab4d4a80d9d8473e4b4e3516c4269a8bd8e95e39b95b603b5ef0ec42cd
      SSDEEP:192:MHocDdqWYMmKeObo0eZSC+SrvfTtt+pkSv56t+E3Q5XfMcQu:MHocRqRy+KSrvfBt05B6tP3/u
      TLSH:F0721A4AAB564DE9D436C13DC573492BE5B2B1105722DBCF63908A2E1EB73C0BC36E46
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......mse.)...)...)... j..#...9...*...9...#...9...2...9.../...bj..,...).......b...(...b...(...b...(...Rich)...........PE..d...+%2g...
      Icon Hash:00928e8e8686b000
      Entrypoint:0x140001b58
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x6732252B [Mon Nov 11 15:39:23 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:cc3f5f44573b1ef710307611a33ec304
      Instruction
      dec eax
      sub esp, 28h
      call 00007F92B080D1F4h
      dec eax
      add esp, 28h
      jmp 00007F92B080CC57h
      int3
      int3
      inc eax
      push ebx
      dec eax
      sub esp, 20h
      dec eax
      mov ebx, ecx
      xor ecx, ecx
      call dword ptr [000014A3h]
      dec eax
      mov ecx, ebx
      call dword ptr [00001492h]
      call dword ptr [0000149Ch]
      dec eax
      mov ecx, eax
      mov edx, C0000409h
      dec eax
      add esp, 20h
      pop ebx
      dec eax
      jmp dword ptr [00001490h]
      dec eax
      mov dword ptr [esp+08h], ecx
      dec eax
      sub esp, 38h
      mov ecx, 00000017h
      call dword ptr [00001484h]
      test eax, eax
      je 00007F92B080CDE9h
      mov ecx, 00000002h
      int 29h
      dec eax
      lea ecx, dword ptr [000035FAh]
      call 00007F92B080CE8Eh
      dec eax
      mov eax, dword ptr [esp+38h]
      dec eax
      mov dword ptr [000036E1h], eax
      dec eax
      lea eax, dword ptr [esp+38h]
      dec eax
      add eax, 08h
      dec eax
      mov dword ptr [00003671h], eax
      dec eax
      mov eax, dword ptr [000036CAh]
      dec eax
      mov dword ptr [0000353Bh], eax
      dec eax
      mov eax, dword ptr [esp+40h]
      dec eax
      mov dword ptr [0000363Fh], eax
      mov dword ptr [00003515h], C0000409h
      mov dword ptr [0000350Fh], 00000001h
      mov dword ptr [00003519h], 00000001h
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x3f8c0xdc.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x240.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x58.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x36200x70.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34e00x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x30000x258.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x18620x1a003272278371367b7d4aee9475cbb796b4False0.6045673076923077data5.950501702710063IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x30000x18dc0x1a008f7a1294d8cd43ac7ee0f20424ca46d4False0.37259615384615385data3.9662390155216176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x50000x7200x200144ab6bfe6bb39ce984c043b4aeb0c6fFalse0.23046875data2.0665233777045033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x60000x2400x4008646266eb1c41a7986c2e9ef88849c46False0.3115234375data2.449887087720597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x80000x580x2000433091c18d69714fe1dcae46953db17False0.19921875data1.1833113271125035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
      DLLImport
      KERNEL32.dllSleep, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlCaptureContext
      MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z
      WINHTTP.dllWinHttpReadData, WinHttpReceiveResponse, WinHttpOpenRequest, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpAddRequestHeaders, WinHttpCloseHandle, WinHttpSendRequest, WinHttpSetOption, WinHttpConnect
      VCRUNTIME140_1.dll__CxxFrameHandler4
      VCRUNTIME140.dll_CxxThrowException, __current_exception, __current_exception_context, memset, __std_exception_destroy, memchr, memcpy, __C_specific_handler, __std_exception_copy, memmove
      api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, terminate, _c_exit, _cexit, _register_onexit_function, _set_app_type, _seh_filter_exe, _initialize_onexit_table, _invalid_parameter_noinfo_noreturn, __p___argv, __p___argc, _exit, _register_thread_local_exe_atexit_callback, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _crt_atexit, _configure_narrow_argv
      api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free, _callnewh, malloc
      api-ms-win-crt-math-l1-1-0.dll__setusermatherr
      api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
      api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Nov 26, 2024 11:42:23.754661083 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:23.754755974 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:23.754837990 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:23.756541967 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:23.756597996 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.109751940 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.109827042 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.114335060 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.114347935 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.114742994 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.155905962 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.190032005 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.235331059 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.599577904 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.599664927 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.600994110 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.775911093 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.775969028 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:42:25.776001930 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:42:25.776021004 CET44349704148.135.121.165192.168.2.5
      • 148.135.121.165
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.549704148.135.121.1654435768C:\Users\user\Desktop\Q7I4ToJZ0R.exe
      TimestampBytes transferredDirectionData
      2024-11-26 10:42:25 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
      Connection: Keep-Alive
      Content-Type: text/plain
      User-Agent: HCMUS-CTF Botnet
      Host: 148.135.121.165
      2024-11-26 10:42:25 UTC192INHTTP/1.1 200 OK
      Server: nginx/1.18.0 (Ubuntu)
      Date: Tue, 26 Nov 2024 10:42:25 GMT
      Content-Type: application/octet-stream
      Content-Length: 93
      Connection: close
      Content-Type: text/plain
      2024-11-26 10:42:25 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
      Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:05:42:22
      Start date:26/11/2024
      Path:C:\Users\user\Desktop\Q7I4ToJZ0R.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\Q7I4ToJZ0R.exe"
      Imagebase:0x7ff696cf0000
      File size:16'896 bytes
      MD5 hash:BEF9BF5EAC3326082945CF012441A65B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:05:42:22
      Start date:26/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:22.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:21%
        Total number of Nodes:143
        Total number of Limit Nodes:1
        execution_graph 596 7ff696cf10b0 __std_exception_destroy 597 7ff696cf27f0 598 7ff696cf2803 597->598 599 7ff696cf2810 597->599 601 7ff696cf1660 598->601 602 7ff696cf1673 601->602 603 7ff696cf169f 601->603 604 7ff696cf16b8 _invalid_parameter_noinfo_noreturn 602->604 605 7ff696cf1697 602->605 603->599 606 7ff696cf1880 free 605->606 606->603 607 7ff696cf282c _seh_filter_exe 608 7ff696cf18cc 609 7ff696cf18e4 608->609 610 7ff696cf18ee 608->610 611 7ff696cf1880 free 609->611 611->610 612 7ff696cf1b0a 613 7ff696cf21e8 GetModuleHandleW 612->613 614 7ff696cf1b11 613->614 615 7ff696cf1b15 614->615 616 7ff696cf1b50 _exit 614->616 617 7ff696cf1000 __std_exception_copy 618 7ff696cf19c0 622 7ff696cf223c SetUnhandledExceptionFilter 618->622 623 7ff696cf26c0 624 7ff696cf26f8 __GSHandlerCheckCommon 623->624 625 7ff696cf2724 624->625 626 7ff696cf2713 __CxxFrameHandler4 624->626 626->625 628 7ff696cf1060 __std_exception_destroy 629 7ff696cf1095 628->629 630 7ff696cf1088 628->630 631 7ff696cf1880 free 630->631 631->629 482 7ff696cf19dc 483 7ff696cf19f5 482->483 484 7ff696cf1b33 483->484 485 7ff696cf19fd 483->485 521 7ff696cf2098 IsProcessorFeaturePresent 484->521 487 7ff696cf1b3d 485->487 488 7ff696cf1a1b __scrt_release_startup_lock 485->488 489 7ff696cf2098 9 API calls 487->489 491 7ff696cf1a40 488->491 493 7ff696cf1ac6 _get_initial_narrow_environment __p___argv __p___argc 488->493 496 7ff696cf1abe _register_thread_local_exe_atexit_callback 488->496 490 7ff696cf1b48 489->490 492 7ff696cf1b50 _exit 490->492 502 7ff696cf1440 493->502 496->493 499 7ff696cf1af3 500 7ff696cf1afd 499->500 501 7ff696cf1af8 _cexit 499->501 500->491 501->500 504 7ff696cf14a0 502->504 505 7ff696cf15d5 Sleep 504->505 506 7ff696cf1576 memchr 504->506 507 7ff696cf15e5 _invalid_parameter_noinfo_noreturn 504->507 508 7ff696cf1880 free 504->508 509 7ff696cf15a0 memchr 504->509 510 7ff696cf15ec SleepEx 504->510 527 7ff696cf11c0 WinHttpOpen 504->527 505->504 506->504 506->505 507->510 508->504 509->504 513 7ff696cf15bc Sleep 509->513 511 7ff696cf1632 510->511 512 7ff696cf15fe 510->512 551 7ff696cf1860 511->551 514 7ff696cf162a 512->514 516 7ff696cf1623 _invalid_parameter_noinfo_noreturn 512->516 513->504 548 7ff696cf1880 514->548 516->514 519 7ff696cf21e8 GetModuleHandleW 520 7ff696cf1aef 519->520 520->490 520->499 522 7ff696cf20be 521->522 523 7ff696cf20cc memset RtlCaptureContext RtlLookupFunctionEntry 522->523 524 7ff696cf2142 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 523->524 525 7ff696cf2106 RtlVirtualUnwind 523->525 526 7ff696cf21c2 524->526 525->524 526->487 528 7ff696cf1295 WinHttpSetOption 527->528 529 7ff696cf1245 WinHttpConnect 527->529 531 7ff696cf12bf WinHttpAddRequestHeaders WinHttpSendRequest 528->531 532 7ff696cf13eb 528->532 529->528 530 7ff696cf1266 WinHttpOpenRequest 529->530 530->528 535 7ff696cf13e2 WinHttpCloseHandle 531->535 536 7ff696cf1303 WinHttpReceiveResponse 531->536 533 7ff696cf13f0 WinHttpCloseHandle 532->533 534 7ff696cf13f9 532->534 533->534 537 7ff696cf13fe WinHttpCloseHandle 534->537 538 7ff696cf1407 534->538 535->532 536->535 545 7ff696cf1316 536->545 537->538 540 7ff696cf1860 8 API calls 538->540 539 7ff696cf1320 WinHttpQueryDataAvailable 560 7ff696cf18c4 539->560 542 7ff696cf1417 540->542 542->504 544 7ff696cf1880 free 544->545 545->535 545->539 545->544 546 7ff696cf13a4 memcpy 545->546 567 7ff696cf16c0 545->567 546->545 549 7ff696cf1ce8 free 548->549 552 7ff696cf1869 551->552 553 7ff696cf1641 552->553 554 7ff696cf1ba0 IsProcessorFeaturePresent 552->554 553->519 555 7ff696cf1bb8 554->555 591 7ff696cf1c74 RtlCaptureContext 555->591 561 7ff696cf1888 malloc 560->561 563 7ff696cf1893 561->563 564 7ff696cf133e memset WinHttpReadData 561->564 563->560 563->561 583 7ff696cf1d10 563->583 586 7ff696cf1100 563->586 564->545 568 7ff696cf1843 567->568 571 7ff696cf16ee 567->571 590 7ff696cf11a0 ?_Xlength_error@std@@YAXPEBD 568->590 570 7ff696cf1848 572 7ff696cf1100 Concurrency::cancel_current_task __std_exception_copy 570->572 571->570 573 7ff696cf173e 571->573 575 7ff696cf184e 572->575 574 7ff696cf17fc _invalid_parameter_noinfo_noreturn 573->574 576 7ff696cf1803 573->576 577 7ff696cf17af memcpy memcpy 573->577 574->576 580 7ff696cf180b memcpy 576->580 578 7ff696cf17ef 577->578 579 7ff696cf17da 577->579 581 7ff696cf1880 free 578->581 579->574 579->578 582 7ff696cf17fa 580->582 581->582 582->545 589 7ff696cf1cf0 583->589 585 7ff696cf1d1e _CxxThrowException 587 7ff696cf110e Concurrency::cancel_current_task 586->587 588 7ff696cf111f __std_exception_copy 587->588 588->563 589->585 592 7ff696cf1c8e RtlLookupFunctionEntry 591->592 593 7ff696cf1ca4 RtlVirtualUnwind 592->593 594 7ff696cf1bcb 592->594 593->592 593->594 595 7ff696cf1b6c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 594->595 632 7ff696cf18f8 633 7ff696cf1908 632->633 645 7ff696cf1da8 633->645 635 7ff696cf2098 9 API calls 636 7ff696cf19ad 635->636 637 7ff696cf192c _RTC_Initialize 643 7ff696cf198f 637->643 653 7ff696cf2030 InitializeSListHead 637->653 643->635 644 7ff696cf199d 643->644 646 7ff696cf1deb 645->646 647 7ff696cf1db9 645->647 646->637 648 7ff696cf1e28 647->648 651 7ff696cf1dbe __scrt_release_startup_lock 647->651 649 7ff696cf2098 9 API calls 648->649 650 7ff696cf1e32 649->650 651->646 652 7ff696cf1ddb _initialize_onexit_table 651->652 652->646 654 7ff696cf1b58 657 7ff696cf1f70 654->657 658 7ff696cf1f93 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 657->658 659 7ff696cf1b61 657->659 658->659

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00007FF696CF2090 1 Function_00007FF696CF1D10 47 Function_00007FF696CF1CF0 1->47 2 Function_00007FF696CF1B0A 52 Function_00007FF696CF21E8 2->52 3 Function_00007FF696CF2088 4 Function_00007FF696CF1000 5 Function_00007FF696CF2080 6 Function_00007FF696CF1100 24 Function_00007FF696CF10D0 6->24 7 Function_00007FF696CF1880 8 Function_00007FF696CF18F8 10 Function_00007FF696CF2030 8->10 14 Function_00007FF696CF2028 8->14 15 Function_00007FF696CF1DA8 8->15 16 Function_00007FF696CF22A8 8->16 19 Function_00007FF696CF2020 8->19 21 Function_00007FF696CF201C 8->21 23 Function_00007FF696CF2098 8->23 32 Function_00007FF696CF2044 8->32 34 Function_00007FF696CF2040 8->34 44 Function_00007FF696CF2074 8->44 60 Function_00007FF696CF2058 8->60 61 Function_00007FF696CF1F58 8->61 9 Function_00007FF696CF1E34 11 Function_00007FF696CF1D30 49 Function_00007FF696CF25EC 11->49 12 Function_00007FF696CF10B0 13 Function_00007FF696CF282C 15->23 15->49 17 Function_00007FF696CF2820 18 Function_00007FF696CF2320 20 Function_00007FF696CF11A0 22 Function_00007FF696CF1F1C 23->0 25 Function_00007FF696CF2050 26 Function_00007FF696CF1ECC 26->49 27 Function_00007FF696CF18CC 27->7 28 Function_00007FF696CF224C 29 Function_00007FF696CF284A 30 Function_00007FF696CF2048 31 Function_00007FF696CF18C4 31->1 31->6 33 Function_00007FF696CF1EC5 35 Function_00007FF696CF11C0 35->7 35->31 37 Function_00007FF696CF16C0 35->37 55 Function_00007FF696CF1860 35->55 36 Function_00007FF696CF19C0 36->21 42 Function_00007FF696CF223C 36->42 37->6 37->7 37->20 38 Function_00007FF696CF1440 38->7 38->35 38->55 39 Function_00007FF696CF1040 40 Function_00007FF696CF2740 41 Function_00007FF696CF26C0 41->40 43 Function_00007FF696CF1C74 45 Function_00007FF696CF27F0 54 Function_00007FF696CF1660 45->54 46 Function_00007FF696CF1EF0 46->34 48 Function_00007FF696CF1F70 50 Function_00007FF696CF1B6C 51 Function_00007FF696CF1D6C 51->18 51->34 53 Function_00007FF696CF22E4 54->7 55->43 55->50 56 Function_00007FF696CF1160 57 Function_00007FF696CF1060 57->7 58 Function_00007FF696CF19DC 58->3 58->5 58->9 58->11 58->23 58->26 58->38 58->46 58->51 58->52 59 Function_00007FF696CF1B58 59->48 60->25 60->30 61->22

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID: Http$CloseHandleRequest$DataOpen$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemcpymemset
        • String ID: /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3$148.135.121.165$Content-Type: text/plain$GET$HCMUS-CTF Botnet
        • API String ID: 1954243361-2234560942
        • Opcode ID: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
        • Instruction ID: 0ba728c820e10ff27ddf1f79c70506fd9d17891e3b480781ce7b13abd4d377f6
        • Opcode Fuzzy Hash: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
        • Instruction Fuzzy Hash: 5761AD36A08B81D6EB24DF52A80466A77B0FB85B94F044175EE4E87B50CF7EE049D700

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID: Http$RequestSleep$DataOpen_invalid_parameter_noinfo_noreturnmemchr$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemset
        • String ID: HCMUS-CT
        • API String ID: 2434495133-4159949832
        • Opcode ID: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
        • Instruction ID: e3ef961ca624b98220a60cb24a4a2690224468c55cc1bf2713d364670e314c56
        • Opcode Fuzzy Hash: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
        • Instruction Fuzzy Hash: 1C519E72E28781C2EA248B2595043AC33B1EB457E4F555372FA6D53BD5DF7EE881A300

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
        • String ID:
        • API String ID: 1328870896-0
        • Opcode ID: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
        • Instruction ID: d832eab127d202743061142bf1267d8a487246b0be8604cfcfa1930dfe4e4356
        • Opcode Fuzzy Hash: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
        • Instruction Fuzzy Hash: BE31FA31A09343C6EA34AB6594153B926B1EF55784F8444B5FA4DCBBE3DE6FE808B340

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 313767242-0
        • Opcode ID: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
        • Instruction ID: c069fed64e1e0d713f12dc15319d51bf6d0bf39bcd92c43dcf5f71fd13a7a430
        • Opcode Fuzzy Hash: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
        • Instruction Fuzzy Hash: 54311772608B81DAEB709FA0E8907E97370FB84744F44443AEA4E87B98DE7DD648D714

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
        • Instruction ID: c513a315723cf78cd6b63299345b278d8d880ead48b50430216f81c8d0463e42
        • Opcode Fuzzy Hash: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
        • Instruction Fuzzy Hash: 54113022B14F41DAEB10CF60E8542B833B4FB19758F840E31EA6D867A4DFBDE1589380
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
        • Instruction ID: 08ad4531d63eef4795a656c0c3ad3a1fa73cbb1f261375307eb49a7f94033715
        • Opcode Fuzzy Hash: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
        • Instruction Fuzzy Hash: CCA0016191AA42E1E6288B48A8545202230EB54310B8040B2E00D810619E6EE400A348

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3890136322.00007FF696CF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF696CF0000, based on PE: true
        • Associated: 00000000.00000002.3890123173.00007FF696CF0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890149724.00007FF696CF3000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890165189.00007FF696CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3890179559.00007FF696CF6000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff696cf0000_Q7I4ToJZ0R.jbxd
        Similarity
        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
        • String ID:
        • API String ID: 1775671525-0
        • Opcode ID: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
        • Instruction ID: 96ecbe24d97af43c4e0e505bf54c3c4367f80da4eb44b3f68e6d87d71d7e2717
        • Opcode Fuzzy Hash: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
        • Instruction Fuzzy Hash: FA41C172B08B82C5EA349B12E5043AAA371FB44BE4F544672EE5D87B95DE3EE041A300