Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BjLxqVU7m4.dll

Overview

General Information

Sample name:BjLxqVU7m4.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84.exe
Analysis ID:1563002
MD5:bd804dfa6fafa1917f83060a30f7f1d0
SHA1:68cc23c6877806705588ceb6fec57d913a543c1d
SHA256:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84
Tags:148-135-121-165exeuser-JAMESWT_MHT
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Writes to foreign memory regions
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6520 cmdline: loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6620 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 1096 cmdline: rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • sdiagnhost.exe (PID: 4416 cmdline: c:\windows\System32\sdiagnhost.exe MD5: 3A161A0124CE64840140D6A9943A5DD3)
          • conhost.exe (PID: 5940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sdiagnhost.exe (PID: 1476 cmdline: c:\windows\System32\sdiagnhost.exe MD5: 3A161A0124CE64840140D6A9943A5DD3)
      • conhost.exe (PID: 2352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2097265530.0000023F26458000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x9979:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0xcf0f:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.2097166418.000000F46C712000.00000004.00000010.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x6fe9:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0xa57f:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000004.00000002.2144696138.000000219F0F2000.00000004.00000010.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x6e29:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5b19:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x90af:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5b19:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x90af:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
Click to see the 1 entries
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: BjLxqVU7m4.dllReversingLabs: Detection: 50%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.3% probability
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: BjLxqVU7m4.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/
Source: sdiagnhost.exe, 00000003.00000003.2721646362.0000021245104000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337520750.0000021245105000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2121243744.00000212450FF000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721388889.000001E9B9E15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3
Source: sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3m
Source: sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/h
Source: sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49705 version: TLS 1.2
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49704 version: TLS 1.2

System Summary

barindex
Source: 00000000.00000002.2097265530.0000023F26458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000002.2097166418.000000F46C712000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000002.2144696138.000000219F0F2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000003.2144509875.0000015D67C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_00000212450675CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,3_2_00000212450675CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C375CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,6_2_000001E9B9C375CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_0000021245066DC53_2_0000021245066DC5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_00000212450675CD3_2_00000212450675CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000002124506806D3_2_000002124506806D
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_00000212450671953_2_0000021245067195
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000002124506A8C53_2_000002124506A8C5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_0000021245065ED13_2_0000021245065ED1
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_00000212453111C03_2_00000212453111C0
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C36DC56_2_000001E9B9C36DC5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C375CD6_2_000001E9B9C375CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C371956_2_000001E9B9C37195
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C3A8C56_2_000001E9B9C3A8C5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C3806D6_2_000001E9B9C3806D
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9C35ED16_2_000001E9B9C35ED1
Source: C:\Windows\System32\sdiagnhost.exeCode function: 6_2_000001E9B9ED11C06_2_000001E9B9ED11C0
Source: 00000000.00000002.2097265530.0000023F26458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000002.2097166418.000000F46C712000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000002.2144696138.000000219F0F2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000003.2144509875.0000015D67C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: classification engineClassification label: mal72.evad.winDLL@12/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6204:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2352:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5940:120:WilError_03
Source: BjLxqVU7m4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
Source: BjLxqVU7m4.dllReversingLabs: Detection: 50%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
Source: C:\Windows\System32\sdiagnhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe
Source: C:\Windows\System32\sdiagnhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: dpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: BjLxqVU7m4.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: BjLxqVU7m4.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 1276Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 3180Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 5520Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 5692Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 2364Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\sdiagnhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: sdiagnhost.exe, 00000006.00000002.3337745462.000001E9B9E1F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2121162740.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721916034.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721388889.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW4
Source: sdiagnhost.exe, 00000003.00000003.2721386114.0000021245112000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2721646362.0000021245104000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337520750.0000021245105000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2721894603.0000021245113000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2121421493.0000021245112000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2121243744.00000212450FF000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2721702995.0000021245113000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2121162740.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721916034.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: sdiagnhost.exe, 00000006.00000003.2722045406.000001E9B9DE1000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeMemory allocated: C:\Windows\System32\sdiagnhost.exe base: 21245060000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\sdiagnhost.exe base: 1E9B9C30000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\loaddll64.exeThread created: C:\Windows\System32\sdiagnhost.exe EIP: 45060000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread created: C:\Windows\System32\sdiagnhost.exe EIP: B9C30000Jump to behavior
Source: C:\Windows\System32\loaddll64.exeMemory written: C:\Windows\System32\sdiagnhost.exe base: 21245060000Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\sdiagnhost.exe base: 1E9B9C30000Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
311
Process Injection
1
Rundll32
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
Process Injection
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1563002 Sample: BjLxqVU7m4.exe Startdate: 26/11/2024 Architecture: WINDOWS Score: 72 30 Malicious sample detected (through community Yara rule) 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 AI detected suspicious sample 2->34 9 loaddll64.exe 1 2->9         started        process3 signatures4 42 Writes to foreign memory regions 9->42 44 Allocates memory in foreign processes 9->44 46 Creates a thread in another existing process (thread injection) 9->46 12 cmd.exe 1 9->12         started        14 sdiagnhost.exe 1 9->14         started        17 conhost.exe 9->17         started        process5 dnsIp6 19 rundll32.exe 12->19         started        28 148.135.121.165, 443, 49704, 49705 ERI-ASUS Sweden 14->28 22 conhost.exe 14->22         started        process7 signatures8 36 Writes to foreign memory regions 19->36 38 Allocates memory in foreign processes 19->38 40 Creates a thread in another existing process (thread injection) 19->40 24 sdiagnhost.exe 1 19->24         started        process9 process10 26 conhost.exe 24->26         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BjLxqVU7m4.dll50%ReversingLabsWin64.Exploit.DonutMarte
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://148.135.121.165/0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30%Avira URL Cloudsafe
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac0%Avira URL Cloudsafe
https://148.135.121.165/h0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3m0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://148.135.121.165/sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeacsdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/hsdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3msdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
148.135.121.165
unknownSweden
158ERI-ASUSfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1563002
Start date and time:2024-11-26 11:37:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:BjLxqVU7m4.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original Sample Name:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84.exe
Detection:MAL
Classification:mal72.evad.winDLL@12/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 15
  • Number of non-executed functions: 4
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: BjLxqVU7m4.dll
TimeTypeDescription
05:38:04API Interceptor1x Sleep call for process: loaddll64.exe modified
05:38:07API Interceptor2x Sleep call for process: sdiagnhost.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
148.135.121.165Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
    Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ERI-ASUSNe7qNMCeuy.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      la.bot.sh4.elfGet hashmaliciousUnknownBrowse
      • 150.132.118.42
      loligang.ppc.elfGet hashmaliciousMiraiBrowse
      • 147.214.206.40
      apep.x86.elfGet hashmaliciousMiraiBrowse
      • 131.168.79.136
      zgp.elfGet hashmaliciousMiraiBrowse
      • 148.135.186.71
      arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 169.144.189.36
      x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 129.200.252.43
      arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 169.144.206.208
      yakuza.i586.elfGet hashmaliciousMiraiBrowse
      • 161.37.102.84
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      72a589da586844d7f0818ce684948eeaNe7qNMCeuy.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      • 148.135.121.165
      LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      file.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
      • 148.135.121.165
      No context
      No created / dropped files found
      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Entropy (8bit):5.397375470102125
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:BjLxqVU7m4.dll
      File size:494'592 bytes
      MD5:bd804dfa6fafa1917f83060a30f7f1d0
      SHA1:68cc23c6877806705588ceb6fec57d913a543c1d
      SHA256:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84
      SHA512:707556ba18b3489bf808cb1d019cd28d4c7bbce782507e402c225aaae19a84e2b440e037faa1f971138c4cf21687f3bedabc3841fc743e58a46df2e914e0af54
      SSDEEP:12288:m40yN1KHlD9FmE02qUlLno8shIvaLzSAOXR4DbT8miyK/AIT/D:m40ynslDGLtUlLno8gIyLzSAOXufT8mc
      TLSH:15B4AE8C63AD4A7CE525CA341C47A784B2F3BC4C9650EF7A1A947CA23D1F581F87A9D0
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f.6i".X:".X:".X:i.[;'.X:i.];..X:i.\;(.X:2;[;+.X:2;\;,.X:2;];..X:i.Y;!.X:".Y:..X:i:Q;#.X:i:.:#.X:i:Z;#.X:Rich".X:........PE..d..
      Icon Hash:7ae282899bbab082
      Entrypoint:0x18005fe00
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x180000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x67322CD2 [Mon Nov 11 16:12:02 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:7ff3d1e87d95163015bce24ecab3c29c
      Instruction
      dec eax
      mov dword ptr [esp+08h], ebx
      dec eax
      mov dword ptr [esp+10h], esi
      push edi
      dec eax
      sub esp, 20h
      dec ecx
      mov edi, eax
      mov ebx, edx
      dec eax
      mov esi, ecx
      cmp edx, 01h
      jne 00007F1EF04F4CD7h
      call 00007F1EF04F53F0h
      dec esp
      mov eax, edi
      mov edx, ebx
      dec eax
      mov ecx, esi
      dec eax
      mov ebx, dword ptr [esp+30h]
      dec eax
      mov esi, dword ptr [esp+38h]
      dec eax
      add esp, 20h
      pop edi
      jmp 00007F1EF04F4B70h
      int3
      int3
      int3
      inc eax
      push ebx
      dec eax
      sub esp, 20h
      dec eax
      mov ebx, ecx
      xor ecx, ecx
      call dword ptr [0000E1FFh]
      dec eax
      mov ecx, ebx
      call dword ptr [0000E1EEh]
      call dword ptr [0000E1F8h]
      dec eax
      mov ecx, eax
      mov edx, C0000409h
      dec eax
      add esp, 20h
      pop ebx
      dec eax
      jmp dword ptr [0000E1ECh]
      dec eax
      mov dword ptr [esp+08h], ecx
      dec eax
      sub esp, 38h
      mov ecx, 00000017h
      call dword ptr [0000E1E0h]
      test eax, eax
      je 00007F1EF04F4CD9h
      mov ecx, 00000002h
      int 29h
      dec eax
      lea ecx, dword ptr [00018DF6h]
      call 00007F1EF04F4EA2h
      dec eax
      mov eax, dword ptr [esp+38h]
      dec eax
      mov dword ptr [00018EDDh], eax
      dec eax
      lea eax, dword ptr [esp+38h]
      dec eax
      add eax, 08h
      dec eax
      mov dword ptr [00018E6Dh], eax
      dec eax
      mov eax, dword ptr [00018EC6h]
      dec eax
      mov dword ptr [00018D37h], eax
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x773840x28.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000xf8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x108c.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7d0000x67c.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x75a300x38.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x758f00x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x6e0000x268.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x6c3910x6c400bb677fae1f916ec8f6b527bf7b97ac2cFalse0.4373894883083141data5.363101479126426IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x6e0000x9ba60x9c0052db703257b5aaa2998a36764458115cFalse0.42225060096153844zlib compressed data4.783106084134961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x780000x1d7c0xc005f6274e895e20194e4daeab242f66ba8False0.15071614583333334DOS executable (block device driver)2.2457774802989823IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x7a0000x108c0x1200549c54645e00ef4e6ad04d654e5f2bb1False0.4453125data5.060326050579461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x7c0000xf80x2000deaaac3f0dc5653aa759e15c976e2c4False0.3359375data2.5312981004807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x7d0000x67c0x800fae7c8c79b00d77c9832e40025ac35edFalse0.4990234375data4.935308952064295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x7c0600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
      DLLImport
      KERNEL32.dllWriteProcessMemory, CloseHandle, VirtualAllocEx, CreateRemoteThread, CreateProcessA, WriteConsoleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetProcessHeap, GetStdHandle, GetFileType, GetStringTypeW, HeapSize, HeapReAlloc, SetStdHandle, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, SetFilePointerEx, CreateFileW
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Nov 26, 2024 11:38:06.598839998 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:06.598861933 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:06.598925114 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:06.601047993 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:06.601059914 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:06.608355999 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:06.608431101 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:06.608498096 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:06.617628098 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:06.617647886 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.003618002 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.003710032 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.026752949 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.026870966 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.064169884 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.064204931 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.064579964 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.071988106 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.072009087 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.072390079 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.112560034 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.115861893 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.455761909 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.457381964 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.499339104 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.503338099 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.836764097 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.836853981 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.836914062 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.838018894 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.838042021 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.838052988 CET49705443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.838058949 CET44349705148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.847007990 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.847079992 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.847134113 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.847596884 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.847614050 CET44349704148.135.121.165192.168.2.5
      Nov 26, 2024 11:38:08.847630024 CET49704443192.168.2.5148.135.121.165
      Nov 26, 2024 11:38:08.847636938 CET44349704148.135.121.165192.168.2.5
      • 148.135.121.165
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.549704148.135.121.1654431476C:\Windows\System32\sdiagnhost.exe
      TimestampBytes transferredDirectionData
      2024-11-26 10:38:08 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
      Connection: Keep-Alive
      Content-Type: text/plain
      User-Agent: HCMUS-CTF Botnet
      Host: 148.135.121.165
      2024-11-26 10:38:08 UTC192INHTTP/1.1 200 OK
      Server: nginx/1.18.0 (Ubuntu)
      Date: Tue, 26 Nov 2024 10:38:08 GMT
      Content-Type: application/octet-stream
      Content-Length: 93
      Connection: close
      Content-Type: text/plain
      2024-11-26 10:38:08 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
      Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.549705148.135.121.1654434416C:\Windows\System32\sdiagnhost.exe
      TimestampBytes transferredDirectionData
      2024-11-26 10:38:08 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
      Connection: Keep-Alive
      Content-Type: text/plain
      User-Agent: HCMUS-CTF Botnet
      Host: 148.135.121.165
      2024-11-26 10:38:08 UTC192INHTTP/1.1 200 OK
      Server: nginx/1.18.0 (Ubuntu)
      Date: Tue, 26 Nov 2024 10:38:08 GMT
      Content-Type: application/octet-stream
      Content-Length: 93
      Connection: close
      Content-Type: text/plain
      2024-11-26 10:38:08 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
      Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\loaddll64.exe
      Wow64 process (32bit):false
      Commandline:loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll"
      Imagebase:0x7ff76e920000
      File size:165'888 bytes
      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2097265530.0000023F26458000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2097166418.000000F46C712000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
      Imagebase:0x7ff7ee540000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\sdiagnhost.exe
      Wow64 process (32bit):false
      Commandline:c:\windows\System32\sdiagnhost.exe
      Imagebase:0x7ff69f440000
      File size:40'448 bytes
      MD5 hash:3A161A0124CE64840140D6A9943A5DD3
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
      Reputation:low
      Has exited:false

      Target ID:4
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
      Imagebase:0x7ff6466b0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.2144696138.000000219F0F2000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000003.2144509875.0000015D67C38000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:6
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\sdiagnhost.exe
      Wow64 process (32bit):false
      Commandline:c:\windows\System32\sdiagnhost.exe
      Imagebase:0x7ff69f440000
      File size:40'448 bytes
      MD5 hash:3A161A0124CE64840140D6A9943A5DD3
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
      Reputation:low
      Has exited:false

      Target ID:8
      Start time:05:38:04
      Start date:26/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:11.2%
        Dynamic/Decrypted Code Coverage:7.1%
        Signature Coverage:41.4%
        Total number of Nodes:99
        Total number of Limit Nodes:6
        execution_graph 2585 21245065d84 VirtualProtect 2586 21245065d9c 2585->2586 2587 21245065d3c 2585->2587 2588 21245065daa VirtualProtect 2586->2588 2594 212450686ad 2588->2594 2591 21245065ded VirtualProtect 2591->2587 2592 21245065e06 2591->2592 2593 21245065e14 VirtualProtect 2592->2593 2593->2587 2595 21245065dd2 2594->2595 2596 212450686e3 2594->2596 2595->2587 2595->2591 2596->2595 2598 21245066529 2596->2598 2599 21245066595 2598->2599 2602 2124506656c 2598->2602 2603 212450665a5 2599->2603 2604 212450685c5 2599->2604 2601 212450686ad LoadLibraryA 2601->2602 2602->2599 2602->2601 2602->2603 2603->2595 2607 212450685e3 2604->2607 2605 2124506868e LoadLibraryA 2606 21245068696 2605->2606 2606->2603 2607->2605 2607->2606 2608 21245066dc5 2631 21245068855 2608->2631 2611 21245068855 LoadLibraryA 2612 21245066e01 2611->2612 2613 21245068855 LoadLibraryA 2612->2613 2614 21245066e17 2613->2614 2615 21245066e29 VirtualAlloc 2614->2615 2629 21245066e42 2614->2629 2616 21245066e6e 2615->2616 2615->2629 2617 21245068855 LoadLibraryA 2616->2617 2616->2629 2620 21245066ee6 2617->2620 2618 21245066f7f 2618->2629 2630 21245066ffb 2618->2630 2669 21245065d15 2618->2669 2619 21245068855 LoadLibraryA 2621 21245066f3e 2619->2621 2620->2621 2622 212450685c5 LoadLibraryA 2620->2622 2620->2629 2621->2618 2621->2619 2621->2629 2622->2620 2624 21245066fd1 2625 21245066fd5 2624->2625 2635 21245065e41 2624->2635 2625->2624 2625->2629 2630->2629 2644 212450675cd 2630->2644 2632 2124506888c 2631->2632 2633 21245066dee 2632->2633 2683 21245066361 2632->2683 2633->2611 2636 212450685c5 LoadLibraryA 2635->2636 2637 21245065e5f 2636->2637 2638 212450686ad LoadLibraryA 2637->2638 2639 21245065e74 2638->2639 2640 21245065ebe 2639->2640 2641 21245065e7c VirtualProtect 2639->2641 2640->2629 2640->2630 2641->2640 2642 21245065e96 2641->2642 2643 21245065ea8 VirtualProtect 2642->2643 2643->2640 2646 21245067622 2644->2646 2645 212450676bd NtCreateSection 2647 21245067e57 2645->2647 2649 212450676ec 2645->2649 2646->2645 2646->2647 2646->2649 2647->2629 2648 21245067792 NtMapViewOfSection 2658 212450677e5 2648->2658 2649->2647 2649->2648 2650 21245067b40 VirtualAlloc 2660 21245067bee 2650->2660 2651 212450685c5 LoadLibraryA 2651->2658 2653 212450685c5 LoadLibraryA 2659 21245067ab1 2653->2659 2654 21245067cd1 VirtualProtect 2655 21245067de5 VirtualProtect 2654->2655 2664 21245067cfb 2654->2664 2666 21245067e1b 2655->2666 2656 212450686ad LoadLibraryA 2656->2658 2657 21245067c57 NtUnmapViewOfSection 2657->2647 2661 21245067c6f NtMapViewOfSection 2657->2661 2658->2647 2658->2651 2658->2656 2658->2659 2659->2650 2659->2653 2662 212450686ad LoadLibraryA 2659->2662 2660->2654 2660->2657 2661->2647 2661->2654 2662->2659 2663 21245067ddc 2663->2655 2664->2663 2667 21245067dae VirtualProtect 2664->2667 2666->2647 2687 21245068369 2666->2687 2667->2664 2670 212450685c5 LoadLibraryA 2669->2670 2671 21245065d34 2670->2671 2672 21245065d3c 2671->2672 2673 212450686ad LoadLibraryA 2671->2673 2672->2624 2674 21245065d5b 2673->2674 2674->2672 2675 21245065d7e VirtualProtect 2674->2675 2675->2672 2676 21245065d9c 2675->2676 2677 21245065daa VirtualProtect 2676->2677 2678 212450686ad LoadLibraryA 2677->2678 2679 21245065dd2 2678->2679 2679->2672 2680 21245065ded VirtualProtect 2679->2680 2680->2672 2681 21245065e06 2680->2681 2682 21245065e14 VirtualProtect 2681->2682 2682->2672 2684 2124506643a 2683->2684 2685 212450663a3 2683->2685 2684->2632 2685->2684 2686 21245066529 LoadLibraryA 2685->2686 2686->2684 2688 212450683a5 2687->2688 2689 2124506859f 2688->2689 2690 212450686ad LoadLibraryA 2688->2690 2689->2647 2690->2688 2691 212453119dc 2692 212453119f5 __scrt_release_startup_lock 2691->2692 2692->2691 2694 21245311a40 2692->2694 2695 21245311440 2692->2695 2696 21245311451 2695->2696 2697 212453115ec SleepEx 2696->2697 2698 212453115fe 2697->2698 2698->2692
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: SectionVirtual$ProtectView$AllocCreateLibraryLoadUnmap
        • String ID: @
        • API String ID: 491204081-2766056989
        • Opcode ID: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
        • Instruction ID: 6aae8a35e39c4cbfad17aa8f5428cc249b37c88cb2b80c5170a380e2ceef6772
        • Opcode Fuzzy Hash: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
        • Instruction Fuzzy Hash: A172E634614B59CFEB69DF28C8897E973E5FBAC700F10552DE88AC7281DB30E9568B41

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 296 21245066dc5-21245066e1d call 21245068855 * 3 303 21245066e4f 296->303 304 21245066e1f-21245066e22 296->304 306 21245066e52-21245066e6d 303->306 304->303 305 21245066e24-21245066e27 304->305 305->303 307 21245066e29-21245066e40 VirtualAlloc 305->307 308 21245066e42-21245066e49 307->308 309 21245066e6e-21245066e99 call 21245068e35 call 21245068e55 307->309 308->303 310 21245066e4b 308->310 315 21245066ed6-21245066eed call 21245068855 309->315 316 21245066e9b-21245066ed0 call 21245068a55 call 212450688c9 309->316 310->303 315->303 322 21245066ef3-21245066ef4 315->322 316->315 325 21245067123-21245067134 316->325 324 21245066efa-21245066f00 322->324 326 21245066f02 324->326 327 21245066f3e-21245066f48 324->327 330 21245067136-21245067140 325->330 331 21245067167-21245067188 call 21245068e55 325->331 332 21245066f04-21245066f06 326->332 328 21245066f7f-21245066f88 327->328 329 21245066f4a-21245066f65 call 21245068855 327->329 335 21245066fa3-21245066fa6 328->335 336 21245066f8a-21245066f94 call 21245065ed1 328->336 347 21245066f67-21245066f6e 329->347 348 21245066f74-21245066f7d 329->348 330->331 337 21245067142-21245067160 call 21245068e55 330->337 360 2124506718e-21245067190 331->360 361 2124506718a 331->361 338 21245066f08-21245066f0e 332->338 339 21245066f20-21245066f22 332->339 335->325 345 21245066fac-21245066fb6 335->345 336->325 358 21245066f9a-21245066fa1 336->358 337->331 338->339 344 21245066f10-21245066f1e 338->344 339->327 346 21245066f24-21245066f3c call 212450685c5 339->346 344->332 344->339 351 21245066fb8-21245066fb9 345->351 352 21245066fc0-21245066fc7 345->352 346->324 347->325 347->348 348->328 348->329 351->352 354 21245066fc9-21245066fca 352->354 355 21245066ffb-21245066fff 352->355 359 21245066fcc call 21245065d15 354->359 362 21245067005-2124506702e 355->362 363 212450670b3-212450670bb 355->363 358->352 365 21245066fd1-21245066fd3 359->365 360->306 361->360 362->325 377 21245067034-2124506704e call 21245068e35 362->377 366 2124506710d-21245067113 call 212450675cd 363->366 367 212450670bd-212450670c3 363->367 368 21245066fd5-21245066fdc 365->368 369 21245066fe2-21245066fe5 call 21245065e41 365->369 375 21245067118-2124506711f 366->375 371 212450670c5-212450670cb 367->371 372 212450670da-212450670ec call 21245066b4d 367->372 368->325 368->369 379 21245066fea-21245066fec 369->379 371->375 376 212450670cd-212450670d8 call 2124506806d 371->376 384 212450670fe-2124506710b call 212450665d9 372->384 385 212450670ee-212450670f9 call 21245067195 372->385 375->325 380 21245067121 375->380 376->375 391 21245067050-21245067053 377->391 392 2124506706a-212450670ae 377->392 379->355 386 21245066fee-21245066ff5 379->386 380->380 384->375 385->384 386->325 386->355 391->363 393 21245067055-21245067068 call 21245068bb9 391->393 392->325 398 212450670b0-212450670b1 392->398 393->398 398->363
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
        • Instruction ID: a37c63b2e16395b922879ba7c4b2f58f27017266ed38773210545a99d142a011
        • Opcode Fuzzy Hash: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
        • Instruction Fuzzy Hash: 0DC19A34314D19CBEB68DF28C4997E9B3D5FFAC700F145129E48AC7186DB24E96AC781

        Control-flow Graph

        Memory Dump Source
        • Source File: 00000003.00000002.3337913570.0000021245311000.00000020.10000000.00040000.00000000.sdmp, Offset: 0000021245311000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245311000_sdiagnhost.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
        • Instruction ID: c0ee8bb3560add537958022b5998126f99f73a65023186e7f6d2feb41d1cb63e
        • Opcode Fuzzy Hash: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
        • Instruction Fuzzy Hash: 4671957061CB488FEB59EF6898493A977D5FBA9300F00465EE48BC3296DF74D8068786

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual$LibraryLoad
        • String ID:
        • API String ID: 895956442-0
        • Opcode ID: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
        • Instruction ID: 6f4b5c65f1948a6dfb0839e690bb3b27988beadabc23dac9b40f9615d4c143d9
        • Opcode Fuzzy Hash: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
        • Instruction Fuzzy Hash: 2C31AA35718A184FDB68EE1898497AA73DDEBE8710F00156DBC8FC32C9DD64DD1A46C1

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
        • Instruction ID: 56d25c7cc0ebd556e29348614b7c6a5fa70dc7141c9c344f0400972d0dbeb6f8
        • Opcode Fuzzy Hash: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
        • Instruction Fuzzy Hash: CD21A83570CA188BDB68AE5CA85939973D9EBE8710F10156DFC8FC32CADD24DD1646C1

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3337913570.0000021245311000.00000020.10000000.00040000.00000000.sdmp, Offset: 0000021245311000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245311000_sdiagnhost.jbxd
        Similarity
        • API ID: Sleep
        • String ID: HCMU
        • API String ID: 3472027048-1408108644
        • Opcode ID: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
        • Instruction ID: 2b76b6ce4cf7e78dea2e42313e9fbd346ddd03a0902557706ebbab876e61f8fe
        • Opcode Fuzzy Hash: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
        • Instruction Fuzzy Hash: 31611730928E088BEF19AF38988D3E9B6D5FBA9310F504659F49AC31D7DA34DC958781

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 269 212450685c5-212450685e1 270 212450685e3-212450685e7 269->270 271 212450685fc-2124506860b 269->271 270->271 272 212450685e9-212450685fa 270->272 273 21245068637-21245068649 271->273 274 2124506860d-21245068632 271->274 272->270 272->271 275 2124506864c-21245068653 273->275 274->273 276 21245068655-21245068664 275->276 277 2124506868e-21245068693 LoadLibraryA 275->277 278 21245068666-2124506867f call 21245068e91 276->278 279 21245068681-21245068687 276->279 280 21245068696-212450686a5 277->280 278->279 284 212450686a6-212450686a9 278->284 279->275 282 21245068689-2124506868c 279->282 282->277 282->280 284->280
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID: l
        • API String ID: 1029625771-2517025534
        • Opcode ID: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
        • Instruction ID: 74eb64707c49f546bcf3fcb4a9b20fca511d7a71c24b1cbd886c64964cbd16a9
        • Opcode Fuzzy Hash: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
        • Instruction Fuzzy Hash: DC31C634518B958FE765DB2CC048B65BBD9FFAD308F2466BCE1DAC7192D720D80A8701

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual$LibraryLoad
        • String ID:
        • API String ID: 895956442-0
        • Opcode ID: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
        • Instruction ID: 698c1d0b644be22b73c8047306e314b10703b51faf3b8ac098f6cbd46f7ee5a8
        • Opcode Fuzzy Hash: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
        • Instruction Fuzzy Hash: 6511A534318B188BDBA8EF1898896AA73D9FBEC700F401569BC8AC7249DE20DD458781
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f830e609fe5cee47e6c16999e452ce305c1c12be961c10b305ce6362bf0b176d
        • Instruction ID: bebec9b8619046d81a28f91d9835a96c2c97c895207d1f961fa11bebaa181783
        • Opcode Fuzzy Hash: f830e609fe5cee47e6c16999e452ce305c1c12be961c10b305ce6362bf0b176d
        • Instruction Fuzzy Hash: 0652BF75504311EFEB60DF14C848BABBBE9EF98B10F04592DF9859B282D730E868CB51
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1d4d866763d3bed20dc280203f6102a30c73feaa7c60b621d7a564ee5d7695d8
        • Instruction ID: 9d81db0a46d98090d0d819943d74d468d5ec3778eacc55dfa4420462f718bc72
        • Opcode Fuzzy Hash: 1d4d866763d3bed20dc280203f6102a30c73feaa7c60b621d7a564ee5d7695d8
        • Instruction Fuzzy Hash: 75E17534718A598BEB68DF6898997EEB7E5FF58701F00522DE88AC3240DF30E955C781
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
        • Instruction ID: 787ed051c806f1397fde7409f43cb47622a372eafedad5803aae98eaf9c98e31
        • Opcode Fuzzy Hash: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
        • Instruction Fuzzy Hash: AFE17F31518B188FDB59EF28C889AEA77E5FF98300F10466DE88AC7155DF30E945CB82
        Memory Dump Source
        • Source File: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000021245060000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_21245060000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 55def3579c95d66bb74bd3e75744c244041454eda364e5e205e1004b0ebe1f4c
        • Instruction ID: db00363d20c07d3dca5a1bac3bfb7582f20fe34386264a2e0a8fb61c339333f5
        • Opcode Fuzzy Hash: 55def3579c95d66bb74bd3e75744c244041454eda364e5e205e1004b0ebe1f4c
        • Instruction Fuzzy Hash: DCA12F31508A1C8FDB65EF28C889BDA77E9FF68315F10466EE44AC7161EB30D654CB81

        Execution Graph

        Execution Coverage:11.2%
        Dynamic/Decrypted Code Coverage:7.1%
        Signature Coverage:0%
        Total number of Nodes:99
        Total number of Limit Nodes:6
        execution_graph 2585 1e9b9c35d84 VirtualProtect 2586 1e9b9c35d9c 2585->2586 2593 1e9b9c35d3c 2585->2593 2587 1e9b9c35daa VirtualProtect 2586->2587 2594 1e9b9c386ad 2587->2594 2590 1e9b9c35ded VirtualProtect 2591 1e9b9c35e06 2590->2591 2590->2593 2592 1e9b9c35e14 VirtualProtect 2591->2592 2592->2593 2595 1e9b9c386e3 2594->2595 2596 1e9b9c35dd2 2594->2596 2595->2596 2598 1e9b9c36529 2595->2598 2596->2590 2596->2593 2600 1e9b9c3656c 2598->2600 2603 1e9b9c36595 2598->2603 2599 1e9b9c365a5 2599->2596 2600->2599 2602 1e9b9c386ad LoadLibraryA 2600->2602 2600->2603 2602->2600 2603->2599 2604 1e9b9c385c5 2603->2604 2606 1e9b9c385e3 2604->2606 2605 1e9b9c3868e LoadLibraryA 2607 1e9b9c38696 2605->2607 2606->2605 2606->2607 2607->2599 2608 1e9b9ed19dc 2609 1e9b9ed19f5 __scrt_release_startup_lock 2608->2609 2609->2608 2611 1e9b9ed1a40 2609->2611 2612 1e9b9ed1440 2609->2612 2613 1e9b9ed1451 2612->2613 2614 1e9b9ed15ec SleepEx 2613->2614 2615 1e9b9ed15fe 2614->2615 2615->2609 2616 1e9b9c36dc5 2639 1e9b9c38855 2616->2639 2619 1e9b9c38855 LoadLibraryA 2620 1e9b9c36e01 2619->2620 2621 1e9b9c38855 LoadLibraryA 2620->2621 2622 1e9b9c36e17 2621->2622 2623 1e9b9c36e29 VirtualAlloc 2622->2623 2637 1e9b9c36e42 2622->2637 2625 1e9b9c36e6e 2623->2625 2623->2637 2624 1e9b9c38855 LoadLibraryA 2626 1e9b9c36ee6 2624->2626 2625->2624 2625->2637 2627 1e9b9c36f3e 2626->2627 2630 1e9b9c385c5 LoadLibraryA 2626->2630 2626->2637 2628 1e9b9c38855 LoadLibraryA 2627->2628 2629 1e9b9c36f7f 2627->2629 2627->2637 2628->2627 2629->2637 2638 1e9b9c36ffb 2629->2638 2677 1e9b9c35d15 2629->2677 2630->2626 2632 1e9b9c36fd1 2633 1e9b9c36fd5 2632->2633 2643 1e9b9c35e41 2632->2643 2633->2632 2633->2637 2638->2637 2652 1e9b9c375cd 2638->2652 2640 1e9b9c3888c 2639->2640 2641 1e9b9c36dee 2640->2641 2691 1e9b9c36361 2640->2691 2641->2619 2644 1e9b9c385c5 LoadLibraryA 2643->2644 2645 1e9b9c35e5f 2644->2645 2646 1e9b9c386ad LoadLibraryA 2645->2646 2647 1e9b9c35e74 2646->2647 2648 1e9b9c35e7c VirtualProtect 2647->2648 2649 1e9b9c35ebe 2647->2649 2648->2649 2650 1e9b9c35e96 2648->2650 2649->2637 2649->2638 2651 1e9b9c35ea8 VirtualProtect 2650->2651 2651->2649 2653 1e9b9c37622 2652->2653 2654 1e9b9c376bd NtCreateSection 2653->2654 2656 1e9b9c376ec 2653->2656 2676 1e9b9c37e57 2653->2676 2654->2656 2654->2676 2655 1e9b9c37792 NtMapViewOfSection 2661 1e9b9c377e5 2655->2661 2656->2655 2656->2676 2657 1e9b9c37ab1 2658 1e9b9c37b40 VirtualAlloc 2657->2658 2662 1e9b9c385c5 LoadLibraryA 2657->2662 2671 1e9b9c386ad LoadLibraryA 2657->2671 2664 1e9b9c37bee 2658->2664 2659 1e9b9c385c5 LoadLibraryA 2659->2661 2661->2657 2661->2659 2667 1e9b9c386ad LoadLibraryA 2661->2667 2661->2676 2662->2657 2663 1e9b9c37cd1 VirtualProtect 2665 1e9b9c37de5 VirtualProtect 2663->2665 2672 1e9b9c37cfb 2663->2672 2664->2663 2666 1e9b9c37c57 NtUnmapViewOfSection 2664->2666 2669 1e9b9c37e1b 2665->2669 2668 1e9b9c37c6f NtMapViewOfSection 2666->2668 2666->2676 2667->2661 2668->2663 2668->2676 2669->2676 2695 1e9b9c38369 2669->2695 2670 1e9b9c37ddc 2670->2665 2671->2657 2672->2670 2674 1e9b9c37dae VirtualProtect 2672->2674 2674->2672 2676->2637 2678 1e9b9c385c5 LoadLibraryA 2677->2678 2679 1e9b9c35d34 2678->2679 2680 1e9b9c35d3c 2679->2680 2681 1e9b9c386ad LoadLibraryA 2679->2681 2680->2632 2682 1e9b9c35d5b 2681->2682 2682->2680 2683 1e9b9c35d7e VirtualProtect 2682->2683 2683->2680 2684 1e9b9c35d9c 2683->2684 2685 1e9b9c35daa VirtualProtect 2684->2685 2686 1e9b9c386ad LoadLibraryA 2685->2686 2687 1e9b9c35dd2 2686->2687 2687->2680 2688 1e9b9c35ded VirtualProtect 2687->2688 2688->2680 2689 1e9b9c35e06 2688->2689 2690 1e9b9c35e14 VirtualProtect 2689->2690 2690->2680 2692 1e9b9c363a3 2691->2692 2694 1e9b9c3643a 2691->2694 2693 1e9b9c36529 LoadLibraryA 2692->2693 2692->2694 2693->2694 2694->2640 2696 1e9b9c383a5 2695->2696 2697 1e9b9c3859f 2696->2697 2698 1e9b9c386ad LoadLibraryA 2696->2698 2697->2676 2698->2696
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E9B9C30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9c30000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: SectionVirtual$ProtectView$AllocCreateLibraryLoadUnmap
        • String ID: @
        • API String ID: 491204081-2766056989
        • Opcode ID: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
        • Instruction ID: 09c33c393e9412e1fee5b9317c5624999a92e642fc97bafaaf604b9ad95b972e
        • Opcode Fuzzy Hash: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
        • Instruction Fuzzy Hash: BD72C830628B498FEB69DF28D886BED73E1FB98314F24452DD84EC7291DB34E9428741

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 296 1e9b9c36dc5-1e9b9c36e1d call 1e9b9c38855 * 3 303 1e9b9c36e4f 296->303 304 1e9b9c36e1f-1e9b9c36e22 296->304 306 1e9b9c36e52-1e9b9c36e6d 303->306 304->303 305 1e9b9c36e24-1e9b9c36e27 304->305 305->303 307 1e9b9c36e29-1e9b9c36e40 VirtualAlloc 305->307 308 1e9b9c36e6e-1e9b9c36e99 call 1e9b9c38e35 call 1e9b9c38e55 307->308 309 1e9b9c36e42-1e9b9c36e49 307->309 315 1e9b9c36e9b-1e9b9c36ed0 call 1e9b9c38a55 call 1e9b9c388c9 308->315 316 1e9b9c36ed6-1e9b9c36eed call 1e9b9c38855 308->316 309->303 310 1e9b9c36e4b 309->310 310->303 315->316 325 1e9b9c37123-1e9b9c37134 315->325 316->303 322 1e9b9c36ef3-1e9b9c36ef4 316->322 324 1e9b9c36efa-1e9b9c36f00 322->324 326 1e9b9c36f3e-1e9b9c36f48 324->326 327 1e9b9c36f02 324->327 330 1e9b9c37167-1e9b9c37188 call 1e9b9c38e55 325->330 331 1e9b9c37136-1e9b9c37140 325->331 328 1e9b9c36f4a-1e9b9c36f65 call 1e9b9c38855 326->328 329 1e9b9c36f7f-1e9b9c36f88 326->329 332 1e9b9c36f04-1e9b9c36f06 327->332 347 1e9b9c36f74-1e9b9c36f7d 328->347 348 1e9b9c36f67-1e9b9c36f6e 328->348 335 1e9b9c36f8a-1e9b9c36f94 call 1e9b9c35ed1 329->335 336 1e9b9c36fa3-1e9b9c36fa6 329->336 360 1e9b9c3718a 330->360 361 1e9b9c3718e-1e9b9c37190 330->361 331->330 337 1e9b9c37142-1e9b9c37160 call 1e9b9c38e55 331->337 338 1e9b9c36f20-1e9b9c36f22 332->338 339 1e9b9c36f08-1e9b9c36f0e 332->339 335->325 355 1e9b9c36f9a-1e9b9c36fa1 335->355 336->325 345 1e9b9c36fac-1e9b9c36fb6 336->345 337->330 338->326 346 1e9b9c36f24-1e9b9c36f3c call 1e9b9c385c5 338->346 339->338 344 1e9b9c36f10-1e9b9c36f1e 339->344 344->332 344->338 351 1e9b9c36fc0-1e9b9c36fc7 345->351 352 1e9b9c36fb8-1e9b9c36fb9 345->352 346->324 347->328 347->329 348->325 348->347 356 1e9b9c36ffb-1e9b9c36fff 351->356 357 1e9b9c36fc9-1e9b9c36fca 351->357 352->351 355->351 362 1e9b9c370b3-1e9b9c370bb 356->362 363 1e9b9c37005-1e9b9c3702e 356->363 359 1e9b9c36fcc call 1e9b9c35d15 357->359 365 1e9b9c36fd1-1e9b9c36fd3 359->365 360->361 361->306 366 1e9b9c3710d-1e9b9c37113 call 1e9b9c375cd 362->366 367 1e9b9c370bd-1e9b9c370c3 362->367 363->325 377 1e9b9c37034-1e9b9c3704e call 1e9b9c38e35 363->377 368 1e9b9c36fe2-1e9b9c36fe5 call 1e9b9c35e41 365->368 369 1e9b9c36fd5-1e9b9c36fdc 365->369 375 1e9b9c37118-1e9b9c3711f 366->375 371 1e9b9c370da-1e9b9c370ec call 1e9b9c36b4d 367->371 372 1e9b9c370c5-1e9b9c370cb 367->372 379 1e9b9c36fea-1e9b9c36fec 368->379 369->325 369->368 387 1e9b9c370fe-1e9b9c3710b call 1e9b9c365d9 371->387 388 1e9b9c370ee-1e9b9c370f9 call 1e9b9c37195 371->388 372->375 376 1e9b9c370cd-1e9b9c370d8 call 1e9b9c3806d 372->376 375->325 380 1e9b9c37121 375->380 376->375 391 1e9b9c3706a-1e9b9c370ae 377->391 392 1e9b9c37050-1e9b9c37053 377->392 379->356 384 1e9b9c36fee-1e9b9c36ff5 379->384 380->380 384->325 384->356 387->375 388->387 391->325 398 1e9b9c370b0-1e9b9c370b1 391->398 392->362 394 1e9b9c37055-1e9b9c37068 call 1e9b9c38bb9 392->394 394->398 398->362
        APIs
        Memory Dump Source
        • Source File: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E9B9C30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9c30000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
        • Instruction ID: 4c306becc3c5737bf2b657d11b728479e0e78655af91ef4d4e56bf654745864b
        • Opcode Fuzzy Hash: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
        • Instruction Fuzzy Hash: C9C1AA31328D495BEB59EB28E597BEDB3E1FB98300F284129DC4EC7295DB34E8058781

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E9B9C30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9c30000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual$LibraryLoad
        • String ID:
        • API String ID: 895956442-0
        • Opcode ID: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
        • Instruction ID: dcad4d86adef3cb6e0da3d8f6f03eed98cecbeb4158516b069fcfad036b93776
        • Opcode Fuzzy Hash: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
        • Instruction Fuzzy Hash: 6E31563172CA484BE758BA58E8567AE73D5E7C4360F14066DAC4FC32CAED74DD0686C1

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E9B9C30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9c30000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
        • Instruction ID: b3126b570ec8c66641ebafb0f4f434fcaa322badc393c7497f5e2804c34a10c8
        • Opcode Fuzzy Hash: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
        • Instruction Fuzzy Hash: 87218E3132CA484BDB68BA5CF8567AD73D5E7C8760F14056AAC4FC32CADD78DD024686

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000006.00000002.3337891605.000001E9B9ED1000.00000020.10000000.00040000.00000000.sdmp, Offset: 000001E9B9ED1000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9ed1000_sdiagnhost.jbxd
        Similarity
        • API ID: Sleep
        • String ID: HCMU
        • API String ID: 3472027048-1408108644
        • Opcode ID: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
        • Instruction ID: 8c9d11e8edc3756c7690da59404f78659e263a072b78f00828c2119f531e63b1
        • Opcode Fuzzy Hash: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
        • Instruction Fuzzy Hash: A161F830938E884FEB18AF68E489BED72D1FF59310F58C659F85AC71D6DA34D8808781

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 269 1e9b9c385c5-1e9b9c385e1 270 1e9b9c385fc-1e9b9c3860b 269->270 271 1e9b9c385e3-1e9b9c385e7 269->271 273 1e9b9c3860d-1e9b9c38632 270->273 274 1e9b9c38637-1e9b9c38649 270->274 271->270 272 1e9b9c385e9-1e9b9c385fa 271->272 272->270 272->271 273->274 275 1e9b9c3864c-1e9b9c38653 274->275 276 1e9b9c3868e-1e9b9c38693 LoadLibraryA 275->276 277 1e9b9c38655-1e9b9c38664 275->277 280 1e9b9c38696-1e9b9c386a5 276->280 278 1e9b9c38681-1e9b9c38687 277->278 279 1e9b9c38666-1e9b9c3867f call 1e9b9c38e91 277->279 278->275 282 1e9b9c38689-1e9b9c3868c 278->282 279->278 284 1e9b9c386a6-1e9b9c386a9 279->284 282->276 282->280 284->280
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E9B9C30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9c30000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoad
        • String ID: l
        • API String ID: 1029625771-2517025534
        • Opcode ID: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
        • Instruction ID: 223ef76ac060a26e3ba8f8e1db34c5f994a307922788fed3619cdf1c27b01bd6
        • Opcode Fuzzy Hash: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
        • Instruction Fuzzy Hash: 5331B43052CAC54FE755DB2CD044BA9BBE5FBA9308F2856ACC4DEC7192D734D8068B05

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E9B9C30000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_6_2_1e9b9c30000_sdiagnhost.jbxd
        Yara matches
        Similarity
        • API ID: ProtectVirtual$LibraryLoad
        • String ID:
        • API String ID: 895956442-0
        • Opcode ID: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
        • Instruction ID: 2ef2756e997e6ee2b543e8b838ec741f59f4cb56e4a2cd8f9f2bbd08fa092e0c
        • Opcode Fuzzy Hash: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
        • Instruction Fuzzy Hash: 6611A53072CA484BDB94EB18E886AAE73E5FBD8341F04056AAC4EC7289DE34DD418781