Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ne7qNMCeuy.exe

Overview

General Information

Sample name:Ne7qNMCeuy.exe
renamed because original name is a hash value
Original sample name:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398.exe
Analysis ID:1563003
MD5:67e493d4df06f65cfb94bf984ef60720
SHA1:2db550dc9833b9b9b65108f43bf4cbe9f75f1ab3
SHA256:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398
Tags:148-135-121-165exeuser-JAMESWT_MHT
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains long sleeps (>= 3 min)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • Ne7qNMCeuy.exe (PID: 4140 cmdline: "C:\Users\user\Desktop\Ne7qNMCeuy.exe" MD5: 67E493D4DF06F65CFB94BF984EF60720)
    • conhost.exe (PID: 4972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Ne7qNMCeuy.exeReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.5% probability
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.6:49707 version: TLS 1.2
Source: Ne7qNMCeuy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Ne7qNMCeuy.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Ne7qNMCeuy.exe
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: Ne7qNMCeuy.exe, 00000000.00000002.3388500976.0000020AC6CF6000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761897028.0000020AC6CF6000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000002.3388350376.0000020AC6CBE000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761926981.0000020AC6CBA000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2760964737.0000020AC6CF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3
Source: Ne7qNMCeuy.exe, 00000000.00000002.3388484943.0000020AC6CE0000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761023739.0000020AC6CDE000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761393363.0000020AC6CDE000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761674523.0000020AC6CDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/dM
Source: Ne7qNMCeuy.exe, 00000000.00000003.2761954829.0000020AC6CFA000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761249265.0000020AC6CF9000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2760964737.0000020AC6CF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.6:49707 version: TLS 1.2
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF63A3511C00_2_00007FF63A3511C0
Source: classification engineClassification label: mal52.winEXE@2/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4972:120:WilError_03
Source: Ne7qNMCeuy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Ne7qNMCeuy.exeReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Users\user\Desktop\Ne7qNMCeuy.exe "C:\Users\user\Desktop\Ne7qNMCeuy.exe"
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeSection loaded: dpapi.dllJump to behavior
Source: Ne7qNMCeuy.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Ne7qNMCeuy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Ne7qNMCeuy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: Ne7qNMCeuy.exe
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: Ne7qNMCeuy.exe
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Ne7qNMCeuy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe TID: 2924Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exe TID: 3004Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: Ne7qNMCeuy.exe, 00000000.00000002.3388529307.0000020AC6D06000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2161023395.0000020AC6D06000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761487945.0000020AC6D06000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWs
Source: Ne7qNMCeuy.exe, 00000000.00000003.2761941509.0000020AC6D0A000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761926981.0000020AC6CBA000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2161023395.0000020AC6D06000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761487945.0000020AC6D06000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF63A352098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63A352098
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF63A352098 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63A352098
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF63A35223C SetUnhandledExceptionFilter,0_2_00007FF63A35223C
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF63A351B6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF63A351B6C
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeCode function: 0_2_00007FF63A351F70 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF63A351F70
Source: C:\Users\user\Desktop\Ne7qNMCeuy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Ne7qNMCeuy.exe26%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://148.135.121.165/dM0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30%Avira URL Cloudsafe
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeacNe7qNMCeuy.exe, 00000000.00000003.2761954829.0000020AC6CFA000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761249265.0000020AC6CF9000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2760964737.0000020AC6CF4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/dMNe7qNMCeuy.exe, 00000000.00000002.3388484943.0000020AC6CE0000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761023739.0000020AC6CDE000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761393363.0000020AC6CDE000.00000004.00000020.00020000.00000000.sdmp, Ne7qNMCeuy.exe, 00000000.00000003.2761674523.0000020AC6CDF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
148.135.121.165
unknownSweden
158ERI-ASUSfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1563003
Start date and time:2024-11-26 11:37:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Ne7qNMCeuy.exe
renamed because original name is a hash value
Original Sample Name:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398.exe
Detection:MAL
Classification:mal52.winEXE@2/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Ne7qNMCeuy.exe
TimeTypeDescription
05:38:07API Interceptor1x Sleep call for process: Ne7qNMCeuy.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
ERI-ASUSla.bot.sh4.elfGet hashmaliciousUnknownBrowse
  • 150.132.118.42
loligang.ppc.elfGet hashmaliciousMiraiBrowse
  • 147.214.206.40
apep.x86.elfGet hashmaliciousMiraiBrowse
  • 131.168.79.136
zgp.elfGet hashmaliciousMiraiBrowse
  • 148.135.186.71
arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 169.144.189.36
x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 129.200.252.43
arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 169.144.206.208
yakuza.i586.elfGet hashmaliciousMiraiBrowse
  • 161.37.102.84
x86.elfGet hashmaliciousMirai, MoobotBrowse
  • 147.214.205.2
owari.arm7.elfGet hashmaliciousMiraiBrowse
  • 136.225.157.189
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
72a589da586844d7f0818ce684948eeaLgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
file.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
bQ7r31F9Ow.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
LbzlI5idGJ.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
PGUs9p74si.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
IpYWCeJMsb.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
Wd7eNVLo7b.exeGet hashmaliciousSmokeLoaderBrowse
  • 148.135.121.165
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):4.672068713963183
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Ne7qNMCeuy.exe
File size:18'232 bytes
MD5:67e493d4df06f65cfb94bf984ef60720
SHA1:2db550dc9833b9b9b65108f43bf4cbe9f75f1ab3
SHA256:884b2dca156a08177d0b717955790255b3504f9113f72827f6766faa563e5398
SHA512:d86d038d85b889bfa696fd2e95f436ae8799f0840815fa651f6715e2550fed00851397684ed2f2d1165571eafd796f5182219ddce6f35fae792c5cbfcc757c74
SSDEEP:192:MHocDdqWYMmKeObo0eZSC+SrvfTtt+pkSv56t+E3Q5XfMcQu:MHocRqRy+KSrvfBt05B6tP3/u
TLSH:08821A4AAB564DE9D436C13DC573492BE5B2B1105722DBCF63908A2E1EB73C0BC36E46
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......mse.)...)...)... j..#...9...*...9...#...9...2...9.../...bj..,...).......b...(...b...(...b...(...Rich)...........PE..d...+%2g...
Icon Hash:00928e8e8686b000
Entrypoint:0x140001b58
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6732252B [Mon Nov 11 15:39:23 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:cc3f5f44573b1ef710307611a33ec304
Instruction
dec eax
sub esp, 28h
call 00007FD88D0EE4D4h
dec eax
add esp, 28h
jmp 00007FD88D0EDF37h
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [000014A3h]
dec eax
mov ecx, ebx
call dword ptr [00001492h]
call dword ptr [0000149Ch]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00001490h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [00001484h]
test eax, eax
je 00007FD88D0EE0C9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [000035FAh]
call 00007FD88D0EE16Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [000036E1h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [00003671h], eax
dec eax
mov eax, dword ptr [000036CAh]
dec eax
mov dword ptr [0000353Bh], eax
dec eax
mov eax, dword ptr [esp+40h]
dec eax
mov dword ptr [0000363Fh], eax
mov dword ptr [00003515h], C0000409h
mov dword ptr [0000350Fh], 00000001h
mov dword ptr [00003519h], 00000001h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3f8c0xdc.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x240.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x58.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x36200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x258.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x18620x1a003272278371367b7d4aee9475cbb796b4False0.6045673076923077data5.950501702710063IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x18dc0x1a008f7a1294d8cd43ac7ee0f20424ca46d4False0.37259615384615385data3.9662390155216176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x7200x200144ab6bfe6bb39ce984c043b4aeb0c6fFalse0.23046875data2.0665233777045033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x60000x2400x4008646266eb1c41a7986c2e9ef88849c46False0.3115234375data2.449887087720597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x580x2000433091c18d69714fe1dcae46953db17False0.19921875data1.1833113271125035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllSleep, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlCaptureContext
MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z
WINHTTP.dllWinHttpReadData, WinHttpReceiveResponse, WinHttpOpenRequest, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpAddRequestHeaders, WinHttpCloseHandle, WinHttpSendRequest, WinHttpSetOption, WinHttpConnect
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll_CxxThrowException, __current_exception, __current_exception_context, memset, __std_exception_destroy, memchr, memcpy, __C_specific_handler, __std_exception_copy, memmove
api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, terminate, _c_exit, _cexit, _register_onexit_function, _set_app_type, _seh_filter_exe, _initialize_onexit_table, _invalid_parameter_noinfo_noreturn, __p___argv, __p___argc, _exit, _register_thread_local_exe_atexit_callback, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _crt_atexit, _configure_narrow_argv
api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free, _callnewh, malloc
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Nov 26, 2024 11:38:06.239538908 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:06.239595890 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:06.239674091 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:06.241828918 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:06.241842031 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:07.711747885 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:07.711910009 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:07.743979931 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:07.743990898 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:07.744234085 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:07.784166098 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:08.023391962 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:08.071346998 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:08.414241076 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:08.414298058 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:08.414390087 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:08.438395023 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:08.438405991 CET44349707148.135.121.165192.168.2.6
Nov 26, 2024 11:38:08.438431978 CET49707443192.168.2.6148.135.121.165
Nov 26, 2024 11:38:08.438436985 CET44349707148.135.121.165192.168.2.6
  • 148.135.121.165
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.649707148.135.121.1654434140C:\Users\user\Desktop\Ne7qNMCeuy.exe
TimestampBytes transferredDirectionData
2024-11-26 10:38:08 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
Connection: Keep-Alive
Content-Type: text/plain
User-Agent: HCMUS-CTF Botnet
Host: 148.135.121.165
2024-11-26 10:38:08 UTC192INHTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Tue, 26 Nov 2024 10:38:08 GMT
Content-Type: application/octet-stream
Content-Length: 93
Connection: close
Content-Type: text/plain
2024-11-26 10:38:08 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:05:38:05
Start date:26/11/2024
Path:C:\Users\user\Desktop\Ne7qNMCeuy.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\Ne7qNMCeuy.exe"
Imagebase:0x7ff63a350000
File size:18'232 bytes
MD5 hash:67E493D4DF06F65CFB94BF984EF60720
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:2
Start time:05:38:05
Start date:26/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:22.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:21%
    Total number of Nodes:143
    Total number of Limit Nodes:1
    execution_graph 482 7ff63a3519dc 483 7ff63a3519f5 482->483 484 7ff63a3519fd 483->484 485 7ff63a351b33 483->485 487 7ff63a351b3d 484->487 492 7ff63a351a1b __scrt_release_startup_lock 484->492 521 7ff63a352098 IsProcessorFeaturePresent 485->521 488 7ff63a352098 9 API calls 487->488 489 7ff63a351b48 488->489 491 7ff63a351b50 _exit 489->491 490 7ff63a351a40 492->490 493 7ff63a351ac6 _get_initial_narrow_environment __p___argv __p___argc 492->493 496 7ff63a351abe _register_thread_local_exe_atexit_callback 492->496 502 7ff63a351440 493->502 496->493 499 7ff63a351af3 500 7ff63a351afd 499->500 501 7ff63a351af8 _cexit 499->501 500->490 501->500 503 7ff63a3514a0 502->503 505 7ff63a351576 memchr 503->505 506 7ff63a3515d5 Sleep 503->506 507 7ff63a3515e5 _invalid_parameter_noinfo_noreturn 503->507 508 7ff63a351880 free 503->508 509 7ff63a3515ec SleepEx 503->509 510 7ff63a3515a0 memchr 503->510 527 7ff63a3511c0 WinHttpOpen 503->527 505->503 505->506 506->503 507->509 508->503 511 7ff63a351632 509->511 512 7ff63a3515fe 509->512 510->503 513 7ff63a3515bc Sleep 510->513 551 7ff63a351860 511->551 514 7ff63a35162a 512->514 516 7ff63a351623 _invalid_parameter_noinfo_noreturn 512->516 513->503 548 7ff63a351880 514->548 516->514 519 7ff63a3521e8 GetModuleHandleW 520 7ff63a351aef 519->520 520->489 520->499 522 7ff63a3520be 521->522 523 7ff63a3520cc memset RtlCaptureContext RtlLookupFunctionEntry 522->523 524 7ff63a352106 RtlVirtualUnwind 523->524 525 7ff63a352142 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 523->525 524->525 526 7ff63a3521c2 525->526 526->487 528 7ff63a351295 WinHttpSetOption 527->528 529 7ff63a351245 WinHttpConnect 527->529 530 7ff63a3513eb 528->530 531 7ff63a3512bf WinHttpAddRequestHeaders WinHttpSendRequest 528->531 529->528 532 7ff63a351266 WinHttpOpenRequest 529->532 535 7ff63a3513f9 530->535 536 7ff63a3513f0 WinHttpCloseHandle 530->536 533 7ff63a3513e2 WinHttpCloseHandle 531->533 534 7ff63a351303 WinHttpReceiveResponse 531->534 532->528 533->530 534->533 537 7ff63a351316 534->537 538 7ff63a351407 535->538 539 7ff63a3513fe WinHttpCloseHandle 535->539 536->535 537->533 540 7ff63a351320 WinHttpQueryDataAvailable 537->540 545 7ff63a351880 free 537->545 546 7ff63a3513a4 memcpy 537->546 567 7ff63a3516c0 537->567 541 7ff63a351860 8 API calls 538->541 539->538 560 7ff63a3518c4 540->560 543 7ff63a351417 541->543 543->503 545->537 546->537 549 7ff63a351ce8 free 548->549 552 7ff63a351869 551->552 553 7ff63a351641 552->553 554 7ff63a351ba0 IsProcessorFeaturePresent 552->554 553->519 555 7ff63a351bb8 554->555 591 7ff63a351c74 RtlCaptureContext 555->591 563 7ff63a351888 malloc 560->563 562 7ff63a35133e memset WinHttpReadData 562->537 563->562 566 7ff63a351893 563->566 566->560 566->563 583 7ff63a351d10 566->583 586 7ff63a351100 566->586 568 7ff63a351843 567->568 571 7ff63a3516ee 567->571 590 7ff63a3511a0 ?_Xlength_error@std@@YAXPEBD 568->590 570 7ff63a351848 573 7ff63a351100 Concurrency::cancel_current_task __std_exception_copy 570->573 571->570 572 7ff63a35173e 571->572 574 7ff63a3517fc _invalid_parameter_noinfo_noreturn 572->574 576 7ff63a351803 572->576 577 7ff63a3517af memcpy memcpy 572->577 575 7ff63a35184e 573->575 574->576 580 7ff63a35180b memcpy 576->580 578 7ff63a3517da 577->578 579 7ff63a3517ef 577->579 578->574 578->579 581 7ff63a351880 free 579->581 582 7ff63a3517fa 580->582 581->582 582->537 589 7ff63a351cf0 583->589 585 7ff63a351d1e _CxxThrowException 587 7ff63a35110e Concurrency::cancel_current_task 586->587 588 7ff63a35111f __std_exception_copy 587->588 588->566 589->585 592 7ff63a351c8e RtlLookupFunctionEntry 591->592 593 7ff63a351bcb 592->593 594 7ff63a351ca4 RtlVirtualUnwind 592->594 595 7ff63a351b6c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 593->595 594->592 594->593 596 7ff63a3518f8 597 7ff63a351908 596->597 609 7ff63a351da8 597->609 599 7ff63a352098 9 API calls 600 7ff63a3519ad 599->600 601 7ff63a35192c _RTC_Initialize 607 7ff63a35198f 601->607 617 7ff63a352030 InitializeSListHead 601->617 607->599 608 7ff63a35199d 607->608 610 7ff63a351db9 609->610 611 7ff63a351deb 609->611 612 7ff63a351e28 610->612 615 7ff63a351dbe __scrt_release_startup_lock 610->615 611->601 613 7ff63a352098 9 API calls 612->613 614 7ff63a351e32 613->614 615->611 616 7ff63a351ddb _initialize_onexit_table 615->616 616->611 618 7ff63a351b58 621 7ff63a351f70 618->621 622 7ff63a351b61 621->622 623 7ff63a351f93 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 621->623 623->622 624 7ff63a351000 __std_exception_copy 625 7ff63a3519c0 629 7ff63a35223c SetUnhandledExceptionFilter 625->629 630 7ff63a3526c0 631 7ff63a3526f8 __GSHandlerCheckCommon 630->631 632 7ff63a352713 __CxxFrameHandler4 631->632 633 7ff63a352724 631->633 632->633 634 7ff63a351060 __std_exception_destroy 635 7ff63a351088 634->635 636 7ff63a351095 634->636 637 7ff63a351880 free 635->637 637->636 639 7ff63a351b0a 640 7ff63a3521e8 GetModuleHandleW 639->640 641 7ff63a351b11 640->641 642 7ff63a351b50 _exit 641->642 643 7ff63a351b15 641->643 644 7ff63a35282c _seh_filter_exe 645 7ff63a3518cc 646 7ff63a3518e4 645->646 647 7ff63a3518ee 645->647 648 7ff63a351880 free 646->648 648->647 649 7ff63a3510b0 __std_exception_destroy 650 7ff63a3527f0 651 7ff63a352803 650->651 652 7ff63a352810 650->652 654 7ff63a351660 651->654 655 7ff63a35169f 654->655 656 7ff63a351673 654->656 655->652 657 7ff63a351697 656->657 658 7ff63a3516b8 _invalid_parameter_noinfo_noreturn 656->658 659 7ff63a351880 free 657->659 659->655

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF63A3518F8 9 Function_00007FF63A35201C 0->9 11 Function_00007FF63A352098 0->11 13 Function_00007FF63A352020 0->13 17 Function_00007FF63A3522A8 0->17 18 Function_00007FF63A351DA8 0->18 19 Function_00007FF63A352028 0->19 22 Function_00007FF63A352030 0->22 25 Function_00007FF63A352044 0->25 28 Function_00007FF63A352040 0->28 45 Function_00007FF63A352058 0->45 46 Function_00007FF63A351F58 0->46 56 Function_00007FF63A352074 0->56 1 Function_00007FF63A351880 2 Function_00007FF63A352080 3 Function_00007FF63A351100 42 Function_00007FF63A3510D0 3->42 4 Function_00007FF63A351000 5 Function_00007FF63A351B0A 55 Function_00007FF63A3521E8 5->55 6 Function_00007FF63A352088 7 Function_00007FF63A352090 8 Function_00007FF63A351D10 59 Function_00007FF63A351CF0 8->59 10 Function_00007FF63A351F1C 11->7 12 Function_00007FF63A3511A0 14 Function_00007FF63A352320 15 Function_00007FF63A352820 16 Function_00007FF63A35282C 18->11 54 Function_00007FF63A3525EC 18->54 20 Function_00007FF63A351E34 21 Function_00007FF63A3510B0 23 Function_00007FF63A351D30 23->54 24 Function_00007FF63A35223C 26 Function_00007FF63A3518C4 26->3 26->8 27 Function_00007FF63A351EC5 29 Function_00007FF63A3519C0 29->9 29->24 30 Function_00007FF63A352740 31 Function_00007FF63A3526C0 31->30 32 Function_00007FF63A351440 32->1 34 Function_00007FF63A3511C0 32->34 50 Function_00007FF63A351860 32->50 33 Function_00007FF63A351040 34->1 34->26 35 Function_00007FF63A3516C0 34->35 34->50 35->1 35->3 35->12 36 Function_00007FF63A35284A 37 Function_00007FF63A35224C 38 Function_00007FF63A351ECC 38->54 39 Function_00007FF63A3518CC 39->1 40 Function_00007FF63A352048 41 Function_00007FF63A352050 43 Function_00007FF63A3519DC 43->2 43->6 43->11 43->20 43->23 43->32 43->38 52 Function_00007FF63A351D6C 43->52 43->55 60 Function_00007FF63A351EF0 43->60 44 Function_00007FF63A351B58 58 Function_00007FF63A351F70 44->58 45->40 45->41 46->10 47 Function_00007FF63A3522E4 48 Function_00007FF63A351060 48->1 49 Function_00007FF63A351160 53 Function_00007FF63A351B6C 50->53 57 Function_00007FF63A351C74 50->57 51 Function_00007FF63A351660 51->1 52->14 52->28 60->28 61 Function_00007FF63A3527F0 61->51

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID: Http$CloseHandleRequest$DataOpen$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemcpymemset
    • String ID: /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3$148.135.121.165$Content-Type: text/plain$GET$HCMUS-CTF Botnet
    • API String ID: 1954243361-2234560942
    • Opcode ID: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
    • Instruction ID: c32fc601e555f500fb3482178f9cf41beb6b6b324cb00f02e714db558f179d64
    • Opcode Fuzzy Hash: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
    • Instruction Fuzzy Hash: 84618E2AB0878186FB14EF6AE42466A77A0FB84B94F044174EE5E87B50DF7CE545E700

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID: Http$RequestSleep$DataOpen_invalid_parameter_noinfo_noreturnmemchr$AvailableConnectHeadersOptionQueryReadReceiveResponseSendmemset
    • String ID: HCMUS-CT
    • API String ID: 2434495133-4159949832
    • Opcode ID: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
    • Instruction ID: a12c8637987554b541403ac5ccc1ec7695e31d15c43e0031a0000e692207c2d0
    • Opcode Fuzzy Hash: 75995823342e5f479ed89da7937418d5bb3199919cb7ecf33f74943161ac90b3
    • Instruction Fuzzy Hash: 7651D166E2878182FA14AB29D5043AC63A2EB457E0F555771EA7D83BD5DF7CE880B300

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 1328870896-0
    • Opcode ID: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
    • Instruction ID: 6b1efa3db0db033408540b4a2c5e6be96352a75f44af68505d00934a1d11b4ab
    • Opcode Fuzzy Hash: 34205a4456bb8f744d28daca5d74241deeb67255457b9eb5234a8feeb582f312
    • Instruction Fuzzy Hash: CD314829E0D64346FA58BB6DE4113B963A1AF55784F8440B8E94EC73E3DE7DF804B241

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
    • Instruction ID: 525368bae137e17b39ccb30eb76acab907fd8aa0bd5847342a64c56778ae3aef
    • Opcode Fuzzy Hash: 70127c65dbb65fcc678ebc04994dd07b7d6ce4f23746a00d0cd93d4de428bf81
    • Instruction Fuzzy Hash: 63313076609B8186FB648F64E8503EE73A0FB84744F44447ADB4E97B98EF38D648E710

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
    • Instruction ID: eabedb584d89709f3556429435c2cc7f8b63a1859490c164f2cde2fb51b4c7e8
    • Opcode Fuzzy Hash: 9d677862f94bbf438b6af7ca56c0fb3e7aeb705d45f25b37a36768f31ef9442e
    • Instruction Fuzzy Hash: 10111C26B14B018AFB008B64E8542B973A4FB19758F840E31DA6DC77A4DF7CE1589340
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
    • Instruction ID: 04cbab100d9ea7f4b2d516e0228c2671a3ddf0c73b2e0f637dea0c09b988a55f
    • Opcode Fuzzy Hash: 2b693434f938f5f99c1aa01dec3e4834eb247ea5cf64080b7bcdac2271f85257
    • Instruction Fuzzy Hash: 8CA0012A90DA0290F6488B48E8605216260EB54300B4040B1D00EC22609F3CA400B341

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3388666177.00007FF63A351000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A350000, based on PE: true
    • Associated: 00000000.00000002.3388654049.00007FF63A350000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388678115.00007FF63A353000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388689942.00007FF63A355000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3388701666.00007FF63A356000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff63a350000_Ne7qNMCeuy.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1775671525-0
    • Opcode ID: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
    • Instruction ID: c6f68a8012310b98e1ca3530e867ec3cea602cb69d3714768b244b7ab2ade856
    • Opcode Fuzzy Hash: 2c71489f02de5e234a46f037b57d54b9cac513202be81fedc4cee65fbf92f26f
    • Instruction Fuzzy Hash: 5A41D26AB08B8285FE24EB2AA40436EA351FB44BD4F544671DE6DC7786DF7CE141B300